Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EiO4tqZ3o4.exe

Overview

General Information

Sample name:EiO4tqZ3o4.exe
renamed because original name is a hash value
Original sample name:0731d232d0af12a5320238914de6bf4a.exe
Analysis ID:1582052
MD5:0731d232d0af12a5320238914de6bf4a
SHA1:41b1d57292fa942352373e587a638011893649ab
SHA256:adc6b85fbb55624cdd9a25d9634f08d3991ac60dce86c8f3ed520a88e36371fe
Tags:AsyncRATexeRATuser-abuse_ch
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Disables UAC (registry)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • EiO4tqZ3o4.exe (PID: 6836 cmdline: "C:\Users\user\Desktop\EiO4tqZ3o4.exe" MD5: 0731D232D0AF12A5320238914DE6BF4A)
    • powershell.exe (PID: 6168 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EiO4tqZ3o4.exe" -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 796 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 2664 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • RegSvcs.exe (PID: 5936 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 3332 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • WerFault.exe (PID: 3740 cmdline: C:\Windows\system32\WerFault.exe -u -p 6836 -s 1512 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"Server": "5sdf23d2sdf.ddnss.eu", "Port": "6606,7707,8808", "Version": "AWS | RxR  ", "MutexName": "AsyncMutex_6SI8OkPnk", "Autorun": "false", "Group": "false"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1945987917.0000016B4B1E3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    00000003.00000002.4155351831.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      00000003.00000002.4155351831.0000000000402000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xc3c6:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      00000000.00000002.1945987917.0000016B4AF22000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000000.00000002.1945987917.0000016B4AF22000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Asyncrat_11a11ba1unknownunknown
        • 0x277f4:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
        • 0x37434:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
        • 0x2a6f8:$a2: Stub.exe
        • 0x2a788:$a2: Stub.exe
        • 0x3a338:$a2: Stub.exe
        • 0x3a3c8:$a2: Stub.exe
        • 0x2429e:$a3: get_ActivatePong
        • 0x33ede:$a3: get_ActivatePong
        • 0x27a0c:$a4: vmware
        • 0x3764c:$a4: vmware
        • 0x27884:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
        • 0x374c4:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
        • 0x251a1:$a6: get_SslClient
        • 0x34de1:$a6: get_SslClient
        Click to see the 8 entries
        SourceRuleDescriptionAuthorStrings
        3.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          3.2.RegSvcs.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            3.2.RegSvcs.exe.400000.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
            • 0xc534:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
            • 0xf438:$a2: Stub.exe
            • 0xf4c8:$a2: Stub.exe
            • 0x8fde:$a3: get_ActivatePong
            • 0xc74c:$a4: vmware
            • 0xc5c4:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
            • 0x9ee1:$a6: get_SslClient
            3.2.RegSvcs.exe.400000.0.unpackrat_win_asyncratDetect AsyncRAT based on specific stringsSekoia.io
            • 0x8fde:$str01: get_ActivatePong
            • 0x9ee1:$str02: get_SslClient
            • 0x9efd:$str03: get_TcpClient
            • 0x841a:$str04: get_SendSync
            • 0x84c8:$str05: get_IsConnected
            • 0x8d44:$str06: set_UseShellExecute
            • 0xc85a:$str07: Pastebin
            • 0xdef2:$str08: Select * from AntivirusProduct
            • 0xf438:$str09: Stub.exe
            • 0xf4c8:$str09: Stub.exe
            • 0xc644:$str10: timeout 3 > NUL
            • 0xc534:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
            • 0xc5c4:$str12: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
            0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
              Click to see the 18 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EiO4tqZ3o4.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EiO4tqZ3o4.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\EiO4tqZ3o4.exe", ParentImage: C:\Users\user\Desktop\EiO4tqZ3o4.exe, ParentProcessId: 6836, ParentProcessName: EiO4tqZ3o4.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EiO4tqZ3o4.exe" -Force, ProcessId: 6168, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EiO4tqZ3o4.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EiO4tqZ3o4.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\EiO4tqZ3o4.exe", ParentImage: C:\Users\user\Desktop\EiO4tqZ3o4.exe, ParentProcessId: 6836, ParentProcessName: EiO4tqZ3o4.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EiO4tqZ3o4.exe" -Force, ProcessId: 6168, ProcessName: powershell.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EiO4tqZ3o4.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EiO4tqZ3o4.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\EiO4tqZ3o4.exe", ParentImage: C:\Users\user\Desktop\EiO4tqZ3o4.exe, ParentProcessId: 6836, ParentProcessName: EiO4tqZ3o4.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EiO4tqZ3o4.exe" -Force, ProcessId: 6168, ProcessName: powershell.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-29T19:02:07.277772+010020355951Domain Observed Used for C2 Detected108.174.194.587707192.168.2.449733TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-29T19:02:07.277772+010020356071Domain Observed Used for C2 Detected108.174.194.587707192.168.2.449733TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-29T19:02:07.277772+010028424781Malware Command and Control Activity Detected108.174.194.587707192.168.2.449733TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 5sdf23d2sdf.ddnss.euAvira URL Cloud: Label: malware
              Source: 00000003.00000002.4156348185.0000000002821000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "5sdf23d2sdf.ddnss.eu", "Port": "6606,7707,8808", "Version": "AWS | RxR ", "MutexName": "AsyncMutex_6SI8OkPnk", "Autorun": "false", "Group": "false"}
              Source: EiO4tqZ3o4.exeReversingLabs: Detection: 63%
              Source: EiO4tqZ3o4.exeVirustotal: Detection: 63%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: EiO4tqZ3o4.exeJoe Sandbox ML: detected

              Exploits

              barindex
              Source: Yara matchFile source: 00000000.00000002.1945987917.0000016B4B1E3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: EiO4tqZ3o4.exe PID: 6836, type: MEMORYSTR
              Source: EiO4tqZ3o4.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: System.Windows.Forms.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: mscorlib.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.ni.pdbRSDS source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.pdbLL source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Windows.Forms.ni.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Drawing.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: mscorlib.ni.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Drawing.ni.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Core.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Windows.Forms.pdb@}V source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Drawing.ni.pdbRSDS source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.ni.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Core.ni.pdbRSDS source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Core.ni.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: Microsoft.VisualBasic.pdb source: WERAC21.tmp.dmp.7.dr

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 108.174.194.58:7707 -> 192.168.2.4:49733
              Source: Network trafficSuricata IDS: 2030673 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 108.174.194.58:7707 -> 192.168.2.4:49733
              Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 108.174.194.58:7707 -> 192.168.2.4:49733
              Source: Network trafficSuricata IDS: 2035607 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 108.174.194.58:7707 -> 192.168.2.4:49733
              Source: Malware configuration extractorURLs: 5sdf23d2sdf.ddnss.eu
              Source: Yara matchFile source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.raw.unpack, type: UNPACKEDPE
              Source: global trafficTCP traffic: 192.168.2.4:49733 -> 108.174.194.58:7707
              Source: Joe Sandbox ViewASN Name: HOSTWINDSUS HOSTWINDSUS
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: 5sdf23d2sdf.ddnss.eu
              Source: 77EC63BDA74BD0D0E0426DC8F80085060.3.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
              Source: RegSvcs.exe, 00000003.00000002.4155724066.0000000000C24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enu
              Source: RegSvcs.exe, 00000003.00000002.4156348185.0000000002821000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000003.00000002.4155351831.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1945987917.0000016B4AF22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.4156348185.0000000002821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: EiO4tqZ3o4.exe PID: 6836, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5936, type: MEMORYSTR
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.raw.unpack, LimeLogger.cs.Net Code: KeyboardLayout
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.raw.unpack, LimeLogger.cs.Net Code: KeyboardLayout

              System Summary

              barindex
              Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
              Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.raw.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000003.00000002.4155351831.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000000.00000002.1945987917.0000016B4AF22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000000.00000002.1945987917.0000016B4AF22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Process Memory Space: EiO4tqZ3o4.exe PID: 6836, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Process Memory Space: RegSvcs.exe PID: 5936, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeCode function: 0_2_00007FFD9B800C480_2_00007FFD9B800C48
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeCode function: 0_2_00007FFD9B8039880_2_00007FFD9B803988
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeCode function: 0_2_00007FFD9B813F670_2_00007FFD9B813F67
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeCode function: 0_2_00007FFD9B80AEA90_2_00007FFD9B80AEA9
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeCode function: 0_2_00007FFD9B80DEC70_2_00007FFD9B80DEC7
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeCode function: 0_2_00007FFD9B8086500_2_00007FFD9B808650
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeCode function: 0_2_00007FFD9B80B47D0_2_00007FFD9B80B47D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00E670383_2_00E67038
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00E679083_2_00E67908
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00E6D1F03_2_00E6D1F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00E66CF03_2_00E66CF0
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6836 -s 1512
              Source: EiO4tqZ3o4.exeStatic PE information: Resource name: STRONGER type: DOS executable (COM)
              Source: EiO4tqZ3o4.exeStatic PE information: Resource name: STRONGER type: DOS executable (COM)
              Source: EiO4tqZ3o4.exeStatic PE information: No import functions for PE file found
              Source: EiO4tqZ3o4.exe, 00000000.00000002.1945861818.0000016B49470000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameEsayijumara> vs EiO4tqZ3o4.exe
              Source: EiO4tqZ3o4.exe, 00000000.00000002.1945987917.0000016B4AF22000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameStub.exe" vs EiO4tqZ3o4.exe
              Source: EiO4tqZ3o4.exe, 00000000.00000002.1947465890.0000016B635A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXE.MUIj% vs EiO4tqZ3o4.exe
              Source: EiO4tqZ3o4.exe, 00000000.00000002.1947465890.0000016B635A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEj% vs EiO4tqZ3o4.exe
              Source: EiO4tqZ3o4.exeBinary or memory string: OriginalFilename vs EiO4tqZ3o4.exe
              Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
              Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000003.00000002.4155351831.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000000.00000002.1945987917.0000016B4AF22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000000.00000002.1945987917.0000016B4AF22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: Process Memory Space: EiO4tqZ3o4.exe PID: 6836, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: Process Memory Space: RegSvcs.exe PID: 5936, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: EiO4tqZ3o4.exeStatic PE information: Section: .rsrc ZLIB complexity 0.9975374690976514
              Source: EiO4tqZ3o4.exe, ----.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.raw.unpack, Settings.csBase64 encoded string: '/OA1+xnL34JP8pDH9tf3+7ngrZvQnkqlpJmsBN1AwQ19TFDZOj5nZ0pWiS8GTNySyHFAG7F1inWFanLmJW9PqUVpMSBlLcHZORCrh5SQh4c=', 'sW8y/CcitJtiYkbzdV7+p4yzpZi063PT9zXTzc9NTCP2lqO3ZWIN2ZNjfNsOJZ9t3iSj+i9kxVgf0XyU76ipRQ==', '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', 'jh63SA1yvdMukCaAdyuv7wSq0dOoVCSSDrotxhUCCc82UQ9Z/Y7auAfCOEfTGqQgAHxgipMm9As8hvrlt5DW5j8JZppIHT5prYHrcar6NN8SvBzdibU8lc31trVMmmER2Ftffo/Xk9RdqyDa3uCl7IP4v0tV9a2Gr63A6ydmWqrm2fZTi+MH+rEMlL+ok7pif1k2ZHDvgZl3eMbM4Dd0uWmz5g8B/YqHXEI9dNIyCkgZmynyWNDtki15XiOoLCVO2z9mJOEKCuXqrWjhJ+ChuzCI7aO0zPgygtrYL/zZrsFx3lWlKaF6Z8RfikaMnwlHAMI4HWCR8Q5RIviMEJSO5vqM569o8hQoNLDE0QxJyHP6RWfnczAe8D0Zc1Nh0LQWNeukvVrQBa7CLFFIxUkppAbBSmVL+JamF/HgXdEp7vx4xFfXea5eVDIG5HQ
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.raw.unpack, Settings.csBase64 encoded string: '/OA1+xnL34JP8pDH9tf3+7ngrZvQnkqlpJmsBN1AwQ19TFDZOj5nZ0pWiS8GTNySyHFAG7F1inWFanLmJW9PqUVpMSBlLcHZORCrh5SQh4c=', 'sW8y/CcitJtiYkbzdV7+p4yzpZi063PT9zXTzc9NTCP2lqO3ZWIN2ZNjfNsOJZ9t3iSj+i9kxVgf0XyU76ipRQ==', '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', 'jh63SA1yvdMukCaAdyuv7wSq0dOoVCSSDrotxhUCCc82UQ9Z/Y7auAfCOEfTGqQgAHxgipMm9As8hvrlt5DW5j8JZppIHT5prYHrcar6NN8SvBzdibU8lc31trVMmmER2Ftffo/Xk9RdqyDa3uCl7IP4v0tV9a2Gr63A6ydmWqrm2fZTi+MH+rEMlL+ok7pif1k2ZHDvgZl3eMbM4Dd0uWmz5g8B/YqHXEI9dNIyCkgZmynyWNDtki15XiOoLCVO2z9mJOEKCuXqrWjhJ+ChuzCI7aO0zPgygtrYL/zZrsFx3lWlKaF6Z8RfikaMnwlHAMI4HWCR8Q5RIviMEJSO5vqM569o8hQoNLDE0QxJyHP6RWfnczAe8D0Zc1Nh0LQWNeukvVrQBa7CLFFIxUkppAbBSmVL+JamF/HgXdEp7vx4xFfXea5eVDIG5HQ
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@10/12@2/1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_6SI8OkPnk
              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6836
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:796:120:WilError_03
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qnnumejd.jg0.ps1Jump to behavior
              Source: EiO4tqZ3o4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: EiO4tqZ3o4.exeReversingLabs: Detection: 63%
              Source: EiO4tqZ3o4.exeVirustotal: Detection: 63%
              Source: unknownProcess created: C:\Users\user\Desktop\EiO4tqZ3o4.exe "C:\Users\user\Desktop\EiO4tqZ3o4.exe"
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EiO4tqZ3o4.exe" -Force
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6836 -s 1512
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EiO4tqZ3o4.exe" -ForceJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"Jump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"Jump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: EiO4tqZ3o4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: EiO4tqZ3o4.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: System.Windows.Forms.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: mscorlib.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.ni.pdbRSDS source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.pdbLL source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Windows.Forms.ni.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Drawing.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: mscorlib.ni.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Drawing.ni.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Core.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Windows.Forms.pdb@}V source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Drawing.ni.pdbRSDS source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.ni.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Core.ni.pdbRSDS source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: System.Core.ni.pdb source: WERAC21.tmp.dmp.7.dr
              Source: Binary string: Microsoft.VisualBasic.pdb source: WERAC21.tmp.dmp.7.dr

              Data Obfuscation

              barindex
              Source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.raw.unpack, Packet.cs.Net Code: Plugins System.AppDomain.Load(byte[])
              Source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.raw.unpack, Packet.cs.Net Code: Plugins System.AppDomain.Load(byte[])
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeCode function: 0_2_00007FFD9B808164 push ebx; ret 0_2_00007FFD9B80816A
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeCode function: 0_2_00007FFD9B80786E pushad ; retf 0_2_00007FFD9B80789D
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeCode function: 0_2_00007FFD9B80789E push eax; retf 0_2_00007FFD9B8078AD
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeCode function: 0_2_00007FFD9B8000AD pushad ; iretd 0_2_00007FFD9B8000C1
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeCode function: 0_2_00007FFD9B817845 push eax; iretd 0_2_00007FFD9B81786D
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeCode function: 0_2_00007FFD9B8D026B push esp; retf 4810h0_2_00007FFD9B8D0312
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00E6196A push eax; retn 0070h3_2_00E61972
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00E61957 push eax; retn 0070h3_2_00E61962
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00E61917 push eax; retn 0070h3_2_00E61952

              Boot Survival

              barindex
              Source: Yara matchFile source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000003.00000002.4155351831.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1945987917.0000016B4AF22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.4156348185.0000000002821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: EiO4tqZ3o4.exe PID: 6836, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5936, type: MEMORYSTR

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: EiO4tqZ3o4.exe PID: 6836, type: MEMORYSTR
              Source: Yara matchFile source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000003.00000002.4155351831.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1945987917.0000016B4AF22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.4156348185.0000000002821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: EiO4tqZ3o4.exe PID: 6836, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5936, type: MEMORYSTR
              Source: EiO4tqZ3o4.exe, 00000000.00000002.1945987917.0000016B4B1E3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
              Source: EiO4tqZ3o4.exe, 00000000.00000002.1945987917.0000016B4B1E3000.00000004.00000800.00020000.00000000.sdmp, EiO4tqZ3o4.exe, 00000000.00000002.1945987917.0000016B4AF22000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4155351831.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeMemory allocated: 16B493F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeMemory allocated: 16B62E80000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6202Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3621Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 9146Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 708Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4908Thread sleep time: -6456360425798339s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: Amcache.hve.7.drBinary or memory string: VMware
              Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
              Source: EiO4tqZ3o4.exe, 00000000.00000002.1945987917.0000016B4B1E3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: RegSvcs.exe, 00000003.00000002.4157890737.0000000004D16000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
              Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: RegSvcs.exe, 00000003.00000002.4158267831.0000000004D94000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4155824691.0000000000C87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: EiO4tqZ3o4.exe, 00000000.00000002.1945987917.0000016B4B1E3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
              Source: EiO4tqZ3o4.exe, 00000000.00000002.1945987917.0000016B4B1E3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
              Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: EiO4tqZ3o4.exe, 00000000.00000002.1945987917.0000016B4B1E3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
              Source: EiO4tqZ3o4.exe, 00000000.00000002.1945987917.0000016B4B1E3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
              Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.7.drBinary or memory string: vmci.sys
              Source: Amcache.hve.7.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
              Source: EiO4tqZ3o4.exe, 00000000.00000002.1945987917.0000016B4B1E3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
              Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
              Source: RegSvcs.exe, 00000003.00000002.4155351831.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: vmware
              Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
              Source: EiO4tqZ3o4.exe, 00000000.00000002.1945987917.0000016B4B1E3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
              Source: EiO4tqZ3o4.exe, 00000000.00000002.1945987917.0000016B4B1E3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
              Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.7.drBinary or memory string: VMware20,1
              Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: EiO4tqZ3o4.exe, 00000000.00000002.1945987917.0000016B4B1E3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
              Source: EiO4tqZ3o4.exe, 00000000.00000002.1945987917.0000016B4B1E3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
              Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EiO4tqZ3o4.exe" -Force
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EiO4tqZ3o4.exe" -ForceJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 412000Jump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 414000Jump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 646008Jump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EiO4tqZ3o4.exe" -ForceJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"Jump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"Jump to behavior
              Source: RegSvcs.exe, 00000003.00000002.4158704612.0000000005639000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeQueries volume information: C:\Users\user\Desktop\EiO4tqZ3o4.exe VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: Yara matchFile source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af3d2c0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EiO4tqZ3o4.exe.16b4af4cf00.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000003.00000002.4155351831.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1945987917.0000016B4AF22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.4156348185.0000000002821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: EiO4tqZ3o4.exe PID: 6836, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5936, type: MEMORYSTR
              Source: C:\Users\user\Desktop\EiO4tqZ3o4.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System EnableLUAJump to behavior
              Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: RegSvcs.exe, 00000003.00000002.4155782039.0000000000C66000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4158181496.0000000004D68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Windows Management Instrumentation
              1
              Scheduled Task/Job
              312
              Process Injection
              21
              Disable or Modify Tools
              1
              Input Capture
              131
              Security Software Discovery
              Remote Services1
              Input Capture
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              Scheduled Task/Job
              1
              DLL Side-Loading
              1
              Scheduled Task/Job
              41
              Virtualization/Sandbox Evasion
              LSASS Memory2
              Process Discovery
              Remote Desktop Protocol11
              Archive Collected Data
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              312
              Process Injection
              Security Account Manager41
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Deobfuscate/Decode Files or Information
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture11
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script111
              Obfuscated Files or Information
              LSA Secrets1
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
              Software Packing
              Cached Domain Credentials13
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              DLL Side-Loading
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1582052 Sample: EiO4tqZ3o4.exe Startdate: 29/12/2024 Architecture: WINDOWS Score: 100 28 5sdf23d2sdf.ddnss.eu 2->28 32 Suricata IDS alerts for network traffic 2->32 34 Found malware configuration 2->34 36 Malicious sample detected (through community Yara rule) 2->36 38 12 other signatures 2->38 8 EiO4tqZ3o4.exe 1 3 2->8         started        signatures3 process4 signatures5 40 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->40 42 Writes to foreign memory regions 8->42 44 Allocates memory in foreign processes 8->44 46 3 other signatures 8->46 11 powershell.exe 23 8->11         started        14 RegSvcs.exe 2 8->14         started        17 WerFault.exe 19 16 8->17         started        20 RegSvcs.exe 8->20         started        process6 dnsIp7 48 Loading BitLocker PowerShell Module 11->48 22 WmiPrvSE.exe 11->22         started        24 conhost.exe 11->24         started        30 5sdf23d2sdf.ddnss.eu 108.174.194.58, 49733, 7707 HOSTWINDSUS United States 14->30 26 C:\ProgramData\Microsoft\...\Report.wer, Unicode 17->26 dropped file8 signatures9 process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              EiO4tqZ3o4.exe63%ReversingLabsByteCode-MSIL.Trojan.InjectorNetT
              EiO4tqZ3o4.exe64%VirustotalBrowse
              EiO4tqZ3o4.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              5sdf23d2sdf.ddnss.eu100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              5sdf23d2sdf.ddnss.eu
              108.174.194.58
              truetrue
                unknown
                default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
                217.20.58.100
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  5sdf23d2sdf.ddnss.eutrue
                  • Avira URL Cloud: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://upx.sf.netAmcache.hve.7.drfalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000003.00000002.4156348185.0000000002821000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      108.174.194.58
                      5sdf23d2sdf.ddnss.euUnited States
                      54290HOSTWINDSUStrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1582052
                      Start date and time:2024-12-29 19:01:05 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 7m 12s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:13
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:EiO4tqZ3o4.exe
                      renamed because original name is a hash value
                      Original Sample Name:0731d232d0af12a5320238914de6bf4a.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.expl.evad.winEXE@10/12@2/1
                      EGA Information:
                      • Successful, ratio: 50%
                      HCA Information:
                      • Successful, ratio: 89%
                      • Number of executed functions: 77
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 217.20.58.100, 13.89.179.12, 20.190.147.12, 52.149.20.212, 13.107.246.63
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target RegSvcs.exe, PID 5936 because it is empty
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtCreateKey calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      • Report size getting too big, too many NtSetInformationFile calls found.
                      TimeTypeDescription
                      13:02:00API Interceptor18x Sleep call for process: powershell.exe modified
                      13:02:08API Interceptor9466593x Sleep call for process: RegSvcs.exe modified
                      13:02:23API Interceptor1x Sleep call for process: WerFault.exe modified
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comwce.exeGet hashmaliciousUnknownBrowse
                      • 217.20.58.98
                      nXNMsYXFFc.exeGet hashmaliciousUnknownBrowse
                      • 217.20.58.100
                      5RaYXoKFn9.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                      • 217.20.58.98
                      msgde.exeGet hashmaliciousQuasarBrowse
                      • 217.20.58.99
                      atw3.dllGet hashmaliciousGozi, UrsnifBrowse
                      • 217.20.58.100
                      WRD1792.docx.docGet hashmaliciousDynamerBrowse
                      • 217.20.58.99
                      GtEVo1eO2p.exeGet hashmaliciousLummaCBrowse
                      • 217.20.58.98
                      0442.pdf.exeGet hashmaliciousUnknownBrowse
                      • 217.20.58.100
                      #U5b89#U88c5#U7a0b#U5e8f_1.1.0.exeGet hashmaliciousUnknownBrowse
                      • 217.20.58.100
                      wUSt04rfJ0.exeGet hashmaliciousQuasarBrowse
                      • 217.20.58.101
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      HOSTWINDSUSTitan.exeGet hashmaliciousUnknownBrowse
                      • 104.168.136.235
                      Titan.exeGet hashmaliciousUnknownBrowse
                      • 104.168.136.235
                      Support.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                      • 104.168.134.232
                      arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
                      • 192.236.219.113
                      lFxGd66yDa.exeGet hashmaliciousNetSupport RATBrowse
                      • 23.254.224.41
                      Jjv9ha2GKn.exeGet hashmaliciousNetSupport RAT, DarkTortillaBrowse
                      • 23.254.224.41
                      5q1Wm5VlqL.exeGet hashmaliciousNetSupport RATBrowse
                      • 23.254.224.41
                      xd.mpsl.elfGet hashmaliciousMiraiBrowse
                      • 142.11.240.128
                      loligang.arm.elfGet hashmaliciousMiraiBrowse
                      • 192.119.104.64
                      loligang.ppc.elfGet hashmaliciousMiraiBrowse
                      • 142.11.240.155
                      No context
                      No context
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):1.1477043493072316
                      Encrypted:false
                      SSDEEP:192:ZbIE+er50UnUdaWB2WSlibdzuiFqZ24lO83:2E+emUnUdam2SZzuiFqY4lO83
                      MD5:FBB2C83BE2B5342DBC4A450D68E47481
                      SHA1:AD58F7051F8652BCBC5317048AB088951E4BF791
                      SHA-256:EF1675DF3B8CCB64A9CA1DEFB484D00676AAE728CA6427F2BD9C0437036365B4
                      SHA-512:7D8BE5BEF4150909A2D9DD700B6FD62E9F4E8B11AEB58ECCD8B6CB36ABB9E48776CD816FA51C19B0A08658A734469E423EE9FE431B6111208BC25889940B44B4
                      Malicious:true
                      Reputation:low
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.9.6.8.9.2.0.1.3.7.1.5.2.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.9.6.8.9.2.0.8.7.1.5.2.9.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.b.f.f.8.1.8.9.-.5.0.d.7.-.4.c.6.9.-.b.f.9.7.-.7.2.6.0.a.f.2.6.8.3.d.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.b.7.c.b.e.c.0.-.6.d.c.f.-.4.b.6.4.-.8.1.6.b.-.3.2.6.5.c.6.e.4.5.d.7.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.E.i.O.4.t.q.Z.3.o.4...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=..\q\..e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.b.4.-.0.0.0.1.-.0.0.1.4.-.3.8.8.f.-.0.8.c.0.1.b.5.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.8.c.e.a.c.d.e.a.0.a.9.0.e.0.b.7.9.e.4.e.6.c.6.1.2.e.0.8.c.8.8.0.0.0.0.0.0.0.0.!.0.0.0.0.4.1.b.1.d.5.7.2.9.2.f.a.9.4.2.3.5.2.3.7.3.e.5.8.7.a.6.3.8.0.1.1.8.9.3.6.4.9.a.b.!.E.i.O.4.t.q.Z.3.o.4...e.x.e.....
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:Mini DuMP crash report, 16 streams, Sun Dec 29 18:02:00 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):469365
                      Entropy (8bit):3.219154018689513
                      Encrypted:false
                      SSDEEP:3072:h0gY/Fz3+vS8TBK4lNCkXnaLTXoKG1cSmTQ1CCqEFfLSuQc:hU/Fz3QS80hkYe5qc
                      MD5:FF1C37B312B29027D3E7B367976429B7
                      SHA1:9F228FA627250DDF57B59C6A7779052E6753AAAB
                      SHA-256:1CC3A1A31BF91A92093BF009D2E087B81EEEA87CDD5D01F9EADA2783B664E505
                      SHA-512:4093889F460AA654B506B1BA40279008B3323B6B7428EB534703C165B1A32DAAA80F9B9236EE1723E7B2F17FF7AAA525F1FD225EA329D8C81061608635DDF3BB
                      Malicious:false
                      Reputation:low
                      Preview:MDMP..a..... .........qg............t...........p...........$....%......d...(%.......J.............l.......8...........T............8..u............A..........xC..............................................................................eJ.......D......Lw......................T.............qg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8794
                      Entropy (8bit):3.713189653904693
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJIPfDi6Y9wyOgmfS6J6pr189blScSfoIOXm:R6lXJInG6YayOgmfSitlS5ffv
                      MD5:21D39FDC708B600B5593E20B881EDE13
                      SHA1:082C1D4C5AC1D0D0A3462958F0DE61BA37F3CB67
                      SHA-256:4C3D85CE2E22C6C7AE0D1D3D9B8D9F698D4E9FDBFDDE6A76E2A5DE2B6564AA9E
                      SHA-512:B6242953057DE71591252CD237AB9E536B341778FEFEFC127A855BEC635AB0F253B3288F88959062B3B9FAEB5DD60136DA0DD7E947ACAE4ED96B73A18D7C1666
                      Malicious:false
                      Reputation:low
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.3.6.<./.P.i.
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4754
                      Entropy (8bit):4.5216135829365784
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsDJg771I9bYWpW8VYVYm8M4JKLAFOyq854sxa2tW2d:uIjfdI70R7VpJKzr0a2tW2d
                      MD5:F2BC1669D9E6F0AEEF55FBB67DC6E9A0
                      SHA1:950A6698AB211C02F7BB7E2C8A7E3D770CA68CD0
                      SHA-256:CD9E15519B6A12A62DC85F0DA999C6B5645C3CD57EB1B6BEA3BE27684DC8924F
                      SHA-512:D85214E49EB62052330F74C99C7FFF62F40B323FE07C2CCB68D69389ED3B1A334314FF4122E11DD8A0B95CCB29E449D796EE6C2EB7BCB2AF9966FF26D62741DD
                      Malicious:false
                      Reputation:low
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="652864" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                      Category:dropped
                      Size (bytes):71954
                      Entropy (8bit):7.996617769952133
                      Encrypted:true
                      SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                      MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                      SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                      SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                      SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                      Malicious:false
                      Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):328
                      Entropy (8bit):3.150184159866505
                      Encrypted:false
                      SSDEEP:6:kKBK/9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:wODnLNkPlE99SNxAhUe/3
                      MD5:9DCFA8F9F340CC70483623FAAB65CC87
                      SHA1:431F33730828750963450D4145E82C8B7FE1CE14
                      SHA-256:E279388D1A08DC5E3D527A834BBCF0F37E6377D037EEE04231D1321672D1048C
                      SHA-512:3900E3367BCD579847BC39081A8D8D435EB82256AE447BC7D8CF2A7985E223444B364696743F7169D6D8C6F8DDE1DE2C10B311A8B4B8CD2BA00776DE1EEDA99D
                      Malicious:false
                      Preview:p...... ........N.!..Z..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):64
                      Entropy (8bit):1.1940658735648508
                      Encrypted:false
                      SSDEEP:3:Nlllulbnolz:NllUc
                      MD5:F23953D4A58E404FCB67ADD0C45EB27A
                      SHA1:2D75B5CACF2916C66E440F19F6B3B21DFD289340
                      SHA-256:16F994BFB26D529E4C28ED21C6EE36D4AFEAE01CEEB1601E85E0E7FDFF4EFA8B
                      SHA-512:B90BFEC26910A590A367E8356A20F32A65DB41C6C62D79CA0DDCC8D95C14EB48138DEC6B992A6E5C7B35CFF643063012462DA3E747B2AA15721FE2ECCE02C044
                      Malicious:false
                      Preview:@...e................................................@..........
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:MS Windows registry file, NT/2000 or above
                      Category:dropped
                      Size (bytes):1835008
                      Entropy (8bit):4.465585699851131
                      Encrypted:false
                      SSDEEP:6144:OIXfpi67eLPU9skLmb0b4AWSPKaJG8nAgejZMMhA2gX4WABl0uN4dwBCswSbr:DXD94AWlLZMM6YFH++r
                      MD5:D9C283D8D32C136BE99835D9EA01F70E
                      SHA1:05A1B7A40867A3ABB6ABB986551C751E59ACEDC4
                      SHA-256:2ECBAD69D5647EDA5B62FFFE7BFDF4EE8CD755FDC0FB9F4031AB69E647357958
                      SHA-512:84B92E88759770BC4BE6DD87C9CBAC1B62D65D22B7517DB5FFDB25861D1F50B45BABED2EB151D5D2B420FA993E491EC7ABA3D66C32CBFB5138C7893A7E0A2C0D
                      Malicious:false
                      Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm6....Z...............................................................................................................................................................................................................................................................................................................................................s..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):7.995254639615574
                      TrID:
                      • Win64 Executable GUI (202006/5) 92.65%
                      • Win64 Executable (generic) (12005/4) 5.51%
                      • Generic Win/DOS Executable (2004/3) 0.92%
                      • DOS Executable Generic (2002/1) 0.92%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:EiO4tqZ3o4.exe
                      File size:421'888 bytes
                      MD5:0731d232d0af12a5320238914de6bf4a
                      SHA1:41b1d57292fa942352373e587a638011893649ab
                      SHA256:adc6b85fbb55624cdd9a25d9634f08d3991ac60dce86c8f3ed520a88e36371fe
                      SHA512:a1af80997ce12df93cd17be40f78cfaced5fda36e1a601819e7e0790fa1efba13c2f818d45f83290707e3ac8e1fc54fea7f2d6a17640e83da5ba816ee629a436
                      SSDEEP:6144:y+YH9d/Ucs7XgCbXTFm2HTMFyowl07iLC0Ga2wdyRwIfjc6YRjd66Al:y5HUcaX5Lxm2atlf0Ga2NRwI7YJbAl
                      TLSH:079423BBDA505429F3F12A30822E1BFE13EEC9B618E2CAFF05A57B7D790574519E1081
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...._mg.........."...0......R........... ....@...... ....................................`................................
                      Icon Hash:90cececece8e8eb0
                      Entrypoint:0x400000
                      Entrypoint Section:
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x676D5FD5 [Thu Dec 26 13:53:25 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:
                      Instruction
                      dec ebp
                      pop edx
                      nop
                      add byte ptr [ebx], al
                      add byte ptr [eax], al
                      add byte ptr [eax+eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x650e4.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000x1be80x1c00aeaf46fb6e1449e0cc9529912967f602False0.6697823660714286data6.15566711659085IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rsrc0x40000x650e40x652007651d1a152952151462b3296bc1b78c5False0.9975374690976514data7.998950594784604IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      STRONGER0x42e40x20data1.34375
                      STRONGER0x43040x10data1.5625
                      STRONGER0x43140x10data1.5625
                      STRONGER0x43240x64810DOS executable (COM)1.0003303665124956
                      STRONGER0x68b340x10data1.5625
                      STRONGER0x68b440x180DOS executable (COM)1.0286458333333333
                      RT_VERSION0x68cc40x234data0.4734042553191489
                      RT_MANIFEST0x68ef80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                      2024-12-29T19:02:07.277772+01002842478ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s)1108.174.194.587707192.168.2.449733TCP
                      2024-12-29T19:02:07.277772+01002030673ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)1108.174.194.587707192.168.2.449733TCP
                      2024-12-29T19:02:07.277772+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert1108.174.194.587707192.168.2.449733TCP
                      2024-12-29T19:02:07.277772+01002035607ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)1108.174.194.587707192.168.2.449733TCP
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 29, 2024 19:02:05.811455965 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:05.931389093 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:05.931484938 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:05.943253040 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:06.063127995 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:07.150644064 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:07.150731087 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:07.150777102 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:07.157548904 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:07.277771950 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:07.520966053 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:07.565658092 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:09.740673065 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:09.860563040 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:09.860637903 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:09.980606079 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:10.970465899 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:11.018728971 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:11.171694994 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:11.221858978 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:19.691368103 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:19.811387062 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:19.811449051 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:19.931351900 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:20.172450066 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:20.221838951 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:20.373471975 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:20.378669024 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:20.498722076 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:20.498800039 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:20.618720055 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:29.644599915 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:29.764774084 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:29.765084028 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:29.885011911 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:30.136703014 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:30.190629959 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:30.337568998 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:30.339143038 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:30.460007906 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:30.460206985 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:30.580194950 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:39.597306013 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:39.717345953 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:39.717470884 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:39.837399960 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:40.091810942 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:40.143747091 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:40.292861938 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:40.312968016 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:40.432890892 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:40.433059931 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:40.493958950 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:40.534399033 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:40.552936077 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:40.634197950 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:40.675015926 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:49.550492048 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:49.670653105 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:49.670717955 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:49.790590048 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:50.032757998 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:50.081278086 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:50.233922005 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:50.235389948 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:50.355439901 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:50.355516911 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:50.475429058 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:59.503773928 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:59.624150038 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:59.624520063 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:02:59.744507074 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:02:59.985804081 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:00.034434080 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:00.187170029 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:00.188694000 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:00.308603048 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:00.308670044 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:00.428771973 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:09.456650019 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:09.587507010 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:09.587569952 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:09.770205975 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:09.953223944 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:10.003305912 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:10.154304028 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:10.155776024 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:10.276074886 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:10.276128054 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:10.395968914 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:10.484951973 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:10.534439087 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:10.597268105 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:10.643834114 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:19.411607981 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:19.531562090 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:19.531629086 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:19.651498079 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:19.894243002 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:19.940717936 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:20.095340967 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:20.097301960 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:20.217180967 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:20.217230082 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:20.337141991 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:20.628751993 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:20.748974085 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:20.749037981 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:20.868859053 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:21.112327099 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:21.159601927 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:21.313179970 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:21.319093943 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:21.438999891 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:21.441704988 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:21.561634064 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:25.113116026 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:25.232940912 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:25.237610102 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:25.357558966 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:25.686542988 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:25.737622023 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:25.887795925 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:25.891565084 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:26.011468887 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:26.012224913 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:26.132062912 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:35.066174030 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:35.378254890 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:35.577291965 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:35.577303886 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:35.577399015 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:35.697220087 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:35.897950888 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:35.940742016 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:36.099061966 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:36.130403996 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:36.250909090 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:36.250965118 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:36.370857000 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:38.691473007 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:38.811378002 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:38.811506033 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:38.931725025 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:39.172584057 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:39.349555016 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:39.373682022 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:39.378926992 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:39.499144077 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:39.501678944 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:39.621629000 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:40.443257093 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:40.594491959 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:40.644263983 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:40.737636089 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:42.316154003 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:42.436252117 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:42.436297894 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:42.557204008 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:42.798552990 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:42.847019911 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:42.999682903 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:43.001461983 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:43.121562958 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:43.121623993 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:43.241504908 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:44.784981012 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:44.904964924 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:44.905023098 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:45.025079966 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:45.270926952 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:45.347029924 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:45.471923113 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:45.473572016 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:45.593585968 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:45.593692064 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:45.713619947 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:49.331840038 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:49.451924086 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:49.453660965 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:49.573636055 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:49.817796946 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:49.865241051 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:50.018744946 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:50.025574923 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:50.145389080 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:50.145478964 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:50.265328884 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:59.285592079 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:59.405467033 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:59.405647039 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:59.709594011 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:03:59.949429035 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:03:59.949861050 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:00.193964005 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:00.237678051 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:00.395020962 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:00.396677017 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:00.516622066 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:00.516668081 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:00.636586905 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:03.144474030 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:03.264405966 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:03.264652014 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:03.384567976 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:03.626954079 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:03.784629107 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:03.828061104 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:03.829442024 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:03.949364901 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:03.951679945 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:04.071577072 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:10.454922915 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:10.522300005 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:10.646780968 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:10.690828085 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:13.097652912 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:13.217730999 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:13.217789888 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:13.337647915 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:13.579174995 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:13.628365040 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:13.780054092 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:13.783155918 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:13.903110981 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:13.903187037 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:14.023108959 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:23.050740004 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:23.170845985 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:23.171021938 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:23.290884972 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:23.533679008 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:23.581532955 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:23.733300924 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:23.737632036 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:23.857662916 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:23.857734919 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:23.977845907 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:24.473637104 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:24.593487978 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:24.593544006 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:24.713413954 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:24.955102921 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:25.003367901 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:25.156316042 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:25.157649994 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:25.277631044 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:25.277679920 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:25.397576094 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:27.222453117 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:27.342478037 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:27.342564106 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:27.462523937 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:27.711791039 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:27.753353119 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:27.912885904 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:27.917644024 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:28.037590027 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:28.037842035 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:28.157735109 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:34.738126993 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:34.858108044 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:34.858172894 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:34.978096962 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:35.596369028 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:35.596916914 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:35.596970081 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:35.597042084 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:35.597042084 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:35.599059105 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:35.718924999 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:35.719034910 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:35.839180946 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:40.460200071 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:40.503388882 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:40.655354023 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:40.706518888 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:43.519444942 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:43.639631987 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:43.639739990 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:43.759696007 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:43.878897905 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:43.998800039 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:44.001776934 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:44.002610922 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:44.050280094 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:44.168725967 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:44.200213909 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:44.205668926 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:44.341028929 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:44.341130972 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:44.401202917 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:44.440901041 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:44.461143970 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:44.533904076 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:44.540529013 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:44.660415888 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:44.660487890 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:44.780402899 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:53.832175016 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:53.952393055 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:53.952481985 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:54.072361946 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:54.313971996 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:54.362795115 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:54.515069962 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:54.517080069 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:54.636909008 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:04:54.636969090 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:04:54.756802082 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:02.816420078 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:02.936458111 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:02.936718941 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:03.056623936 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:03.298068047 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:03.347177029 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:03.499499083 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:03.502888918 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:03.622831106 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:03.623039007 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:03.743046999 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:10.478106022 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:10.519076109 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:10.679043055 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:10.722198963 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:12.769741058 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:12.889666080 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:12.889823914 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:13.009713888 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:13.251442909 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:13.300329924 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:13.452465057 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:13.472037077 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:13.591916084 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:13.597265959 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:13.717164993 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:16.582276106 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:16.702272892 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:16.702322006 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:16.822182894 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:17.063668966 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:17.112947941 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:17.264695883 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:17.266305923 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:17.386212111 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:17.386315107 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:17.506239891 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:18.316375017 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:18.436597109 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:18.436739922 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:18.556622028 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:18.812318087 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:18.862942934 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:19.013456106 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:19.015130997 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:19.135037899 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:19.135092020 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:19.254947901 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:28.269493103 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:28.389553070 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:28.389731884 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:28.509727001 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:28.769769907 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:28.815992117 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:28.970781088 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:28.972218037 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:29.092348099 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:29.092398882 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:29.212423086 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:29.347779989 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:29.467864037 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:29.473750114 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:29.593698025 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:29.835069895 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:29.881737947 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:30.036331892 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:30.042293072 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:30.162228107 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:30.162381887 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:30.282321930 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:31.207052946 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:31.326953888 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:31.327009916 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:31.446875095 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:31.688210964 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:31.739908934 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:31.889183044 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:31.891940117 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:32.011797905 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:32.011851072 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:32.131908894 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:35.597794056 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:35.718069077 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:35.722218990 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:35.842159033 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:36.086865902 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:36.128509998 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:36.287861109 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:36.291127920 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:36.411041975 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:36.413860083 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:36.533713102 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:40.468131065 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:40.519145966 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:40.669137001 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:40.722278118 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:42.972850084 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:43.092833042 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:43.092896938 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:43.212754965 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:43.455373049 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:43.503623962 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:43.655580997 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:43.661850929 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:43.781743050 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:43.784244061 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:43.908739090 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:46.944603920 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:47.064549923 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:47.064604044 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:47.184497118 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:47.425805092 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:47.472281933 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:47.626755953 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:47.628825903 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:47.748688936 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:47.748744965 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:47.868820906 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:56.894664049 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:57.014750004 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:57.014823914 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:57.135019064 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:57.377830029 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:57.425442934 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:57.578869104 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:57.583441019 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:57.703370094 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:05:57.703435898 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:05:57.823412895 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:06:04.863512993 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:06:04.983629942 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:06:04.983686924 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:06:05.103774071 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:06:05.344991922 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:06:05.425462961 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:06:05.545999050 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:06:05.613789082 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:06:05.863799095 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:06:05.983768940 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:06:05.983854055 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:06:06.104047060 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:06:06.345843077 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:06:06.427798986 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:06:06.546921015 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:06:06.547749043 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:06:06.667635918 CET770749733108.174.194.58192.168.2.4
                      Dec 29, 2024 19:06:06.667695045 CET497337707192.168.2.4108.174.194.58
                      Dec 29, 2024 19:06:06.787638903 CET770749733108.174.194.58192.168.2.4
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 29, 2024 19:02:04.591274023 CET5540453192.168.2.41.1.1.1
                      Dec 29, 2024 19:02:05.581285000 CET5540453192.168.2.41.1.1.1
                      Dec 29, 2024 19:02:05.806668997 CET53554041.1.1.1192.168.2.4
                      Dec 29, 2024 19:02:05.824600935 CET53554041.1.1.1192.168.2.4
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Dec 29, 2024 19:02:04.591274023 CET192.168.2.41.1.1.10x369Standard query (0)5sdf23d2sdf.ddnss.euA (IP address)IN (0x0001)false
                      Dec 29, 2024 19:02:05.581285000 CET192.168.2.41.1.1.10x369Standard query (0)5sdf23d2sdf.ddnss.euA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Dec 29, 2024 19:02:03.802685976 CET1.1.1.1192.168.2.40x4423No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comdefault.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comCNAME (Canonical name)IN (0x0001)false
                      Dec 29, 2024 19:02:03.802685976 CET1.1.1.1192.168.2.40x4423No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.100A (IP address)IN (0x0001)false
                      Dec 29, 2024 19:02:03.802685976 CET1.1.1.1192.168.2.40x4423No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.101A (IP address)IN (0x0001)false
                      Dec 29, 2024 19:02:03.802685976 CET1.1.1.1192.168.2.40x4423No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.98A (IP address)IN (0x0001)false
                      Dec 29, 2024 19:02:03.802685976 CET1.1.1.1192.168.2.40x4423No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.99A (IP address)IN (0x0001)false
                      Dec 29, 2024 19:02:05.806668997 CET1.1.1.1192.168.2.40x369No error (0)5sdf23d2sdf.ddnss.eu108.174.194.58A (IP address)IN (0x0001)false
                      Dec 29, 2024 19:02:05.824600935 CET1.1.1.1192.168.2.40x369No error (0)5sdf23d2sdf.ddnss.eu108.174.194.58A (IP address)IN (0x0001)false

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:13:01:56
                      Start date:29/12/2024
                      Path:C:\Users\user\Desktop\EiO4tqZ3o4.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user\Desktop\EiO4tqZ3o4.exe"
                      Imagebase:0x16b49060000
                      File size:421'888 bytes
                      MD5 hash:0731D232D0AF12A5320238914DE6BF4A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1945987917.0000016B4B1E3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.1945987917.0000016B4AF22000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000000.00000002.1945987917.0000016B4AF22000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000002.1945987917.0000016B4AF22000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:13:01:59
                      Start date:29/12/2024
                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\EiO4tqZ3o4.exe" -Force
                      Imagebase:0x7ff788560000
                      File size:452'608 bytes
                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:2
                      Start time:13:01:59
                      Start date:29/12/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:13:01:59
                      Start date:29/12/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
                      Imagebase:0x4f0000
                      File size:45'984 bytes
                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000003.00000002.4155351831.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000003.00000002.4155351831.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000003.00000002.4156348185.0000000002821000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:false

                      Target ID:4
                      Start time:13:01:59
                      Start date:29/12/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Wow64 process (32bit):
                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
                      Imagebase:
                      File size:45'984 bytes
                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:7
                      Start time:13:01:59
                      Start date:29/12/2024
                      Path:C:\Windows\System32\WerFault.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\WerFault.exe -u -p 6836 -s 1512
                      Imagebase:0x7ff791870000
                      File size:570'736 bytes
                      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:8
                      Start time:13:02:02
                      Start date:29/12/2024
                      Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Imagebase:0x7ff693ab0000
                      File size:496'640 bytes
                      MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                      Has elevated privileges:true
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:10.5%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:3
                        Total number of Limit Nodes:0
                        execution_graph 15770 7ffd9b817909 15771 7ffd9b817919 VirtualProtect 15770->15771 15773 7ffd9b817a51 15771->15773

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 403 7ffd9b800c48-7ffd9b803ff1 call 7ffd9b803eb0 410 7ffd9b804014-7ffd9b804023 403->410 411 7ffd9b804025-7ffd9b80403f call 7ffd9b803eb0 call 7ffd9b803f00 410->411 412 7ffd9b803ff3-7ffd9b804009 call 7ffd9b803eb0 call 7ffd9b803f00 410->412 421 7ffd9b80400b-7ffd9b804012 412->421 422 7ffd9b804040-7ffd9b804090 412->422 421->410 426 7ffd9b80409c-7ffd9b8040d3 422->426 427 7ffd9b804092-7ffd9b804097 call 7ffd9b802708 422->427 430 7ffd9b8040d9-7ffd9b8040e4 426->430 431 7ffd9b8042cf-7ffd9b804320 426->431 427->426 432 7ffd9b804158-7ffd9b80415d 430->432 433 7ffd9b8040e6-7ffd9b8040f4 430->433 455 7ffd9b804322-7ffd9b804339 431->455 456 7ffd9b80436d-7ffd9b804380 431->456 434 7ffd9b8041d0-7ffd9b8041da 432->434 435 7ffd9b80415f-7ffd9b80416b 432->435 433->431 437 7ffd9b8040fa-7ffd9b804109 433->437 439 7ffd9b8041fc-7ffd9b804204 434->439 440 7ffd9b8041dc 434->440 435->431 438 7ffd9b804171-7ffd9b804184 435->438 441 7ffd9b80410b-7ffd9b80413b 437->441 442 7ffd9b80413d-7ffd9b804148 437->442 444 7ffd9b804207-7ffd9b804212 438->444 439->444 449 7ffd9b8041e1-7ffd9b8041e9 call 7ffd9b802728 440->449 441->442 450 7ffd9b804189-7ffd9b80418c 441->450 442->431 443 7ffd9b80414e-7ffd9b804156 442->443 443->432 443->433 444->431 447 7ffd9b804218-7ffd9b804228 444->447 447->431 452 7ffd9b80422e-7ffd9b80423b 447->452 457 7ffd9b8041ee-7ffd9b8041fa 449->457 453 7ffd9b8041a2-7ffd9b8041aa 450->453 454 7ffd9b80418e-7ffd9b80419e 450->454 452->431 458 7ffd9b804241-7ffd9b804261 452->458 453->431 459 7ffd9b8041b0-7ffd9b8041cf 453->459 454->453 465 7ffd9b80433b-7ffd9b804341 455->465 466 7ffd9b804356-7ffd9b80436c 455->466 457->439 458->431 468 7ffd9b804263-7ffd9b804272 458->468 469 7ffd9b804343-7ffd9b804354 465->469 470 7ffd9b804381-7ffd9b8043c6 465->470 466->456 471 7ffd9b804274-7ffd9b80427f 468->471 472 7ffd9b8042bd-7ffd9b8042ce 468->472 469->465 469->466 479 7ffd9b8043c8-7ffd9b8043d5 470->479 480 7ffd9b804413-7ffd9b804421 470->480 471->472 477 7ffd9b804281-7ffd9b8042b8 call 7ffd9b802728 471->477 477->472 483 7ffd9b8043e9-7ffd9b8043f6 479->483 484 7ffd9b8043d7-7ffd9b8043e7 479->484 488 7ffd9b804478-7ffd9b80447f 480->488 489 7ffd9b804423-7ffd9b804429 480->489 490 7ffd9b8043f9-7ffd9b804412 483->490 491 7ffd9b804444-7ffd9b804445 483->491 484->483 484->484 496 7ffd9b8044c2-7ffd9b8044eb 488->496 497 7ffd9b804481-7ffd9b804482 488->497 489->488 493 7ffd9b80442b-7ffd9b80442c 489->493 490->480 494 7ffd9b804447-7ffd9b80446e 491->494 495 7ffd9b804471-7ffd9b804476 491->495 498 7ffd9b80442f-7ffd9b804432 493->498 494->495 495->488 495->498 500 7ffd9b804485-7ffd9b804488 497->500 502 7ffd9b8044ec-7ffd9b804501 498->502 503 7ffd9b804438-7ffd9b804440 498->503 500->502 504 7ffd9b80448a-7ffd9b80449b 500->504 510 7ffd9b80450b-7ffd9b804563 502->510 511 7ffd9b804503-7ffd9b80450a 502->511 503->491 505 7ffd9b8044b9-7ffd9b8044c0 504->505 506 7ffd9b80449d-7ffd9b8044a3 504->506 505->496 505->500 506->502 507 7ffd9b8044a5-7ffd9b8044b5 506->507 507->505 511->510
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1947927895.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffd9b800000_EiO4tqZ3o4.jbxd
                        Similarity
                        • API ID:
                        • String ID: d$K_H$K_H
                        • API String ID: 0-2040067875
                        • Opcode ID: 6812a97ec275fac7471c01fcbd8553bfd395a87d7fc0a395772e1f72105ef823
                        • Instruction ID: 050ca9a76f28cb620b7edcf120853c9d80995b3fb96889055e5dc86e864e562d
                        • Opcode Fuzzy Hash: 6812a97ec275fac7471c01fcbd8553bfd395a87d7fc0a395772e1f72105ef823
                        • Instruction Fuzzy Hash: 1D228A31B0DA4A4FE768DB6894A19B177E1EF99310B1A01BDD49EC71E7DE24F842C380

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 660 7ffd9b80dec7-7ffd9b80df2e 665 7ffd9b80df9f-7ffd9b80dfb5 call 7ffd9b80a410 660->665 666 7ffd9b80df30-7ffd9b80df35 660->666 679 7ffd9b80dfcf-7ffd9b80dfda 665->679 680 7ffd9b80dfb7-7ffd9b80dfca 665->680 667 7ffd9b80dfb6-7ffd9b80dfca 666->667 668 7ffd9b80df37-7ffd9b80df51 call 7ffd9b806860 666->668 670 7ffd9b80e068-7ffd9b80e06a 667->670 673 7ffd9b80e0db-7ffd9b80e0e0 670->673 674 7ffd9b80e06c-7ffd9b80e071 670->674 677 7ffd9b80e0f2 673->677 674->677 678 7ffd9b80e073-7ffd9b80e08f 674->678 681 7ffd9b80e0f4-7ffd9b80e0f5 677->681 682 7ffd9b80e0f8-7ffd9b80e146 call 7ffd9b80a410 * 2 call 7ffd9b8064c0 677->682 683 7ffd9b80dff1-7ffd9b80dffc 679->683 684 7ffd9b80dfdc-7ffd9b80dfef 679->684 680->670 681->682 699 7ffd9b80e2c9-7ffd9b80e323 682->699 700 7ffd9b80e14c-7ffd9b80e16a 682->700 687 7ffd9b80dffe-7ffd9b80e010 683->687 688 7ffd9b80e012-7ffd9b80e031 683->688 684->670 687->670 688->670 692 7ffd9b80e033-7ffd9b80e064 688->692 692->670 709 7ffd9b80e456-7ffd9b80e4b3 699->709 710 7ffd9b80e329-7ffd9b80e384 call 7ffd9b80a410 * 2 call 7ffd9b8064c0 699->710 700->699 701 7ffd9b80e170-7ffd9b80e18f 700->701 705 7ffd9b80e210-7ffd9b80e21a 701->705 706 7ffd9b80e191-7ffd9b80e1b0 701->706 707 7ffd9b80e24e-7ffd9b80e29f call 7ffd9b80ade0 705->707 708 7ffd9b80e21c-7ffd9b80e21f 705->708 711 7ffd9b80e221-7ffd9b80e236 706->711 712 7ffd9b80e1b2-7ffd9b80e1b7 706->712 707->699 722 7ffd9b80e2a1-7ffd9b80e2c8 707->722 708->707 723 7ffd9b80e56e-7ffd9b80e579 709->723 724 7ffd9b80e4b9-7ffd9b80e50e call 7ffd9b80a410 * 2 call 7ffd9b8064c0 709->724 710->709 738 7ffd9b80e38a-7ffd9b80e3e0 710->738 714 7ffd9b80e238-7ffd9b80e249 711->714 712->714 716 7ffd9b80e1b9-7ffd9b80e208 call 7ffd9b806860 712->716 714->707 718 7ffd9b80e24b-7ffd9b80e24c 714->718 716->711 729 7ffd9b80e20a-7ffd9b80e20f 716->729 718->707 733 7ffd9b80e57e-7ffd9b80e59a 723->733 734 7ffd9b80e57b-7ffd9b80e57d 723->734 724->723 750 7ffd9b80e510-7ffd9b80e534 724->750 729->705 739 7ffd9b80e5e4-7ffd9b80e626 call 7ffd9b80a410 * 2 call 7ffd9b8064c0 733->739 740 7ffd9b80e59c-7ffd9b80e5c7 733->740 734->733 738->709 742 7ffd9b80e3e2-7ffd9b80e42d call 7ffd9b80ade0 738->742 744 7ffd9b80e75b-7ffd9b80e78a 739->744 765 7ffd9b80e62c-7ffd9b80e64a 739->765 743 7ffd9b80e5cd-7ffd9b80e5e3 740->743 740->744 742->709 756 7ffd9b80e42f-7ffd9b80e455 742->756 743->739 762 7ffd9b80e7d4-7ffd9b80e813 call 7ffd9b80a410 * 2 call 7ffd9b8064c0 744->762 763 7ffd9b80e78c-7ffd9b80e7b7 744->763 754 7ffd9b80e562-7ffd9b80e56d 750->754 755 7ffd9b80e536-7ffd9b80e546 750->755 755->723 759 7ffd9b80e548-7ffd9b80e55f 755->759 759->754 767 7ffd9b80e917-7ffd9b80e949 762->767 794 7ffd9b80e819-7ffd9b80e834 762->794 766 7ffd9b80e7bd-7ffd9b80e7d3 763->766 763->767 765->744 769 7ffd9b80e650-7ffd9b80e66a 765->769 766->762 783 7ffd9b80e993-7ffd9b80e9bc call 7ffd9b80a410 767->783 784 7ffd9b80e94b-7ffd9b80e976 767->784 771 7ffd9b80e6c3-7ffd9b80e6c7 769->771 772 7ffd9b80e66c-7ffd9b80e66f 769->772 778 7ffd9b80e748-7ffd9b80e75a 771->778 779 7ffd9b80e6c9-7ffd9b80e6ef call 7ffd9b806860 771->779 775 7ffd9b80e6f0-7ffd9b80e72f call 7ffd9b80ade0 772->775 776 7ffd9b80e671-7ffd9b80e68a 772->776 795 7ffd9b80e731 775->795 781 7ffd9b80e6a3-7ffd9b80e6b4 776->781 782 7ffd9b80e68c-7ffd9b80e6a1 776->782 779->775 789 7ffd9b80e6b8-7ffd9b80e6c0 781->789 782->789 804 7ffd9b80e9be-7ffd9b80e9ce 783->804 805 7ffd9b80ea21-7ffd9b80ea22 783->805 790 7ffd9b80ea45-7ffd9b80ea57 784->790 791 7ffd9b80e97c-7ffd9b80e98f 784->791 789->795 796 7ffd9b80e6c2 789->796 806 7ffd9b80ea99-7ffd9b80eaa7 790->806 807 7ffd9b80ea59-7ffd9b80ea6a 790->807 791->783 801 7ffd9b80e88d-7ffd9b80e894 794->801 802 7ffd9b80e836-7ffd9b80e839 794->802 795->744 800 7ffd9b80e733-7ffd9b80e746 795->800 796->771 800->778 801->767 810 7ffd9b80e89a-7ffd9b80e8b7 801->810 808 7ffd9b80e8ba-7ffd9b80e8c9 802->808 809 7ffd9b80e83b-7ffd9b80e859 802->809 817 7ffd9b80ea24-7ffd9b80ea44 804->817 818 7ffd9b80e9d0-7ffd9b80e9fd 804->818 805->817 814 7ffd9b80eaad-7ffd9b80eac1 806->814 815 7ffd9b80ec03-7ffd9b80ec19 806->815 813 7ffd9b80ea6e-7ffd9b80ea7a 807->813 812 7ffd9b80e8ca-7ffd9b80e8de call 7ffd9b80ade0 808->812 809->812 816 7ffd9b80e85b-7ffd9b80e860 809->816 810->808 822 7ffd9b80e8e1-7ffd9b80e8ed 812->822 820 7ffd9b80eac4-7ffd9b80eaff call 7ffd9b80a410 * 2 call 7ffd9b80c570 813->820 821 7ffd9b80ea7c-7ffd9b80ea96 813->821 814->820 832 7ffd9b80ec1a 815->832 833 7ffd9b80ec1b-7ffd9b80ec30 815->833 816->822 823 7ffd9b80e862-7ffd9b80e886 call 7ffd9b806860 816->823 817->790 818->813 840 7ffd9b80e9ff-7ffd9b80ea20 call 7ffd9b806860 818->840 853 7ffd9b80eb01-7ffd9b80eb17 820->853 854 7ffd9b80eb19-7ffd9b80eb24 820->854 821->806 822->767 827 7ffd9b80e8ef-7ffd9b80e916 822->827 823->801 832->833 841 7ffd9b80ec31-7ffd9b80ec69 833->841 844 7ffd9b80ec7f 841->844 845 7ffd9b80ec6b-7ffd9b80ec7d call 7ffd9b800288 841->845 849 7ffd9b80ec84-7ffd9b80ec86 844->849 845->849 851 7ffd9b80ec88-7ffd9b80ec99 849->851 852 7ffd9b80ec9a-7ffd9b80ed11 849->852 851->852 880 7ffd9b80ed17-7ffd9b80ed8f 852->880 881 7ffd9b80edf8-7ffd9b80edff 852->881 853->854 861 7ffd9b80eb36 854->861 862 7ffd9b80eb26-7ffd9b80eb34 854->862 864 7ffd9b80eb38-7ffd9b80eb3d 861->864 862->864 865 7ffd9b80eb3f-7ffd9b80eb5e call 7ffd9b802580 864->865 866 7ffd9b80eb60-7ffd9b80eb76 864->866 872 7ffd9b80eba3-7ffd9b80eba9 865->872 873 7ffd9b80eb78-7ffd9b80eb89 866->873 874 7ffd9b80eb8a-7ffd9b80eb9f call 7ffd9b80cf60 866->874 872->832 876 7ffd9b80ebab-7ffd9b80ebb0 872->876 873->874 874->872 876->841 879 7ffd9b80ebb2-7ffd9b80ebe0 call 7ffd9b806860 call 7ffd9b8064c0 876->879 879->815 893 7ffd9b80ebe2-7ffd9b80ec02 879->893 898 7ffd9b80edef-7ffd9b80edf7 call 7ffd9b80ee44 880->898 899 7ffd9b80ed91-7ffd9b80ed97 call 7ffd9b807b50 880->899 883 7ffd9b80ee01-7ffd9b80ee0e 881->883 884 7ffd9b80ee1c-7ffd9b80ee2c 881->884 883->884 890 7ffd9b80ee10-7ffd9b80ee1a 883->890 891 7ffd9b80ee32-7ffd9b80ee43 884->891 890->884 898->881 903 7ffd9b80ed9c-7ffd9b80edee 899->903 903->898
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1947927895.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffd9b800000_EiO4tqZ3o4.jbxd
                        Similarity
                        • API ID:
                        • String ID: x6Z$x6Z
                        • API String ID: 0-3393415879
                        • Opcode ID: 9db67216f56f917bde6ccf4fa9fc9993c3ff03fdd901ea153dda1d042bcd4e6f
                        • Instruction ID: 6d5a5f2561610eee4936d0ee082a75fee4b34c269876bc43e59c23a50d499eea
                        • Opcode Fuzzy Hash: 9db67216f56f917bde6ccf4fa9fc9993c3ff03fdd901ea153dda1d042bcd4e6f
                        • Instruction Fuzzy Hash: 12B25830A0DB4A4FD369DB28C4A14B677E1FF99301B0545BEE4CAC72A6DE34E946C781
                        Memory Dump Source
                        • Source File: 00000000.00000002.1947927895.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffd9b800000_EiO4tqZ3o4.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8dbd1287ac0e288f90dc924ad6f0a079e21f92af00cc0e191777f1490cc04968
                        • Instruction ID: 25e85caf4b06a1f01cf230a91d1e2f9aec5155e7b29231654b7973b03fd8e1b4
                        • Opcode Fuzzy Hash: 8dbd1287ac0e288f90dc924ad6f0a079e21f92af00cc0e191777f1490cc04968
                        • Instruction Fuzzy Hash: 49923830A1DB4A8FD729DF28C4A44E5B7E1FF89344B1145BEE48AC72A6DE34E946C740
                        Memory Dump Source
                        • Source File: 00000000.00000002.1947927895.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffd9b800000_EiO4tqZ3o4.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b69a33528dde24711b742097df2b9f2e9cc75a5b1a6a0b2376c5de911f8ae2de
                        • Instruction ID: 623da05b86e8f8b7a6e13b57d3a5635e3b33f25b15f269dbae00e58a47680490
                        • Opcode Fuzzy Hash: b69a33528dde24711b742097df2b9f2e9cc75a5b1a6a0b2376c5de911f8ae2de
                        • Instruction Fuzzy Hash: D8926A31A0F68E9FE7298B54C4615B477E1EF99310F0644BDD0AE8B5E3DE38AA46C740
                        Memory Dump Source
                        • Source File: 00000000.00000002.1947927895.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffd9b800000_EiO4tqZ3o4.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 931637800a9d492e1884eed59ba06408507024796ec4ae25948c7368c4206658
                        • Instruction ID: 5d309a372224966b6203b6e942a0113c672e6e70fa642609bf7101dc867a564b
                        • Opcode Fuzzy Hash: 931637800a9d492e1884eed59ba06408507024796ec4ae25948c7368c4206658
                        • Instruction Fuzzy Hash: F852F730B19A0D4FDB68DF6CD465AB977E1EF59340F1501BDE48EC32A2DE24AD428B81
                        Memory Dump Source
                        • Source File: 00000000.00000002.1947927895.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffd9b800000_EiO4tqZ3o4.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 00a32e648805facd8299295f0931311fe0f21005ef0528675261686eb8a56440
                        • Instruction ID: 94b24eab9173a43ec7c51d32d32ccc62c500a6abc17671f77b3c166be8d5df48
                        • Opcode Fuzzy Hash: 00a32e648805facd8299295f0931311fe0f21005ef0528675261686eb8a56440
                        • Instruction Fuzzy Hash: E5F1BE31A1EB8A4FE328CB2884A15B577D2FFD9351B04467ED4DAC72B1DE34A506C780
                        Memory Dump Source
                        • Source File: 00000000.00000002.1947927895.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffd9b800000_EiO4tqZ3o4.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4180f1b943780274c63f81974e8c70def66e6c4b2c2524ae6ad808c4ab514135
                        • Instruction ID: 4bc18884784538d837b15ca05bce0b84ed89226bb07c2539025cbc5e66c81b16
                        • Opcode Fuzzy Hash: 4180f1b943780274c63f81974e8c70def66e6c4b2c2524ae6ad808c4ab514135
                        • Instruction Fuzzy Hash: 0441AA3270D78D0FD72D9B2898220B57BE5EB86310B0682BFD48BC75E7DC18A9468391
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1948111034.00007FFD9B8D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffd9b8d0000_EiO4tqZ3o4.jbxd
                        Similarity
                        • API ID:
                        • String ID: A$`7Z
                        • API String ID: 0-987360005
                        • Opcode ID: aac170e2d3787961ba78798e5ba90f84db0cb528cd6612dde5935bc658b13f69
                        • Instruction ID: aefd9dfb0f81aea8f11a3e7d6d723b4bf2f09cfb1c0038f4c74ab3ed1fd91073
                        • Opcode Fuzzy Hash: aac170e2d3787961ba78798e5ba90f84db0cb528cd6612dde5935bc658b13f69
                        • Instruction Fuzzy Hash: 70B25871A1E78A4FDB66DB68C8755A87BE0FF99304F0507FFD089CB0A2DA246906C741

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1751 7ffd9b817909-7ffd9b817919 1753 7ffd9b81791c-7ffd9b81794c 1751->1753 1757 7ffd9b81794e-7ffd9b817a4f VirtualProtect 1753->1757 1765 7ffd9b817a51 1757->1765 1766 7ffd9b817a57-7ffd9b817a7f 1757->1766 1765->1766
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1947927895.00007FFD9B800000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B800000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffd9b800000_EiO4tqZ3o4.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: af190f18130ce761afa125e03d0a4747270bf2b2cf21e8d5a7a3e95bfb28cd53
                        • Instruction ID: cc4c66dd0dad264a96c675e9b89bcef4ca5c9187e2196d6581ceaa08fdaca557
                        • Opcode Fuzzy Hash: af190f18130ce761afa125e03d0a4747270bf2b2cf21e8d5a7a3e95bfb28cd53
                        • Instruction Fuzzy Hash: DD513D7660EA880FE718DFAC68155B87FB2EFD9320F0442BFE048C31A7D9656D098791

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1767 7ffd9b8d11dc-7ffd9b8d1229 1769 7ffd9b8d122b-7ffd9b8d1259 1767->1769 1770 7ffd9b8d1273-7ffd9b8d1295 1767->1770 1771 7ffd9b8d1305-7ffd9b8d1315 1769->1771 1772 7ffd9b8d125f-7ffd9b8d1272 1769->1772 1774 7ffd9b8d1299-7ffd9b8d12a4 1770->1774 1777 7ffd9b8d1317 1771->1777 1778 7ffd9b8d1318-7ffd9b8d1340 1771->1778 1772->1770 1772->1771 1774->1771 1776 7ffd9b8d12a6-7ffd9b8d12d0 1774->1776 1779 7ffd9b8d1341-7ffd9b8d134f 1776->1779 1785 7ffd9b8d12d2-7ffd9b8d12d3 1776->1785 1777->1778 1778->1779 1781 7ffd9b8d1351-7ffd9b8d1377 1779->1781 1783 7ffd9b8d1379-7ffd9b8d1390 1781->1783 1784 7ffd9b8d13ac-7ffd9b8d13c4 1781->1784 1787 7ffd9b8d1401-7ffd9b8d144a 1783->1787 1788 7ffd9b8d1392-7ffd9b8d13ab 1783->1788 1785->1774 1789 7ffd9b8d12d5 1785->1789 1798 7ffd9b8d14bb-7ffd9b8d14c7 1787->1798 1799 7ffd9b8d144c-7ffd9b8d144e 1787->1799 1788->1784 1789->1781 1792 7ffd9b8d12d7-7ffd9b8d1304 1789->1792 1801 7ffd9b8d14ca-7ffd9b8d1573 1798->1801 1799->1801 1802 7ffd9b8d1450-7ffd9b8d1478 1799->1802 1817 7ffd9b8d1575-7ffd9b8d1586 1801->1817 1818 7ffd9b8d1587-7ffd9b8d1591 1801->1818 1809 7ffd9b8d147a-7ffd9b8d148b 1802->1809 1810 7ffd9b8d148c-7ffd9b8d1499 1802->1810 1809->1810 1817->1818
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1948111034.00007FFD9B8D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffd9b8d0000_EiO4tqZ3o4.jbxd
                        Similarity
                        • API ID:
                        • String ID: Uc
                        • API String ID: 0-2128555316
                        • Opcode ID: 1f662146904be30ca35d0c2206ad75402b933d14ee04537dc5d4c66dadd22657
                        • Instruction ID: 1df153bbef5e4c180000224ee866e8695ae5ebf3d72df0a16d292606d13a7cc5
                        • Opcode Fuzzy Hash: 1f662146904be30ca35d0c2206ad75402b933d14ee04537dc5d4c66dadd22657
                        • Instruction Fuzzy Hash: FBC16E71A0E7CA4FD756DB6898655A47FE1FF9A310B0A03FBD48CCB0A3DA186906C341
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: \V=m
                        • API String ID: 0-2437245023
                        • Opcode ID: 8ca6ba406e02b7ca2a495aa3fe32a167beb416a8e2030da106744023a6fe50b7
                        • Instruction ID: 07beb86e6efc9b2e87fc32d3ae2aa82bcc35e8445292adcbc003e1f94e59e0b5
                        • Opcode Fuzzy Hash: 8ca6ba406e02b7ca2a495aa3fe32a167beb416a8e2030da106744023a6fe50b7
                        • Instruction Fuzzy Hash: C2B16C70E44209CFDB10CFA8D98579EBBF2AF88358F149129E854B73A4EB349845CF81
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b962120325cf1a313322d9f429a1ac56703352d4c1af20a5d82beb3c8dc3d5d0
                        • Instruction ID: 1c8ba2ccdd6d40855bcb2daebbdd84be8343a39f4e52fd05ffc808b52677ff04
                        • Opcode Fuzzy Hash: b962120325cf1a313322d9f429a1ac56703352d4c1af20a5d82beb3c8dc3d5d0
                        • Instruction Fuzzy Hash: EEB18F70E442098FDB10CFA8E9817EDBBF2AF88358F249529D455F7254EB349985CB81
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: aiq$ aiq$,$xmq
                        • API String ID: 0-198554163
                        • Opcode ID: 2e509837e996ace60b1b2ed7a80c4c8c213e50e009a4834704b7bd68b8544473
                        • Instruction ID: 148206b313094a296e2a1ac7b9884c8931d627a074a3c16a1275708b378c1743
                        • Opcode Fuzzy Hash: 2e509837e996ace60b1b2ed7a80c4c8c213e50e009a4834704b7bd68b8544473
                        • Instruction Fuzzy Hash: ED02AC307406018FDB15EF28E554B6EB7A2BB84314F24C66DE515AB3A9CFB4EC85CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: aiq$ aiq$,$xmq
                        • API String ID: 0-198554163
                        • Opcode ID: 074f6c57bf4ad191069bec6f514742e925520825e7a2c9a852165ac031b064e5
                        • Instruction ID: b8ba4f34d4ec94380cb9850059ace142e9f749d1d2fdd96f3089e84554e8cc7d
                        • Opcode Fuzzy Hash: 074f6c57bf4ad191069bec6f514742e925520825e7a2c9a852165ac031b064e5
                        • Instruction Fuzzy Hash: F5D1BC307402009FDB15AF28E954B6AB7A2BF84314F24C56DE505AF3A9DBB4EC85CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: aiq$ aiq$xmq
                        • API String ID: 0-2145220678
                        • Opcode ID: 3da150731071e9d16d584af28bbeb25c7542e92d495fb3bd91139fcdc858fb87
                        • Instruction ID: fbf02a5be1a47ac0da61b99b82cfb33e94cb7d0aa1645e439376f92d8dea7f1e
                        • Opcode Fuzzy Hash: 3da150731071e9d16d584af28bbeb25c7542e92d495fb3bd91139fcdc858fb87
                        • Instruction Fuzzy Hash: CA61AC347803008FD711EF28E954B6E7BA2FB84314F24856DE505AF3A9DBB4EC458BA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: (mq$Teiq
                        • API String ID: 0-3423551303
                        • Opcode ID: d99da78e8ae6ab9383fb8ccead11e1cbfea0016919349474521e754064372f88
                        • Instruction ID: 9623b63cbaf9c1a6f93f9b4bab6ab9aa7597d061f214a0dca02186128e890c90
                        • Opcode Fuzzy Hash: d99da78e8ae6ab9383fb8ccead11e1cbfea0016919349474521e754064372f88
                        • Instruction Fuzzy Hash: 7C516930B005148FCB44DF69D458B5EBBF6FF88700F2581A9E906EB3A6CA71DD058B91
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: Hmq$dLoq
                        • API String ID: 0-221678391
                        • Opcode ID: 45c6c0bc686730c17fde8cc5df73e1e5aa6df60add58dbed831ee7f1e549353c
                        • Instruction ID: 1234082e9a4b248559e3a69aaa09751fc84432c12f8ad58cdecb2d259eb41844
                        • Opcode Fuzzy Hash: 45c6c0bc686730c17fde8cc5df73e1e5aa6df60add58dbed831ee7f1e549353c
                        • Instruction Fuzzy Hash: 7041AF357002148FCB159F69D458AAEBBF6FF89300F1485AAE106EB3A5CB759C05CBA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: $iq$$iq
                        • API String ID: 0-3479330454
                        • Opcode ID: d6a0c087fb6a31636a666e3de50c556348d1dd7f04147262ae6054bb7df49443
                        • Instruction ID: 0ff8c90d3f4c147dc2be07e4eebb2f11961ffa2a802be67cdb38acb92913574e
                        • Opcode Fuzzy Hash: d6a0c087fb6a31636a666e3de50c556348d1dd7f04147262ae6054bb7df49443
                        • Instruction Fuzzy Hash: 35412570A54405CFC7085F5AA50843EBB77FB84755738A96AE006AB3A4DB31DC138FD6
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: LRiq
                        • API String ID: 0-209933059
                        • Opcode ID: 85742d407a79919e465a38cf9a748bdcd4299ebde2321e5e2fd841cf1fec6dc2
                        • Instruction ID: 952d434f0df4ef1e63b0319d0b118fa23160d027e58fc1afb88109978c83888e
                        • Opcode Fuzzy Hash: 85742d407a79919e465a38cf9a748bdcd4299ebde2321e5e2fd841cf1fec6dc2
                        • Instruction Fuzzy Hash: 83012630F816019FCB45AB7CA8057AE3BE0EF4A390F1450BDE105F72A7EA708D058B92
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cdb209161f84f3897e34991fecbd197b6b41642367277583db3c91af0e7971ad
                        • Instruction ID: b4235b0da655c6c8df3eddcdb7399e74a897087fb39b8d8014d4c9b00ed2cdf3
                        • Opcode Fuzzy Hash: cdb209161f84f3897e34991fecbd197b6b41642367277583db3c91af0e7971ad
                        • Instruction Fuzzy Hash: 56D22B307403008FCB29EF74E5A566D77E3ABC9344B6094ADE40AEB3A5EF359C429B51
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: \V=m
                        • API String ID: 0-2437245023
                        • Opcode ID: 3a2bcbd88c42fd066d5cbc27eb86d78ccea529259f7cdb457c7ce85b86b968d5
                        • Instruction ID: be90134c8375cf064dad8bd2cb8d71198c39972fc6c59561a5519d469f10506a
                        • Opcode Fuzzy Hash: 3a2bcbd88c42fd066d5cbc27eb86d78ccea529259f7cdb457c7ce85b86b968d5
                        • Instruction Fuzzy Hash: ECB15C70E48209CFDB10CFA8D9857DDBBF2AF49358F149129E894B73A4EB349845CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: xmq
                        • API String ID: 0-2213616078
                        • Opcode ID: 078926ba59106716316e6ce0e3f79023e0699ae2c91f3079266968195ac737c3
                        • Instruction ID: fa307ab27948e1dea602d3010e2ca9a3cc79d9e843cb50ce73f0fdc1a4988e73
                        • Opcode Fuzzy Hash: 078926ba59106716316e6ce0e3f79023e0699ae2c91f3079266968195ac737c3
                        • Instruction Fuzzy Hash: D1918A74682300CFD724DF28F9147553BAAF785358F20926BD419EF3A1EBB49885CBA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: Teiq
                        • API String ID: 0-3087720294
                        • Opcode ID: 1fe89d682ba8df30a50b44b1f23b3a4e5a9bec3246ff0f183db7c91b54d28be3
                        • Instruction ID: 83708923722ef7085a42656bb1f6a9e1ff154d63da7c2be4818e0e5c427bd92f
                        • Opcode Fuzzy Hash: 1fe89d682ba8df30a50b44b1f23b3a4e5a9bec3246ff0f183db7c91b54d28be3
                        • Instruction Fuzzy Hash: CE519E34A80601DFD724DF29D958B69BBB1AF48714F248169E501AB3F1CBB5EC41CF50
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: |
                        • API String ID: 0-2343686810
                        • Opcode ID: a05cc12182cc4a764f4ab19448e8bdd4b11e6d9c68113774317fc16a3f117132
                        • Instruction ID: 038e15cbc7a66da1a360a5d8d6dec610ca6595baedc7139ff9092a86624693de
                        • Opcode Fuzzy Hash: a05cc12182cc4a764f4ab19448e8bdd4b11e6d9c68113774317fc16a3f117132
                        • Instruction Fuzzy Hash: 9A41F5727442119FCB15DB38E944A5EB7E6EF89350F0084AEE506DB7A5DB71EC01CBA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: $iq
                        • API String ID: 0-2267446798
                        • Opcode ID: 0a4fc4d9ed86a7cc8cb5ec1f832e461554a57a14f302e116c14c182eae544294
                        • Instruction ID: 630c203cf2e18f6c8e013b72b63ad01bcd7070d3ebb22069bfd94a5866efee18
                        • Opcode Fuzzy Hash: 0a4fc4d9ed86a7cc8cb5ec1f832e461554a57a14f302e116c14c182eae544294
                        • Instruction Fuzzy Hash: 78416770A44541CFC7095F5AA50803ABB73BF8035573DA5AAE006AB2A1CB319C13CFD6
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: LRiq
                        • API String ID: 0-209933059
                        • Opcode ID: a042cfa4ee44c2c66d7ee7eb5a4f80394d75e0b2cd9be05f790f55977e042e60
                        • Instruction ID: 133158d3de6429f3c81c8ef35e79ead19da2d8bde0cf6eb9bf575ad7567bef26
                        • Opcode Fuzzy Hash: a042cfa4ee44c2c66d7ee7eb5a4f80394d75e0b2cd9be05f790f55977e042e60
                        • Instruction Fuzzy Hash: CE31B170F002168FCB45AB79D595A6E7BF6FFC9310B1480ADE505EB3A5DE309D0687A0
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: dLoq
                        • API String ID: 0-703069486
                        • Opcode ID: b332283cd7ddaa97643bc42d1c9263fe7f624bc5d96bbfa651740aa68b8f3aed
                        • Instruction ID: 2d037ee84cb56f173d074a8a40afc4a517d4455b04dd56f7aa15e80bddcdede6
                        • Opcode Fuzzy Hash: b332283cd7ddaa97643bc42d1c9263fe7f624bc5d96bbfa651740aa68b8f3aed
                        • Instruction Fuzzy Hash: 1831BE71A402199FCB14DF68D558B9EBBF1FF4C304F1494A9E401AB3A1CB759D48CBA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: Teiq
                        • API String ID: 0-3087720294
                        • Opcode ID: 8ca0ab387f8bf897a7c274aacd2085f6ab5e630a3b3a00769e39ca3cdb48d454
                        • Instruction ID: cdc3d16ab44d8e6093e9294b27b28112b959b499f138c330b3ebbde7a136ce7e
                        • Opcode Fuzzy Hash: 8ca0ab387f8bf897a7c274aacd2085f6ab5e630a3b3a00769e39ca3cdb48d454
                        • Instruction Fuzzy Hash: 79314134B501009FDB149F68D898F69BBF6EF88754F1990A9E506EB3B2CA719C01CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: Teiq
                        • API String ID: 0-3087720294
                        • Opcode ID: 08598fc22251acc261db2895e1951894ef0c31a873a09a187d8715588a997a14
                        • Instruction ID: 7da75725872298e83d6f4080a816becd14cb4d890e00bf1f6e1bb069f6545ece
                        • Opcode Fuzzy Hash: 08598fc22251acc261db2895e1951894ef0c31a873a09a187d8715588a997a14
                        • Instruction Fuzzy Hash: 9921B431B542508FDB05DB28D858BAD7BF1AF49704F2D40AAE502EB3A2CB749C05CB62
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: Teiq
                        • API String ID: 0-3087720294
                        • Opcode ID: 70eecadd3a458367852673b824265282bea4a0c1ea849f946b035104e7ce1bd8
                        • Instruction ID: 7b402963f96390eb8e36ce3bdd6895654796b314c88c2639d7124835db2f4bab
                        • Opcode Fuzzy Hash: 70eecadd3a458367852673b824265282bea4a0c1ea849f946b035104e7ce1bd8
                        • Instruction Fuzzy Hash: DD218130B501108FCB049B28D858B6E7BF6AF88714F294069E502FB3A1CF71DC008BA2
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: |
                        • API String ID: 0-2343686810
                        • Opcode ID: cb78fc702aa5236f7361028ada5d81ca82e40e3addb93ee3ae73d17a8917c13e
                        • Instruction ID: 56a6d0bdc64213934b4d3ab1163f14729cedce817ac65f56134420c9fa11b2f3
                        • Opcode Fuzzy Hash: cb78fc702aa5236f7361028ada5d81ca82e40e3addb93ee3ae73d17a8917c13e
                        • Instruction Fuzzy Hash: 7A117C75B402259FCB44DF78D809B6E7BF5AB49740F10846AE50AEB3A4DB35A9009B80
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: Teiq
                        • API String ID: 0-3087720294
                        • Opcode ID: 38e1483de273290a56a0ae686d41871695d11691d710a2e600460a633a97b49f
                        • Instruction ID: 858a0a10117639594a4b98a51aee506c0230de453358f776d45f262259094303
                        • Opcode Fuzzy Hash: 38e1483de273290a56a0ae686d41871695d11691d710a2e600460a633a97b49f
                        • Instruction Fuzzy Hash: DC11A731B442009FCB149B68D859BADBBF2AF8C740F240069E402E73A1CBB15C02CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: Teiq
                        • API String ID: 0-3087720294
                        • Opcode ID: 78258791b7f6b32337d72ca4b99d6ec9674e5c6cfc9dba7dcfa21e4efe5f3f5a
                        • Instruction ID: fc785a650425720d0610ab7dea9b9816f9bd3e032d96a080ccc2789e75daea88
                        • Opcode Fuzzy Hash: 78258791b7f6b32337d72ca4b99d6ec9674e5c6cfc9dba7dcfa21e4efe5f3f5a
                        • Instruction Fuzzy Hash: 90118230B40204CFDB149F29D498B6DBBF6AF88754F145069E902EB3A2CA719C40CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: Hmq
                        • API String ID: 0-2274041443
                        • Opcode ID: f6d165ea842bcb99adbda82372b01ac62a4a88766c46aa3b5b1b75365c0a6a34
                        • Instruction ID: 155daff01a8ac79b4d25f160779ae8b26441dd2b85fddd71a9155a8ca0f4c1cc
                        • Opcode Fuzzy Hash: f6d165ea842bcb99adbda82372b01ac62a4a88766c46aa3b5b1b75365c0a6a34
                        • Instruction Fuzzy Hash: C1F0A4253096814FC7456B39A86452A3FE6EFCE25031545EAD249CB3AACE388C06C7A5
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID: LRiq
                        • API String ID: 0-209933059
                        • Opcode ID: 09e1b2ef46005cef75002a5007e5916d27ee94c94d9c553e025c9fd6deccba30
                        • Instruction ID: ba74b5074f8464c5c2d9d7ee54088625df08a07c1c60cbe8743bc9e2c54129d9
                        • Opcode Fuzzy Hash: 09e1b2ef46005cef75002a5007e5916d27ee94c94d9c553e025c9fd6deccba30
                        • Instruction Fuzzy Hash: 98018471F401159FCB44EB78A501AAE73B4FB48740F1040A9E509E7251EA709E018BD1
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4c334afca6fb14e186911d5b28018c5b7869ae5a430f29d60f8f11b4d00676c0
                        • Instruction ID: 3fd8a2060be95597ffb9415a1fd2190491859db0cb44350e7c0bbcaaad294749
                        • Opcode Fuzzy Hash: 4c334afca6fb14e186911d5b28018c5b7869ae5a430f29d60f8f11b4d00676c0
                        • Instruction Fuzzy Hash: E0925074305741CFCB65EF34E9586597BB2AB94304B20C9EAC806C73A9EB35D946CFA0
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6c3a4818a053cee7ad7e7332e8823ebf604ca01a62793efc9809236f6ef2c002
                        • Instruction ID: 46273ffd32d8667cd84cd7e60969708e3ec9e6d0905dbf98030aba11f0d6f0be
                        • Opcode Fuzzy Hash: 6c3a4818a053cee7ad7e7332e8823ebf604ca01a62793efc9809236f6ef2c002
                        • Instruction Fuzzy Hash: CD62A074305741CFCB65EF34E9546597BA2AF94344B20C9AAC806C73A9EB35DE42CFA0
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1e47311313d64589c7bebd93070e5c97fe34bd9be23f2bfad146b1df58795bfe
                        • Instruction ID: 7d1c508159a2f7b4fdff6a9be2540a3f4995e86a133353094e0b0b0341ee8a06
                        • Opcode Fuzzy Hash: 1e47311313d64589c7bebd93070e5c97fe34bd9be23f2bfad146b1df58795bfe
                        • Instruction Fuzzy Hash: 94D1469288E7E05FD71B6B7C69712963F709E93358B1A10E7C0C0DB1A3E5598C4EC7A2
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fbff2b7277a6b57a500e2368b0aed3aa013442823c80e56bcf8acdd5b35fb72f
                        • Instruction ID: 051f32a0068752697f1b4ad1d6568fefbd8b4c469356090704c087c443a8f72f
                        • Opcode Fuzzy Hash: fbff2b7277a6b57a500e2368b0aed3aa013442823c80e56bcf8acdd5b35fb72f
                        • Instruction Fuzzy Hash: 75A18E70E44209CFDB10CFA8E9817DDBBF1AF48398F249529D854F7254EB349985CB81
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 02b1264039129f5bf4db70eb085f6f6d538f7b7227f11212134e0121324eb907
                        • Instruction ID: 9353045a1bcbdba6cd231ca113359b253a5931331afdbc575caad38f8261cd68
                        • Opcode Fuzzy Hash: 02b1264039129f5bf4db70eb085f6f6d538f7b7227f11212134e0121324eb907
                        • Instruction Fuzzy Hash: 0B515D74A00155CFCB04DF68D5849AEFBB2FF85314B2A84A5E555BB362C730ED41CBA1
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b307f7535dff9dceb52b4bec8bef49dcc9e4c464325f0d4ebb40d9aed7e05d44
                        • Instruction ID: cb6669010191c3f5eaa95241a2a8a02100e9fbe401fede3805aec4aace4db272
                        • Opcode Fuzzy Hash: b307f7535dff9dceb52b4bec8bef49dcc9e4c464325f0d4ebb40d9aed7e05d44
                        • Instruction Fuzzy Hash: 0A51FC78202A01EFC726EF24FA649497773FF9430571085A9D0098B32DDBB9988ACF91
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e4229897bfc6a5174d4315dcf9c5fffbfb255b3fdee95d9c163724300d6b0b23
                        • Instruction ID: f55235ab37661e146376aa875ca69767a936d24be0e50503e1ae033d9ab94db5
                        • Opcode Fuzzy Hash: e4229897bfc6a5174d4315dcf9c5fffbfb255b3fdee95d9c163724300d6b0b23
                        • Instruction Fuzzy Hash: C4416F75B20228DFCB049BA9ED14B9E76BABBCC310F148429E805B3368CA756D458B94
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a1d8e4aaaf3649eaea12e3597b2565804c019e5d99d80bfc6ccb6edfeddcf9b3
                        • Instruction ID: 1acb89b90a71bb9507be9976f0c4ed088bb4330c3dedd73e89b25be2758d1df9
                        • Opcode Fuzzy Hash: a1d8e4aaaf3649eaea12e3597b2565804c019e5d99d80bfc6ccb6edfeddcf9b3
                        • Instruction Fuzzy Hash: BB41E270E40209AFCB04DFBD95546AEBBFAFF88310F20C5A9D409E3355DA349D468BA0
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ec169c0d1eb49f1620900b4c3badeaa5277673866d5d1a5e96175e297952f88b
                        • Instruction ID: bf417582c76a069e00848c4586ea0139620a1306f46d8faf248f0b2fda1a3ed7
                        • Opcode Fuzzy Hash: ec169c0d1eb49f1620900b4c3badeaa5277673866d5d1a5e96175e297952f88b
                        • Instruction Fuzzy Hash: 93419F302817168FDB25ABB9B95463F3BA6BF843C4714A92DC446E7394EF24DD408BA1
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e7585fb6f97e7bac961b3c4323dc17477c323e9b4172bd4250254b419c9c2d66
                        • Instruction ID: bb388423156d5c658df0822356b19f307d9517463b10c2f48b537393464705a3
                        • Opcode Fuzzy Hash: e7585fb6f97e7bac961b3c4323dc17477c323e9b4172bd4250254b419c9c2d66
                        • Instruction Fuzzy Hash: 524145B1900749DFCB10DFA8D984ADEBFB5FF48314F108129E41AAB254DB35A945CB94
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2c681c9494c593c6a5c25e0de0f81b9debfb95e47f24b682c05257b709acacd2
                        • Instruction ID: 9587d941929c7382dcfeedcbac9a4fc452a442e27441d883276d26e7354e8038
                        • Opcode Fuzzy Hash: 2c681c9494c593c6a5c25e0de0f81b9debfb95e47f24b682c05257b709acacd2
                        • Instruction Fuzzy Hash: F83198303517528FDB25ABB9B96463F77A6BF843C4714A52DC406E3398EF24CD409B61
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a52f0119e56c20e4d7ee3fbb7dab6176972b52c826c5c9811795ab93a806242d
                        • Instruction ID: 2356a5e43fd62c2b87dfc622de78dbbf037eb3356dea1fb3627a97c20ac0b063
                        • Opcode Fuzzy Hash: a52f0119e56c20e4d7ee3fbb7dab6176972b52c826c5c9811795ab93a806242d
                        • Instruction Fuzzy Hash: 9941EEB1D003499FCB10DFA9D984ADEBFB5AF48314F608029E819AB254DB75A945CB90
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156001493.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_dcd000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 72b90ad4df602686432b823028cd1306d204849f798ceb37b32e3887c5b48f57
                        • Instruction ID: e3aa23adfce2fb349a502a08fdf5a7ac7beca8ae191e87c9976dd762dac0005f
                        • Opcode Fuzzy Hash: 72b90ad4df602686432b823028cd1306d204849f798ceb37b32e3887c5b48f57
                        • Instruction Fuzzy Hash: 4721E071504201DFDB059F14D9C0F26BF66EB98318F24857DE9090B256C336D856CAB2
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c2218abfdd73c91c76842835ac439c40e1e40451aa6eea7a6f394a2d2376b13b
                        • Instruction ID: 5d0d1e86fdf941cfd15c61994fe18b9da26629722366c02c7cfa48dfcade8de9
                        • Opcode Fuzzy Hash: c2218abfdd73c91c76842835ac439c40e1e40451aa6eea7a6f394a2d2376b13b
                        • Instruction Fuzzy Hash: D9218E30A406058FCB14EB74D9586AE7BF6AF8A344F149038D406BB3A5DF759C45CBA1
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 839c8c2ad53d183cd4530dac393c146e5f314e9a71a68de711fbc7e8fa051e36
                        • Instruction ID: fd043af04f723fdb4a11c5488951d165deca1da6ecc51f5854687656fb915db1
                        • Opcode Fuzzy Hash: 839c8c2ad53d183cd4530dac393c146e5f314e9a71a68de711fbc7e8fa051e36
                        • Instruction Fuzzy Hash: D5219070F006069FCB50CF79A6406EEBBF1AB88380F24916AC816F3255E73099418FA1
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 92dd3b2c2f793c393b7e0219ecafaa9cb71a2d7bf3485ff1f76b100a8df2b46a
                        • Instruction ID: f9e65cfbc7953a8dabe3cfdbd3c14bb811ed32f49d33ce6e435cc45bbe78afc8
                        • Opcode Fuzzy Hash: 92dd3b2c2f793c393b7e0219ecafaa9cb71a2d7bf3485ff1f76b100a8df2b46a
                        • Instruction Fuzzy Hash: A1218070A002059FCB45EF78F451A5EBBE2EF85354B1086B9D0059B396EB719A0A8BD1
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e2ed559de438fd05a2c9ef382b5a4a2759980fab3af08ee33477bbe7aef9359f
                        • Instruction ID: b960772513e9e1ce89c315230f9451de32ffe65009b4d0c8e570102d6ff3c2c9
                        • Opcode Fuzzy Hash: e2ed559de438fd05a2c9ef382b5a4a2759980fab3af08ee33477bbe7aef9359f
                        • Instruction Fuzzy Hash: 44210A316412158FCB389B38F89466EB7E2EBC8354B5048BED10AE3391DF319C85DB51
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4150ecb0cdcbdfe4c6c5ba936c924f24c68abaa5f55fdc094b55c7497dd31d72
                        • Instruction ID: 02c162f43c748fe7f7e92e8811063a74fac21e5b24e77aac00386f241172bebe
                        • Opcode Fuzzy Hash: 4150ecb0cdcbdfe4c6c5ba936c924f24c68abaa5f55fdc094b55c7497dd31d72
                        • Instruction Fuzzy Hash: 3C11D6316412158FCB38AB28F89466EB7E6EBC4354B5048BED10AE3395EF31DC859B91
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 63f33d85ef58d709015b37d89b87d00d1e13163d371e54115608702af23bb959
                        • Instruction ID: 740d2c3f5062c038aef858d93c2ba955af02f05b5f6136a8015f7fb60c46de16
                        • Opcode Fuzzy Hash: 63f33d85ef58d709015b37d89b87d00d1e13163d371e54115608702af23bb959
                        • Instruction Fuzzy Hash: 7D21AE70A002059FCB45FF78F411A5EBBE1EF81354B2086B9D0059B39AEB719A0ACBD1
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8d59b9155c15a3df48a61bce1a3589cf09b304d632bea16d32f73a13fc57f109
                        • Instruction ID: 3feb7f45f1ace5b8a945d171840c1ace73df85e18161ca67160df52097eb8736
                        • Opcode Fuzzy Hash: 8d59b9155c15a3df48a61bce1a3589cf09b304d632bea16d32f73a13fc57f109
                        • Instruction Fuzzy Hash: D211E574B01201DFCB10EB78E9445AA7BF6EF8834075444B9D007DB364EA38DC02CB90
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156001493.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_dcd000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                        • Instruction ID: f971afe59173aec176def84970c1e6bd215d87507e47c65b831e6bd71a96955d
                        • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                        • Instruction Fuzzy Hash: 6E11D376504241CFDB16CF14D9C4B16BF72FB94324F28C5ADD9090B256C336D85ACBA2
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 152b9aaee70dfa1223468481adc526fce733080bdd933a847483e35e516e7b42
                        • Instruction ID: 7a2d08ef73af96c4bf07925a422d42eacf2fc475d8f0ec82a5379523048b4d4a
                        • Opcode Fuzzy Hash: 152b9aaee70dfa1223468481adc526fce733080bdd933a847483e35e516e7b42
                        • Instruction Fuzzy Hash: 6B115E757056028FD319DF69FA50615FBE6FFD6314309C2AAD508DB35ADA70E801C7A0
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6e25b109086d922440da204caa16f3fcbf4132782d57325f6d94ddb91b9cbf2a
                        • Instruction ID: 383594138eeebae2452ffc61239eaf4d745938018fa795e03f1bc252d2f1bac3
                        • Opcode Fuzzy Hash: 6e25b109086d922440da204caa16f3fcbf4132782d57325f6d94ddb91b9cbf2a
                        • Instruction Fuzzy Hash: 0211A170B002059FCB55EBB9E90466A7BE6AFC834071448B9D40BDB368EA35DC41CB90
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2e29e77d15f6f3c38d225b35c57970f40875bba62d9f025208733507c11ca974
                        • Instruction ID: f4867eaad4ada2ae1638b957daa4226e166f0c017e42e4bed2d09db38a0a20b9
                        • Opcode Fuzzy Hash: 2e29e77d15f6f3c38d225b35c57970f40875bba62d9f025208733507c11ca974
                        • Instruction Fuzzy Hash: C401F2353042004BCB29BB39A960A2E77E79FCA398704543EF00ADB395CF35DC0587A1
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4749b9b9825a9ea9d713f5563381b5afe578785f4e67ce44fe1468ea840f0d1e
                        • Instruction ID: f182096f0ced15acea8d0d6fa9a2be21d1b5d93ad7156679687b37c0f36eb235
                        • Opcode Fuzzy Hash: 4749b9b9825a9ea9d713f5563381b5afe578785f4e67ce44fe1468ea840f0d1e
                        • Instruction Fuzzy Hash: 52117C35E405059FDB10CF69E981799B7B1BB843A4F2890A9C802BB365EB31D909CFA5
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b12159dfcf89e5ed950298abc05f845ae63e0b7620417e1db985e428f520f866
                        • Instruction ID: 005c1da8cced5d2807aadc7e64b261d531cf40e0bb9e510c4173283d4a12ab09
                        • Opcode Fuzzy Hash: b12159dfcf89e5ed950298abc05f845ae63e0b7620417e1db985e428f520f866
                        • Instruction Fuzzy Hash: 521133B58012488FCB20CF99D585BDEBFF4EB49324F248469C468B7350C375A940CFA2
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4897c5ba876177d23ef99afe4f73b870e945baf4e64293b44b4eea5de317e7b7
                        • Instruction ID: a504c43b2aeec9bd77e9c456e70cb5032d18600c65f6f7f29585abf86c0a1c7a
                        • Opcode Fuzzy Hash: 4897c5ba876177d23ef99afe4f73b870e945baf4e64293b44b4eea5de317e7b7
                        • Instruction Fuzzy Hash: D1111EB58002488FCB20DF9AD484BDEBFF4EB49324F208469D458B7350C378A984CFA5
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 61bb8df27d82b15cd1ab1af2a12ead4021c0e2c2c3814b171378e7a57e59a5cf
                        • Instruction ID: 451940c20f05caa92e2e606c7428a4508ef8875d283658487fab8b7aa4eec6c5
                        • Opcode Fuzzy Hash: 61bb8df27d82b15cd1ab1af2a12ead4021c0e2c2c3814b171378e7a57e59a5cf
                        • Instruction Fuzzy Hash: 8D01A43494170ACFC705FBB8FA5965DBB75EF81304B008666C446A739CEB745504CBA5
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 747505446bba8e2a47f77f641a54ac5e0d9cde61b3bc0727510aa64f027f74a3
                        • Instruction ID: 3ea0f5afc2b172afb037149cff08d1388e4bfd5a186f50d512b1770623060b79
                        • Opcode Fuzzy Hash: 747505446bba8e2a47f77f641a54ac5e0d9cde61b3bc0727510aa64f027f74a3
                        • Instruction Fuzzy Hash: EFF02830C45745CFD302EBB8E95566CBB70EF82344F1447AAC446B7399EB344508C756
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6ef5f6fe794885a0f76dbb7ec3981fc79c4511a623e4c5fb5d9ceca448e0e45d
                        • Instruction ID: 6da5ad7717d5dcfb2cd284e2b97e00277d6f227494778c0bc3c6e0a379ce1956
                        • Opcode Fuzzy Hash: 6ef5f6fe794885a0f76dbb7ec3981fc79c4511a623e4c5fb5d9ceca448e0e45d
                        • Instruction Fuzzy Hash: DFF0A775EC42458FD7109B10E4657B87F70AF12394F1D20A6E411F76A3C6258D45DF23
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 361788924e72f67cb17ea28e1578101fd2ec6b912fd36e6c7293dde804dbbbaa
                        • Instruction ID: f41a554890efeedfe3ff77243afff327b3cf7d9510e9b183755937b0aecd4951
                        • Opcode Fuzzy Hash: 361788924e72f67cb17ea28e1578101fd2ec6b912fd36e6c7293dde804dbbbaa
                        • Instruction Fuzzy Hash: FCE0D822B446946FD70597B9A40995D3FE9EF8B21475A80EEE044CB2A3DE28DC0893A5
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 69e96e83829ea480bba2c6daf60de1bf0e517f4b64e7a652dd254eabb8ddd4d5
                        • Instruction ID: ee2a9ca15a1ab6db4346207578f41354d9a14852f5817a24659abccb517e6a0d
                        • Opcode Fuzzy Hash: 69e96e83829ea480bba2c6daf60de1bf0e517f4b64e7a652dd254eabb8ddd4d5
                        • Instruction Fuzzy Hash: C8E08C323012005F8744977EA88485AB7EAEFC8120314047AE10ACB325CE64DC014690
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 046a099aa4a7531c4eb53b57c5219d10a818a2de6b5d123dcf7282e4d8fd88de
                        • Instruction ID: 1c612998a9f7e98ef39654c07a26e0a898fcb41d7fc66a612a46fb6144f4db74
                        • Opcode Fuzzy Hash: 046a099aa4a7531c4eb53b57c5219d10a818a2de6b5d123dcf7282e4d8fd88de
                        • Instruction Fuzzy Hash: 0AF0E575906285DFCF01CFB8EA5198DBF75EB0A30470285EBD448DB292D7705A09DB51
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: adcdc2a496a309459c30fbb127e4d1c781e63a261dc7a39da984ae9cd2255c66
                        • Instruction ID: 1d0c732cf689586923911b421a54585def4257036ea83c3fd62eb6ce665d52f0
                        • Opcode Fuzzy Hash: adcdc2a496a309459c30fbb127e4d1c781e63a261dc7a39da984ae9cd2255c66
                        • Instruction Fuzzy Hash: 92E07D300C8FC00FE713AB98FD123603F689B01304F4861FA85044B2BF9EA6AC4843B9
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 137269de7309ea3255bb76d341c73798993b18b055d4f150ff678168c60855b0
                        • Instruction ID: 1ff7abd4137dc864ca03206303c20cca45cc2d2898caaf350b2c4666a591dbcb
                        • Opcode Fuzzy Hash: 137269de7309ea3255bb76d341c73798993b18b055d4f150ff678168c60855b0
                        • Instruction Fuzzy Hash: C5D05E37B4D48487DB348679AC52B99B364FF61398B9858AAD806EB752E2628C0B8510
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4020c81bbfad631b3cdf72b16a8abb7036845d25af7591198155b6eb7979aed6
                        • Instruction ID: 4c964486d372eb4a12d5c30701e5eb016081b47925e0b44b9fd5c2104d38fe10
                        • Opcode Fuzzy Hash: 4020c81bbfad631b3cdf72b16a8abb7036845d25af7591198155b6eb7979aed6
                        • Instruction Fuzzy Hash: DFD01270911108EFCF40DFA8F95195DBBB9EB44300B1085A9D408D7340DB719F049B51
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2c48a5c2489477f2bc370d1586672b8db6c8b04f458557569874e9c4053d5564
                        • Instruction ID: bf8f9a219c6fa71370b55579725eca9185b18a628cfd65ae95ae680ac3b1b6fd
                        • Opcode Fuzzy Hash: 2c48a5c2489477f2bc370d1586672b8db6c8b04f458557569874e9c4053d5564
                        • Instruction Fuzzy Hash: B9D0C7792966448FC301DB55E9D5C817F78FF5B60134700D5E4408B673C664E809D771
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2a03fef35ddd87478ce84232a45a62f559526d75e995daf26914f009c03e5979
                        • Instruction ID: 697b6a057b2e315a0592973acf5196f5e03d1b2823dd31579bf2ceb52d26d7c7
                        • Opcode Fuzzy Hash: 2a03fef35ddd87478ce84232a45a62f559526d75e995daf26914f009c03e5979
                        • Instruction Fuzzy Hash: 02D012301547494FDA12F768FB117A67B999B90700F84427981094B3BD9FB9B84942F6
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 43dcf6a4309c6c597c98923311941b369cbe3eafed875de66002f3a9e3455124
                        • Instruction ID: 1cb0cfb49b5833ad2740efbc228614519c34aac80afc03523191b1af46009eec
                        • Opcode Fuzzy Hash: 43dcf6a4309c6c597c98923311941b369cbe3eafed875de66002f3a9e3455124
                        • Instruction Fuzzy Hash: 5ED052A6E4E6808FD3228B74AC24148BB20FE173543E900C2C0009B216E660083C9730
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cda3e98b823d90dd5e7a2b13b404683a2f897bc64d8dea06a7135ee64823ef6e
                        • Instruction ID: 7e4e5b37a9e45d9937f7c81dc69218d1a4be5b2ca1b89085cbdfa8bec1618d73
                        • Opcode Fuzzy Hash: cda3e98b823d90dd5e7a2b13b404683a2f897bc64d8dea06a7135ee64823ef6e
                        • Instruction Fuzzy Hash: 64C08020085364CFD70427F8FA0C36D3B10975134DF306052D042915744D7404C48633
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 268a8aa1eaf96fb50f8f11cc6f6c7127b206f706a16557426c0b924cd6bab2ab
                        • Instruction ID: a41033ea629873d4ffb0653b0207aefb83cf88459f016ba2e5cfb46c2966e75f
                        • Opcode Fuzzy Hash: 268a8aa1eaf96fb50f8f11cc6f6c7127b206f706a16557426c0b924cd6bab2ab
                        • Instruction Fuzzy Hash: E8C08C20086768CFDB182BF8FA0C36D3B20D7A134EF30A157E002A06788E7408C98A33
                        Memory Dump Source
                        • Source File: 00000003.00000002.4156170780.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_e60000_RegSvcs.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fa04653dbe62da109dfb02de880a80e3cebe9dbaf6362b8e5ab0ad98ee73bc9f
                        • Instruction ID: 8a063184521f54400bccece73e2a80167fdaa56c08fe7987ec9ed54e1befde38
                        • Opcode Fuzzy Hash: fa04653dbe62da109dfb02de880a80e3cebe9dbaf6362b8e5ab0ad98ee73bc9f
                        • Instruction Fuzzy Hash: 47C048392606088F8244EA99E698C12B7A8BF68A003414099E9058B722CB61F810DA61