Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8n26gvrXUM.exe

Overview

General Information

Sample name:8n26gvrXUM.exe
renamed because original name is a hash value
Original sample name:c6f9f0ec394a72fb302efbcf74da2ea7.exe
Analysis ID:1583336
MD5:c6f9f0ec394a72fb302efbcf74da2ea7
SHA1:143c8fe025fbfd0afe9c88003315bc5a4720439a
SHA256:0a63068ec9d94fef476d9e906fb4920de32e70b77daa24a8b2a0786f23889a1a
Tags:exeuser-abuse_ch
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell launch regsvr32
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
.NET source code contains very large array initializations
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Loading BitLocker PowerShell Module
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Sets debug register (to hijack the execution of another thread)
Sigma detected: Potentially Suspicious Child Process Of Regsvr32
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Uses Register-ScheduledTask to add task schedules
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries keyboard layouts
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Network Connection Initiated By Regsvr32.EXE
Sigma detected: Potential Regsvr32 Commandline Flag Anomaly
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • 8n26gvrXUM.exe (PID: 1948 cmdline: "C:\Users\user\Desktop\8n26gvrXUM.exe" MD5: C6F9F0EC394A72FB302EFBCF74DA2EA7)
    • 8n26gvrXUM.tmp (PID: 6664 cmdline: "C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmp" /SL5="$203E2,1083099,161792,C:\Users\user\Desktop\8n26gvrXUM.exe" MD5: BCC236A3921E1388596A42B05686FF5E)
      • cmd.exe (PID: 4156 cmdline: "cmd.exe" /C timeout /T 3 & "C:\Users\user\Desktop\8n26gvrXUM.exe" /VERYSILENT /SUPPRESSMSGBOXES MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 2356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • timeout.exe (PID: 3428 cmdline: timeout /T 3 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
        • 8n26gvrXUM.exe (PID: 1584 cmdline: "C:\Users\user\Desktop\8n26gvrXUM.exe" /VERYSILENT /SUPPRESSMSGBOXES MD5: C6F9F0EC394A72FB302EFBCF74DA2EA7)
          • 8n26gvrXUM.tmp (PID: 2548 cmdline: "C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp" /SL5="$30426,1083099,161792,C:\Users\user\Desktop\8n26gvrXUM.exe" /VERYSILENT /SUPPRESSMSGBOXES MD5: BCC236A3921E1388596A42B05686FF5E)
            • regsvr32.exe (PID: 1664 cmdline: "regsvr32.exe" /s /i:SYNC "C:\Users\user\AppData\Roaming\\netapi32_1.drv" MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
              • regsvr32.exe (PID: 796 cmdline: /s /i:SYNC "C:\Users\user\AppData\Roaming\\netapi32_1.drv" MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
                • powershell.exe (PID: 6408 cmdline: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }" MD5: 04029E121A0CFA5991749937DD22A1D9)
                  • conhost.exe (PID: 3224 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • powershell.exe (PID: 6084 cmdline: "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{D26AEDB2-54A1-4069-8CFB-595FFA7EE9CA}' -Description 'MicrosoftEdgeUpdateTaskMachineUA' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest" MD5: 04029E121A0CFA5991749937DD22A1D9)
                  • conhost.exe (PID: 6524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • regsvr32.exe (PID: 2724 cmdline: C:\Windows\system32\regsvr32.EXE /S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
    • powershell.exe (PID: 5352 cmdline: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000002.3362190126.00000000032F8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Process Memory Space: regsvr32.exe PID: 796JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

      System Summary

      barindex
      Source: Process startedAuthor: elhoim, Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }", CommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: /s /i:SYNC "C:\Users\user\AppData\Roaming\\netapi32_1.drv", ParentImage: C:\Windows\System32\regsvr32.exe, ParentProcessId: 796, ParentProcessName: regsvr32.exe, ProcessCommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }", ProcessId: 6408, ProcessName: powershell.exe
      Source: Network ConnectionAuthor: Dmitriy Lifanov, oscd.community: Data: DestinationIp: 144.202.34.112, DestinationIsIpv6: false, DestinationPort: 56001, EventID: 3, Image: C:\Windows\System32\regsvr32.exe, Initiated: true, ProcessId: 796, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49952
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "regsvr32.exe" /s /i:SYNC "C:\Users\user\AppData\Roaming\\netapi32_1.drv", CommandLine: "regsvr32.exe" /s /i:SYNC "C:\Users\user\AppData\Roaming\\netapi32_1.drv", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp" /SL5="$30426,1083099,161792,C:\Users\user\Desktop\8n26gvrXUM.exe" /VERYSILENT /SUPPRESSMSGBOXES, ParentImage: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp, ParentProcessId: 2548, ParentProcessName: 8n26gvrXUM.tmp, ProcessCommandLine: "regsvr32.exe" /s /i:SYNC "C:\Users\user\AppData\Roaming\\netapi32_1.drv", ProcessId: 1664, ProcessName: regsvr32.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }", CommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: /s /i:SYNC "C:\Users\user\AppData\Roaming\\netapi32_1.drv", ParentImage: C:\Windows\System32\regsvr32.exe, ParentProcessId: 796, ParentProcessName: regsvr32.exe, ProcessCommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }", ProcessId: 6408, ProcessName: powershell.exe

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: Process startedAuthor: Joe Security: Data: Command: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }", CommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: /s /i:SYNC "C:\Users\user\AppData\Roaming\\netapi32_1.drv", ParentImage: C:\Windows\System32\regsvr32.exe, ParentProcessId: 796, ParentProcessName: regsvr32.exe, ProcessCommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }", ProcessId: 6408, ProcessName: powershell.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-02T13:54:49.264763+010020355951Domain Observed Used for C2 Detected144.202.34.11256001192.168.2.649952TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: C:\Users\user\AppData\Roaming\is-66O79.tmpReversingLabs: Detection: 43%
      Source: C:\Users\user\AppData\Roaming\netapi32_1.drv (copy)ReversingLabs: Detection: 43%
      Source: 8n26gvrXUM.exeReversingLabs: Detection: 50%
      Source: 8n26gvrXUM.exeVirustotal: Detection: 55%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA339A1B0 BCryptGenRandom,SystemFunction036,9_2_00007FFDA339A1B0
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA339A1B0 BCryptGenRandom,SystemFunction036,15_2_00007FFDA339A1B0
      Source: 8n26gvrXUM.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Grubby Farm_is1Jump to behavior
      Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: 8n26gvrXUM.tmp, 00000002.00000002.2158813120.0000000002443000.00000002.00000001.01000000.00000006.sdmp, 8n26gvrXUM.tmp, 00000002.00000003.2117453704.00000000031C0000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000003.2152811712.0000000003618000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.2.dr, _isdecmp.dll.7.dr

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 144.202.34.112:56001 -> 192.168.2.6:49952
      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 144.202.34.112 56001Jump to behavior
      Source: global trafficTCP traffic: 192.168.2.6:49952 -> 144.202.34.112:56001
      Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: unknownTCP traffic detected without corresponding DNS query: 144.202.34.112
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceCodeSigningCA-1.crt0
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
      Source: powershell.exe, 0000000A.00000002.2248762507.0000011CF9AEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://crl3.digicert.com/ha-cs-2011a.crl0.
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://crl4.digicert.com/ha-cs-2011a.crl0L
      Source: regsvr32.exe, 00000009.00000002.3361578425.0000000003160000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabK
      Source: regsvr32.exe, 00000009.00000002.3361578425.0000000003189000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enig
      Source: powershell.exe, 0000000A.00000002.2240229224.0000011CF15FF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2365576067.000001471006F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2561315614.00000254DB37F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://ocsp.digicert.com0A
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://ocsp.digicert.com0C
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://ocsp.digicert.com0I
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://ocsp.digicert.com0P
      Source: powershell.exe, 00000010.00000002.2407948865.00000254CB539000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://rb.symcb.com/rb.crl0W
      Source: 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://rb.symcb.com/rb.crt0
      Source: 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://rb.symcd.com0&
      Source: 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
      Source: 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://s.symcd.com0
      Source: 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://s.symcd.com06
      Source: powershell.exe, 0000000A.00000002.2207941559.0000011CE17B8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2279590786.0000014700228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2407948865.00000254CB539000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
      Source: regsvr32.exe, 00000009.00000002.3362190126.000000000371A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2207941559.0000011CE1591000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2279590786.0000014700001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2407948865.00000254CB311000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: powershell.exe, 0000000A.00000002.2207941559.0000011CE17B8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2279590786.0000014700228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2407948865.00000254CB539000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
      Source: 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
      Source: 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
      Source: 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
      Source: powershell.exe, 00000010.00000002.2407948865.00000254CB539000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
      Source: 8n26gvrXUM.exe, 00000000.00000003.2115407999.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.exe, 00000000.00000003.2115978874.000000007FD20000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000002.00000000.2116583250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, 8n26gvrXUM.tmp.0.dr, is-O7IBF.tmp.7.dr, 8n26gvrXUM.tmp.6.drString found in binary or memory: http://www.innosetup.com/
      Source: 8n26gvrXUM.exe, 00000000.00000003.2115407999.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.exe, 00000000.00000003.2115978874.000000007FD20000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000002.00000000.2116583250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, 8n26gvrXUM.tmp.0.dr, is-O7IBF.tmp.7.dr, 8n26gvrXUM.tmp.6.drString found in binary or memory: http://www.remobjects.com/ps
      Source: powershell.exe, 0000000A.00000002.2207941559.0000011CE1591000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2279590786.0000014700001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2407948865.00000254CB311000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
      Source: powershell.exe, 00000010.00000002.2407948865.00000254CB539000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
      Source: powershell.exe, 00000010.00000002.2561315614.00000254DB37F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000010.00000002.2561315614.00000254DB37F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000010.00000002.2561315614.00000254DB37F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: https://d.symcb.com/cps0%
      Source: is-66O79.tmp.7.drString found in binary or memory: https://d.symcb.com/rpa0
      Source: 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: https://d.symcb.com/rpa0.
      Source: 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: https://d.symcb.com/rpa06
      Source: regsvr32.exe, regsvr32.exe, 0000000F.00000002.2611799536.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmp, is-66O79.tmp.7.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
      Source: regsvr32.exe, 00000009.00000002.3362190126.00000000032F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/WebDriver.dll
      Source: regsvr32.exe, 00000009.00000002.3362190126.00000000032F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/chromedriver.exe
      Source: regsvr32.exe, 00000009.00000002.3362190126.00000000032F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/msedgedriver.exe
      Source: powershell.exe, 00000010.00000002.2407948865.00000254CB539000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 0000000A.00000002.2240229224.0000011CF15FF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2365576067.000001471006F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2561315614.00000254DB37F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
      Source: regsvr32.exe, 00000009.00000002.3362190126.00000000032F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
      Source: regsvr32.exe, 00000009.00000002.3362190126.00000000032F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
      Source: regsvr32.exe, 00000009.00000002.3362190126.00000000032F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354rCannot
      Source: 8n26gvrXUM.tmp, 00000007.00000003.2152811712.00000000035BE000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000002.2154045511.000000000018F000.00000004.00000010.00020000.00000000.sdmp, is-66O79.tmp.7.drString found in binary or memory: https://www.digicert.com/CPS0

      System Summary

      barindex
      Source: 9.2.regsvr32.exe.2d8131e.1.raw.unpack, KfF5HsZ6WWf1NQYJSA.csLarge array initialization: HcZdqQ5U4: array initializer size 305328
      Source: 9.2.regsvr32.exe.2f90000.2.raw.unpack, KfF5HsZ6WWf1NQYJSA.csLarge array initialization: HcZdqQ5U4: array initializer size 305328
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA338A040 memset,GetModuleHandleA,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,AddVectoredExceptionHandler,NtQueryInformationProcess,NtQuerySystemInformation,NtOpenThread,RtlFreeHeap,NtGetContextThread,NtTraceControl,NtSetContextThread,NtClose,9_2_00007FFDA338A040
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA338A040 memset,GetModuleHandleA,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,AddVectoredExceptionHandler,NtQueryInformationProcess,NtQuerySystemInformation,NtOpenThread,NtGetContextThread,NtSetContextThread,NtClose,15_2_00007FFDA338A040
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpCode function: 2_2_024412602_2_02441260
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpCode function: 2_2_02441D202_2_02441D20
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33820D09_2_00007FFDA33820D0
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33E09409_2_00007FFDA33E0940
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA338A0409_2_00007FFDA338A040
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33DEFF09_2_00007FFDA33DEFF0
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA342C3B09_2_00007FFDA342C3B0
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA34233909_2_00007FFDA3423390
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33DCB909_2_00007FFDA33DCB90
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA338B4309_2_00007FFDA338B430
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA3410BF09_2_00007FFDA3410BF0
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA34192A09_2_00007FFDA34192A0
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33E93209_2_00007FFDA33E9320
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33E5AF09_2_00007FFDA33E5AF0
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA340E9709_2_00007FFDA340E970
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33B61609_2_00007FFDA33B6160
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA342E9809_2_00007FFDA342E980
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA3386A509_2_00007FFDA3386A50
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33909E09_2_00007FFDA33909E0
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33890609_2_00007FFDA3389060
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33908809_2_00007FFDA3390880
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33D58909_2_00007FFDA33D5890
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33BFFE09_2_00007FFDA33BFFE0
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA338F7E09_2_00007FFDA338F7E0
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA34320009_2_00007FFDA3432000
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33A66609_2_00007FFDA33A6660
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33AC7409_2_00007FFDA33AC740
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33D87409_2_00007FFDA33D8740
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA3423DA09_2_00007FFDA3423DA0
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33A5DD09_2_00007FFDA33A5DD0
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA34326409_2_00007FFDA3432640
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33906509_2_00007FFDA3390650
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33D65409_2_00007FFDA33D6540
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_02DD22199_2_02DD2219
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_02DD34269_2_02DD3426
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD3435A5759_2_00007FFD3435A575
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD3435F74D9_2_00007FFD3435F74D
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD3435CEF39_2_00007FFD3435CEF3
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD34360F889_2_00007FFD34360F88
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD343530B99_2_00007FFD343530B9
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD3435217A9_2_00007FFD3435217A
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD3436D33F9_2_00007FFD3436D33F
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD3435D3C89_2_00007FFD3435D3C8
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD34352C489_2_00007FFD34352C48
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD3435A5BD9_2_00007FFD3435A5BD
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD3435A5D39_2_00007FFD3435A5D3
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD34362D959_2_00007FFD34362D95
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD343576439_2_00007FFD34357643
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD34359EB59_2_00007FFD34359EB5
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD34359E679_2_00007FFD34359E67
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD343566F29_2_00007FFD343566F2
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD3435F7BD9_2_00007FFD3435F7BD
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD343610059_2_00007FFD34361005
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD343530D09_2_00007FFD343530D0
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD343611FA9_2_00007FFD343611FA
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD3436DC019_2_00007FFD3436DC01
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD345200609_2_00007FFD34520060
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD345252C29_2_00007FFD345252C2
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD345259549_2_00007FFD34525954
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD34525E189_2_00007FFD34525E18
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD34529C4D9_2_00007FFD34529C4D
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD345270349_2_00007FFD34527034
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD345257FD9_2_00007FFD345257FD
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD345273E09_2_00007FFD345273E0
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD34525BE49_2_00007FFD34525BE4
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD3455308D9_2_00007FFD3455308D
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD3455851D9_2_00007FFD3455851D
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD3455000A9_2_00007FFD3455000A
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD34551E439_2_00007FFD34551E43
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD34526FA49_2_00007FFD34526FA4
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FFD343528FA10_2_00007FFD343528FA
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FFD343554FA10_2_00007FFD343554FA
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FFD34355DFA10_2_00007FFD34355DFA
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FFD34355EF210_2_00007FFD34355EF2
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FFD3435A36D10_2_00007FFD3435A36D
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FFD34354FFB10_2_00007FFD34354FFB
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFD343438DD12_2_00007FFD343438DD
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFD34348D1012_2_00007FFD34348D10
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFD3434D9BD12_2_00007FFD3434D9BD
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFD34344DFB12_2_00007FFD34344DFB
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFD34348AB512_2_00007FFD34348AB5
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFD3434B2D812_2_00007FFD3434B2D8
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFD3434BAFB12_2_00007FFD3434BAFB
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFD343466FB12_2_00007FFD343466FB
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFD34348BFA12_2_00007FFD34348BFA
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA33820D015_2_00007FFDA33820D0
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA33E094015_2_00007FFDA33E0940
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA33DEFF015_2_00007FFDA33DEFF0
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA342C3B015_2_00007FFDA342C3B0
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA342339015_2_00007FFDA3423390
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA33DCB9015_2_00007FFDA33DCB90
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA338B43015_2_00007FFDA338B430
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA3410BF015_2_00007FFDA3410BF0
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA34192A015_2_00007FFDA34192A0
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA33E932015_2_00007FFDA33E9320
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA33E5AF015_2_00007FFDA33E5AF0
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA340E97015_2_00007FFDA340E970
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA33B616015_2_00007FFDA33B6160
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA342E98015_2_00007FFDA342E980
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA3386A5015_2_00007FFDA3386A50
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA33909E015_2_00007FFDA33909E0
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA338906015_2_00007FFDA3389060
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA339088015_2_00007FFDA3390880
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA33D589015_2_00007FFDA33D5890
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA338A04015_2_00007FFDA338A040
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA33BFFE015_2_00007FFDA33BFFE0
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA338F7E015_2_00007FFDA338F7E0
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA343200015_2_00007FFDA3432000
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA33A666015_2_00007FFDA33A6660
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA33AC74015_2_00007FFDA33AC740
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA33D874015_2_00007FFDA33D8740
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA3423DA015_2_00007FFDA3423DA0
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA33A5DD015_2_00007FFDA33A5DD0
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA343264015_2_00007FFDA3432640
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA339065015_2_00007FFDA3390650
      Source: C:\Windows\System32\regsvr32.exeCode function: 15_2_00007FFDA33D654015_2_00007FFDA33D6540
      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFDA341C350 appears 40 times
      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFDA338FE90 appears 48 times
      Source: 8n26gvrXUM.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
      Source: 8n26gvrXUM.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
      Source: 8n26gvrXUM.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
      Source: 8n26gvrXUM.tmp.6.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
      Source: 8n26gvrXUM.tmp.6.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
      Source: is-O7IBF.tmp.7.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
      Source: is-O7IBF.tmp.7.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
      Source: is-66O79.tmp.7.drStatic PE information: Number of sections : 11 > 10
      Source: 8n26gvrXUM.exe, 00000000.00000003.2115978874.000000007FE33000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs 8n26gvrXUM.exe
      Source: 8n26gvrXUM.exe, 00000000.00000003.2115407999.0000000002507000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs 8n26gvrXUM.exe
      Source: 8n26gvrXUM.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
      Source: 9.2.regsvr32.exe.2d8131e.1.raw.unpack, KfF5HsZ6WWf1NQYJSA.csCryptographic APIs: 'CreateDecryptor'
      Source: 9.2.regsvr32.exe.2f90000.2.raw.unpack, KfF5HsZ6WWf1NQYJSA.csCryptographic APIs: 'CreateDecryptor'
      Source: classification engineClassification label: mal100.spyw.evad.winEXE@26/26@0/1
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA338B900 CreateToolhelp32Snapshot,memset,Process32FirstW,memcpy,memcpy,CloseHandle,GetCurrentProcessId,DebugActiveProcess,GetCurrentProcess,TerminateProcess,CloseHandle,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,DebugActiveProcess,GetCurrentProcess,TerminateProcess,9_2_00007FFDA338B900
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpFile created: C:\Users\user\AppData\Local\unins000.datJump to behavior
      Source: C:\Windows\System32\regsvr32.exeMutant created: \Sessions\1\BaseNamedObjects\GlamorousBath
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2356:120:WilError_03
      Source: C:\Windows\System32\regsvr32.exeMutant created: \Sessions\1\BaseNamedObjects\04cc3a8c0bf2
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6524:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3224:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5824:120:WilError_03
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeFile created: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmpJump to behavior
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
      Source: 8n26gvrXUM.exeReversingLabs: Detection: 50%
      Source: 8n26gvrXUM.exeVirustotal: Detection: 55%
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeFile read: C:\Users\user\Desktop\8n26gvrXUM.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\8n26gvrXUM.exe "C:\Users\user\Desktop\8n26gvrXUM.exe"
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeProcess created: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmp "C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmp" /SL5="$203E2,1083099,161792,C:\Users\user\Desktop\8n26gvrXUM.exe"
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C timeout /T 3 & "C:\Users\user\Desktop\8n26gvrXUM.exe" /VERYSILENT /SUPPRESSMSGBOXES
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /T 3
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\Desktop\8n26gvrXUM.exe "C:\Users\user\Desktop\8n26gvrXUM.exe" /VERYSILENT /SUPPRESSMSGBOXES
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeProcess created: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp "C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp" /SL5="$30426,1083099,161792,C:\Users\user\Desktop\8n26gvrXUM.exe" /VERYSILENT /SUPPRESSMSGBOXES
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "regsvr32.exe" /s /i:SYNC "C:\Users\user\AppData\Roaming\\netapi32_1.drv"
      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe /s /i:SYNC "C:\Users\user\AppData\Roaming\\netapi32_1.drv"
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }"
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{D26AEDB2-54A1-4069-8CFB-595FFA7EE9CA}' -Description 'MicrosoftEdgeUpdateTaskMachineUA' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.EXE /S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }"
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeProcess created: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmp "C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmp" /SL5="$203E2,1083099,161792,C:\Users\user\Desktop\8n26gvrXUM.exe" Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C timeout /T 3 & "C:\Users\user\Desktop\8n26gvrXUM.exe" /VERYSILENT /SUPPRESSMSGBOXESJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /T 3Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\Desktop\8n26gvrXUM.exe "C:\Users\user\Desktop\8n26gvrXUM.exe" /VERYSILENT /SUPPRESSMSGBOXESJump to behavior
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeProcess created: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp "C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp" /SL5="$30426,1083099,161792,C:\Users\user\Desktop\8n26gvrXUM.exe" /VERYSILENT /SUPPRESSMSGBOXESJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "regsvr32.exe" /s /i:SYNC "C:\Users\user\AppData\Roaming\\netapi32_1.drv"Jump to behavior
      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe /s /i:SYNC "C:\Users\user\AppData\Roaming\\netapi32_1.drv"Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }"Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{D26AEDB2-54A1-4069-8CFB-595FFA7EE9CA}' -Description 'MicrosoftEdgeUpdateTaskMachineUA' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }"
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpSection loaded: dwmapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: explorerframe.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: sfc.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\regsvr32.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
      Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dll
      Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dll
      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dll
      Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dll
      Source: C:\Windows\System32\regsvr32.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptbase.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpWindow found: window name: TMainFormJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Grubby Farm_is1Jump to behavior
      Source: 8n26gvrXUM.exeStatic file information: File size 1479422 > 1048576
      Source: Binary string: c:\zlib-dll\Release\isunzlib.pdb source: 8n26gvrXUM.tmp, 00000002.00000002.2158813120.0000000002443000.00000002.00000001.01000000.00000006.sdmp, 8n26gvrXUM.tmp, 00000002.00000003.2117453704.00000000031C0000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000007.00000003.2152811712.0000000003618000.00000004.00001000.00020000.00000000.sdmp, _isdecmp.dll.2.dr, _isdecmp.dll.7.dr

      Data Obfuscation

      barindex
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }"
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{D26AEDB2-54A1-4069-8CFB-595FFA7EE9CA}' -Description 'MicrosoftEdgeUpdateTaskMachineUA' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }"
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }"Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{D26AEDB2-54A1-4069-8CFB-595FFA7EE9CA}' -Description 'MicrosoftEdgeUpdateTaskMachineUA' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }"
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA338A040 memset,GetModuleHandleA,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,AddVectoredExceptionHandler,NtQueryInformationProcess,NtQuerySystemInformation,NtOpenThread,RtlFreeHeap,NtGetContextThread,NtTraceControl,NtSetContextThread,NtClose,9_2_00007FFDA338A040
      Source: _isdecmp.dll.2.drStatic PE information: real checksum: 0x0 should be: 0x5528
      Source: is-O7IBF.tmp.7.drStatic PE information: real checksum: 0x0 should be: 0x131baa
      Source: _isdecmp.dll.7.drStatic PE information: real checksum: 0x0 should be: 0x5528
      Source: is-66O79.tmp.7.drStatic PE information: real checksum: 0x55cb should be: 0x1af86a
      Source: 8n26gvrXUM.exeStatic PE information: real checksum: 0x0 should be: 0x171e8d
      Source: _setup64.tmp.2.drStatic PE information: real checksum: 0x0 should be: 0x8546
      Source: 8n26gvrXUM.tmp.6.drStatic PE information: real checksum: 0x0 should be: 0x122532
      Source: _setup64.tmp.7.drStatic PE information: real checksum: 0x0 should be: 0x8546
      Source: 8n26gvrXUM.tmp.0.drStatic PE information: real checksum: 0x0 should be: 0x122532
      Source: is-66O79.tmp.7.drStatic PE information: section name: .xdata
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_02D81E2C push ds; iretd 9_2_02D81E32
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_02D81DCA push ds; iretd 9_2_02D81E32
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD34353E15 push ebx; retn 000Dh9_2_00007FFD34353E2A
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD3435C194 push eax; ret 9_2_00007FFD3435C1AC
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD34526998 pushad ; retf 9_2_00007FFD34526999
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FFD3423D2A5 pushad ; iretd 10_2_00007FFD3423D2A6
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FFD3435792B push ebx; retf 10_2_00007FFD3435796A
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFD3422D2A5 pushad ; iretd 12_2_00007FFD3422D2A6
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFD343480CB push ebx; ret 12_2_00007FFD3434816A
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFD3434AFF2 push eax; ret 12_2_00007FFD3434B029
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFD34416DCB push ecx; iretd 12_2_00007FFD34416DCC
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpFile created: C:\Users\user\AppData\Local\Temp\is-EVB2V.tmp\_isetup\_shfoldr.dllJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpFile created: C:\Users\user\AppData\Local\Temp\is-GLDSV.tmp\_isetup\_setup64.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpFile created: C:\Users\user\AppData\Local\Temp\is-GLDSV.tmp\_isetup\_shfoldr.dllJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpFile created: C:\Users\user\AppData\Roaming\netapi32_1.drv (copy)Jump to dropped file
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeFile created: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpJump to dropped file
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeFile created: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpFile created: C:\Users\user\AppData\Local\is-O7IBF.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpFile created: C:\Users\user\AppData\Local\unins000.exe (copy)Jump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpFile created: C:\Users\user\AppData\Local\Temp\is-GLDSV.tmp\_isetup\_isdecmp.dllJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpFile created: C:\Users\user\AppData\Roaming\is-66O79.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpFile created: C:\Users\user\AppData\Local\Temp\is-EVB2V.tmp\_isetup\_isdecmp.dllJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpFile created: C:\Users\user\AppData\Local\Temp\is-EVB2V.tmp\_isetup\_setup64.tmpJump to dropped file

      Boot Survival

      barindex
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{D26AEDB2-54A1-4069-8CFB-595FFA7EE9CA}' -Description 'MicrosoftEdgeUpdateTaskMachineUA' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\8n26gvrXUM.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
      Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
      Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
      Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
      Source: regsvr32.exe, 0000000F.00000002.2611113584.000000000063B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAG.EXE
      Source: regsvr32.exe, 0000000F.00000002.2611113584.000000000063B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE
      Source: regsvr32.exe, 0000000F.00000002.2611113584.000000000063B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X64DBG.EXE
      Source: regsvr32.exe, 0000000F.00000002.2611113584.000000000063B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDBG.EXES{
      Source: regsvr32.exe, 0000000F.00000002.2611113584.000000000063B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAQ.EXE
      Source: regsvr32.exe, 0000000F.00000002.2611113584.000000000063B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SYSANALYZER.EXE
      Source: C:\Windows\System32\regsvr32.exeMemory allocated: 2D60000 memory reserve | memory write watchJump to behavior
      Source: C:\Windows\System32\regsvr32.exeMemory allocated: 1B2D0000 memory reserve | memory write watchJump to behavior
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD34520060 rdtsc 9_2_00007FFD34520060
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA338B900 CreateToolhelp32Snapshot,memset,Process32FirstW,memcpy,memcpy,CloseHandle,GetCurrentProcessId,DebugActiveProcess,GetCurrentProcess,TerminateProcess,CloseHandle,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,DebugActiveProcess,GetCurrentProcess,TerminateProcess,9_2_00007FFDA338B900
      Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\System32\regsvr32.exeWindow / User API: threadDelayed 3403Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeWindow / User API: threadDelayed 6329Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5928Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3881Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5973
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3745
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7067
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2539
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-EVB2V.tmp\_isetup\_shfoldr.dllJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-GLDSV.tmp\_isetup\_setup64.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-GLDSV.tmp\_isetup\_shfoldr.dllJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\netapi32_1.drv (copy)Jump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\is-O7IBF.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\unins000.exe (copy)Jump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-GLDSV.tmp\_isetup\_isdecmp.dllJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\is-66O79.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-EVB2V.tmp\_isetup\_isdecmp.dllJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-EVB2V.tmp\_isetup\_setup64.tmpJump to dropped file
      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 7.0 %
      Source: C:\Windows\System32\regsvr32.exe TID: 2032Thread sleep time: -24903104499507879s >= -30000sJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2032Thread sleep time: -31000s >= -30000sJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2032Thread sleep time: -30891s >= -30000sJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 7080Thread sleep count: 3403 > 30Jump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 7080Thread sleep count: 6329 > 30Jump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2032Thread sleep time: -30781s >= -30000sJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2032Thread sleep time: -30671s >= -30000sJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2032Thread sleep time: -30562s >= -30000sJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2032Thread sleep time: -30453s >= -30000sJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2032Thread sleep time: -30343s >= -30000sJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2032Thread sleep time: -30234s >= -30000sJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2032Thread sleep time: -30125s >= -30000sJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2032Thread sleep time: -30016s >= -30000sJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6072Thread sleep count: 5928 > 30Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6120Thread sleep count: 3881 > 30Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6964Thread sleep time: -6456360425798339s >= -30000sJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3352Thread sleep count: 5973 > 30
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1864Thread sleep count: 3745 > 30
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 432Thread sleep time: -6456360425798339s >= -30000s
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2488Thread sleep count: 7067 > 30
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3052Thread sleep count: 2539 > 30
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1268Thread sleep time: -4611686018427385s >= -30000s
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 31000Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 30891Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 30781Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 30671Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 30562Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 30453Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 30343Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 30234Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 30125Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeThread delayed: delay time: 30016Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
      Source: powershell.exe, 00000010.00000002.2407948865.00000254CB539000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
      Source: regsvr32.exe, 00000009.00000002.3361578425.0000000003189000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllnR*
      Source: powershell.exe, 00000010.00000002.2407948865.00000254CB539000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
      Source: regsvr32.exe, 00000009.00000002.3361578425.0000000003189000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW4
      Source: regsvr32.exe, 00000009.00000002.3364511246.000000001BD7A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
      Source: regsvr32.exe, 00000009.00000002.3364511246.000000001BD7A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_PhysicalMemoryPhysical Memory 0Win32_PhysicalMemoryPhysical MemoryPhysical MemoryPhysical MemoryRAM slot #0RAM slot #0VMware Virtual RAM00000001VMW-4096MB
      Source: powershell.exe, 00000010.00000002.2407948865.00000254CB539000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
      Source: C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmpProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFD34520060 rdtsc 9_2_00007FFD34520060
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA338B900 CreateToolhelp32Snapshot,memset,Process32FirstW,memcpy,memcpy,CloseHandle,GetCurrentProcessId,DebugActiveProcess,GetCurrentProcess,TerminateProcess,CloseHandle,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,DebugActiveProcess,GetCurrentProcess,TerminateProcess,9_2_00007FFDA338B900
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA338A040 memset,GetModuleHandleA,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,AddVectoredExceptionHandler,NtQueryInformationProcess,NtQuerySystemInformation,NtOpenThread,RtlFreeHeap,NtGetContextThread,NtTraceControl,NtSetContextThread,NtClose,9_2_00007FFDA338A040
      Source: C:\Windows\System32\regsvr32.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
      Source: C:\Windows\System32\regsvr32.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 144.202.34.112 56001Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeThread register set: 796 5Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /T 3Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\Desktop\8n26gvrXUM.exe "C:\Users\user\Desktop\8n26gvrXUM.exe" /VERYSILENT /SUPPRESSMSGBOXESJump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }"Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{D26AEDB2-54A1-4069-8CFB-595FFA7EE9CA}' -Description 'MicrosoftEdgeUpdateTaskMachineUA' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"Jump to behavior
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }"
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "register-scheduledtask -action (new-scheduledtaskaction -execute \"regsvr32\" -argument \"/s /i:sync c:\users\user\appdata\roaming\netapi32_1.drv\") -trigger (new-scheduledtasktrigger -once -at (get-date).addminutes(1) -repetitioninterval (new-timespan -minutes 1)) -taskname 'microsoftedgeupdatetaskmachineua{d26aedb2-54a1-4069-8cfb-595ffa7ee9ca}' -description 'microsoftedgeupdatetaskmachineua' -settings (new-scheduledtasksettingsset -allowstartifonbatteries -dontstopifgoingonbatteries -executiontimelimit 0) -runlevel highest"
      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "register-scheduledtask -action (new-scheduledtaskaction -execute \"regsvr32\" -argument \"/s /i:sync c:\users\user\appdata\roaming\netapi32_1.drv\") -trigger (new-scheduledtasktrigger -once -at (get-date).addminutes(1) -repetitioninterval (new-timespan -minutes 1)) -taskname 'microsoftedgeupdatetaskmachineua{d26aedb2-54a1-4069-8cfb-595ffa7ee9ca}' -description 'microsoftedgeupdatetaskmachineua' -settings (new-scheduledtasksettingsset -allowstartifonbatteries -dontstopifgoingonbatteries -executiontimelimit 0) -runlevel highest"Jump to behavior
      Source: regsvr32.exe, 00000009.00000002.3362190126.0000000003935000.00000004.00000800.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.3362190126.00000000038C3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: regsvr32.exe, 00000009.00000002.3362190126.0000000003935000.00000004.00000800.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.3362190126.00000000038C3000.00000004.00000800.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.3362190126.00000000034A6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager*
      Source: regsvr32.exe, 00000009.00000002.3362190126.0000000003935000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00007FFDA33DEFF0 GetCurrentProcessId,ProcessPrng,CreateNamedPipeW,GetLastError,CloseHandle,CloseHandle,ReadFileEx,SleepEx,GetLastError,9_2_00007FFDA33DEFF0
      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: regsvr32.exe, 00000009.00000002.3361578425.0000000003239000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
      Source: regsvr32.exe, 00000009.00000002.3361578425.0000000003239000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dows Defender\MsMpeng.exe
      Source: regsvr32.exe, 0000000F.00000002.2611113584.000000000063B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ollydbg.exe
      Source: C:\Windows\System32\regsvr32.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct

      Stealing of Sensitive Information

      barindex
      Source: regsvr32.exe, 00000009.00000002.3362190126.00000000037EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Electrum
      Source: regsvr32.exe, 00000009.00000002.3362190126.00000000037EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: com.liberty.jaxx
      Source: regsvr32.exe, 00000009.00000002.3362190126.00000000037EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 6C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
      Source: regsvr32.exe, 00000009.00000002.3362190126.00000000037EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 3C:\Users\user\AppData\Roaming\Ethereum\keystore
      Source: regsvr32.exe, 00000009.00000002.3362190126.00000000037EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus
      Source: regsvr32.exe, 00000009.00000002.3362190126.00000000037EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum
      Source: regsvr32.exe, 00000009.00000002.3362190126.00000000037EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: keystore
      Source: C:\Windows\System32\regsvr32.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-QtJump to behavior
      Source: Yara matchFile source: 00000009.00000002.3362190126.00000000032F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 796, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts321
      Windows Management Instrumentation
      1
      Windows Service
      1
      Windows Service
      1
      Masquerading
      OS Credential Dumping651
      Security Software Discovery
      Remote Services11
      Archive Collected Data
      2
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      Command and Scripting Interpreter
      1
      Scheduled Task/Job
      213
      Process Injection
      1
      Disable or Modify Tools
      LSASS Memory341
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol1
      Data from Local System
      1
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts1
      Scheduled Task/Job
      1
      DLL Side-Loading
      1
      Scheduled Task/Job
      341
      Virtualization/Sandbox Evasion
      Security Account Manager3
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal Accounts1
      Native API
      Login Hook1
      DLL Side-Loading
      213
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud Accounts1
      PowerShell
      Network Logon ScriptNetwork Logon Script11
      Deobfuscate/Decode Files or Information
      LSA Secrets2
      System Owner/User Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
      Obfuscated Files or Information
      Cached Domain Credentials223
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1583336 Sample: 8n26gvrXUM.exe Startdate: 02/01/2025 Architecture: WINDOWS Score: 100 78 Suricata IDS alerts for network traffic 2->78 80 Multi AV Scanner detection for dropped file 2->80 82 Multi AV Scanner detection for submitted file 2->82 84 4 other signatures 2->84 13 8n26gvrXUM.exe 2 2->13         started        16 regsvr32.exe 2->16         started        process3 file4 68 C:\Users\user\AppData\...\8n26gvrXUM.tmp, PE32 13->68 dropped 19 8n26gvrXUM.tmp 3 5 13->19         started        74 Suspicious powershell command line found 16->74 76 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 16->76 22 powershell.exe 16->22         started        signatures5 process6 file7 54 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 19->54 dropped 56 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 19->56 dropped 58 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 19->58 dropped 25 cmd.exe 1 19->25         started        86 Loading BitLocker PowerShell Module 22->86 27 conhost.exe 22->27         started        signatures8 process9 process10 29 8n26gvrXUM.exe 2 25->29         started        32 conhost.exe 25->32         started        34 timeout.exe 1 25->34         started        file11 70 C:\Users\user\AppData\...\8n26gvrXUM.tmp, PE32 29->70 dropped 36 8n26gvrXUM.tmp 19 8 29->36         started        process12 file13 60 C:\Users\user\...\netapi32_1.drv (copy), PE32+ 36->60 dropped 62 C:\Users\user\AppData\Roaming\is-66O79.tmp, PE32+ 36->62 dropped 64 C:\Users\user\AppData\...\unins000.exe (copy), PE32 36->64 dropped 66 4 other files (none is malicious) 36->66 dropped 39 regsvr32.exe 36->39         started        process14 process15 41 regsvr32.exe 2 39->41         started        dnsIp16 72 144.202.34.112, 49952, 56001 AS-CHOOPAUS United States 41->72 88 System process connects to network (likely due to code injection or exploit) 41->88 90 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 41->90 92 Suspicious powershell command line found 41->92 94 7 other signatures 41->94 45 powershell.exe 37 41->45         started        48 powershell.exe 41->48         started        signatures17 process18 signatures19 96 Loading BitLocker PowerShell Module 45->96 50 conhost.exe 45->50         started        52 conhost.exe 48->52         started        process20

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      8n26gvrXUM.exe50%ReversingLabsWin32.Spyware.Lummastealer
      8n26gvrXUM.exe56%VirustotalBrowse
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\is-EVB2V.tmp\_isetup\_isdecmp.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\is-EVB2V.tmp\_isetup\_isdecmp.dll1%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\is-EVB2V.tmp\_isetup\_setup64.tmp0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\is-EVB2V.tmp\_isetup\_setup64.tmp0%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\is-EVB2V.tmp\_isetup\_shfoldr.dll0%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\is-EVB2V.tmp\_isetup\_shfoldr.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\is-GLDSV.tmp\_isetup\_isdecmp.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\is-GLDSV.tmp\_isetup\_setup64.tmp0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\is-GLDSV.tmp\_isetup\_shfoldr.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmp3%ReversingLabs
      C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp3%ReversingLabs
      C:\Users\user\AppData\Local\is-O7IBF.tmp3%ReversingLabs
      C:\Users\user\AppData\Local\unins000.exe (copy)3%ReversingLabs
      C:\Users\user\AppData\Roaming\is-66O79.tmp43%ReversingLabsWin64.Packed.Generic
      C:\Users\user\AppData\Roaming\netapi32_1.drv (copy)43%ReversingLabsWin64.Packed.Generic
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.innosetup.com/8n26gvrXUM.exe, 00000000.00000003.2115407999.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.exe, 00000000.00000003.2115978874.000000007FD20000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000002.00000000.2116583250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, 8n26gvrXUM.tmp.0.dr, is-O7IBF.tmp.7.dr, 8n26gvrXUM.tmp.6.drfalse
        high
        http://nuget.org/NuGet.exepowershell.exe, 0000000A.00000002.2240229224.0000011CF15FF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2365576067.000001471006F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2561315614.00000254DB37F000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000010.00000002.2407948865.00000254CB539000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://crl.mpowershell.exe, 0000000A.00000002.2248762507.0000011CF9AEF000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://stackoverflow.com/q/14436606/23354regsvr32.exe, 00000009.00000002.3362190126.00000000032F8000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000010.00000002.2407948865.00000254CB539000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 0000000A.00000002.2207941559.0000011CE17B8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2279590786.0000014700228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2407948865.00000254CB539000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://github.com/DFfe9ewf/test3/raw/refs/heads/main/WebDriver.dllregsvr32.exe, 00000009.00000002.3362190126.00000000032F8000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000010.00000002.2407948865.00000254CB539000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://stackoverflow.com/q/2152978/23354rCannotregsvr32.exe, 00000009.00000002.3362190126.00000000032F8000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://stackoverflow.com/q/11564914/23354;regsvr32.exe, 00000009.00000002.3362190126.00000000032F8000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://github.com/DFfe9ewf/test3/raw/refs/heads/main/chromedriver.exeregsvr32.exe, 00000009.00000002.3362190126.00000000032F8000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/wsdl/powershell.exe, 0000000A.00000002.2207941559.0000011CE17B8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2279590786.0000014700228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2407948865.00000254CB539000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://contoso.com/powershell.exe, 00000010.00000002.2561315614.00000254DB37F000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://github.com/DFfe9ewf/test3/raw/refs/heads/main/msedgedriver.exeregsvr32.exe, 00000009.00000002.3362190126.00000000032F8000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://nuget.org/nuget.exepowershell.exe, 0000000A.00000002.2240229224.0000011CF15FF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2365576067.000001471006F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2561315614.00000254DB37F000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://contoso.com/Licensepowershell.exe, 00000010.00000002.2561315614.00000254DB37F000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://contoso.com/Iconpowershell.exe, 00000010.00000002.2561315614.00000254DB37F000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://docs.rs/getrandom#nodejs-es-module-supportregsvr32.exe, regsvr32.exe, 0000000F.00000002.2611799536.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmp, is-66O79.tmp.7.drfalse
                                            high
                                            https://aka.ms/pscore68powershell.exe, 0000000A.00000002.2207941559.0000011CE1591000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2279590786.0000014700001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2407948865.00000254CB311000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.remobjects.com/ps8n26gvrXUM.exe, 00000000.00000003.2115407999.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.exe, 00000000.00000003.2115978874.000000007FD20000.00000004.00001000.00020000.00000000.sdmp, 8n26gvrXUM.tmp, 00000002.00000000.2116583250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, 8n26gvrXUM.tmp.0.dr, is-O7IBF.tmp.7.dr, 8n26gvrXUM.tmp.6.drfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameregsvr32.exe, 00000009.00000002.3362190126.000000000371A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2207941559.0000011CE1591000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2279590786.0000014700001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2407948865.00000254CB311000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://github.com/Pester/Pesterpowershell.exe, 00000010.00000002.2407948865.00000254CB539000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    144.202.34.112
                                                    unknownUnited States
                                                    20473AS-CHOOPAUStrue
                                                    Joe Sandbox version:41.0.0 Charoite
                                                    Analysis ID:1583336
                                                    Start date and time:2025-01-02 13:53:09 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 8m 24s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:21
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:8n26gvrXUM.exe
                                                    renamed because original name is a hash value
                                                    Original Sample Name:c6f9f0ec394a72fb302efbcf74da2ea7.exe
                                                    Detection:MAL
                                                    Classification:mal100.spyw.evad.winEXE@26/26@0/1
                                                    EGA Information:
                                                    • Successful, ratio: 40%
                                                    HCA Information:
                                                    • Successful, ratio: 67%
                                                    • Number of executed functions: 177
                                                    • Number of non-executed functions: 2
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .exe
                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                    • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56
                                                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                    • Execution Graph export aborted for target 8n26gvrXUM.tmp, PID 6664 because there are no executed function
                                                    • Execution Graph export aborted for target powershell.exe, PID 6084 because it is empty
                                                    • Execution Graph export aborted for target powershell.exe, PID 6408 because it is empty
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                    • Report size getting too big, too many NtCreateKey calls found.
                                                    • Report size getting too big, too many NtOpenFile calls found.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                    TimeTypeDescription
                                                    07:54:05API Interceptor71x Sleep call for process: powershell.exe modified
                                                    07:54:48API Interceptor63414x Sleep call for process: regsvr32.exe modified
                                                    13:54:16Task SchedulerRun new task: MicrosoftEdgeUpdateTaskMachineUA{D26AEDB2-54A1-4069-8CFB-595FFA7EE9CA} path: regsvr32 s>/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv
                                                    No context
                                                    No context
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    AS-CHOOPAUSSetup.exe.7zGet hashmaliciousUnknownBrowse
                                                    • 207.246.91.177
                                                    Hilix.x86.elfGet hashmaliciousMiraiBrowse
                                                    • 45.63.53.202
                                                    Hilix.mips.elfGet hashmaliciousMiraiBrowse
                                                    • 45.63.53.238
                                                    kJsfHgzi7N.exeGet hashmaliciousXWormBrowse
                                                    • 192.248.185.253
                                                    DF2.exeGet hashmaliciousUnknownBrowse
                                                    • 192.248.182.81
                                                    setup.msiGet hashmaliciousUnknownBrowse
                                                    • 45.77.249.79
                                                    http://parrottalks.infoGet hashmaliciousUnknownBrowse
                                                    • 149.28.124.84
                                                    botx.mips.elfGet hashmaliciousMiraiBrowse
                                                    • 149.253.144.7
                                                    db0fa4b8db0333367e9bda3ab68b8042.x86.elfGet hashmaliciousMirai, GafgytBrowse
                                                    • 78.141.232.165
                                                    3OQL58yflv.exeGet hashmaliciousMetasploitBrowse
                                                    • 202.182.125.24
                                                    No context
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    C:\Users\user\AppData\Local\Temp\is-EVB2V.tmp\_isetup\_isdecmp.dll1944b321.msiGet hashmaliciousUnknownBrowse
                                                      Xzm9fAfKhB.exeGet hashmaliciousSocks5SystemzBrowse
                                                        L9rm7AX4mp.exeGet hashmaliciousSocks5SystemzBrowse
                                                          AX3-GUI-45.exeGet hashmaliciousUnknownBrowse
                                                            file.exeGet hashmaliciousSocks5SystemzBrowse
                                                              fe61hqe0Dt.exeGet hashmaliciousSocks5SystemzBrowse
                                                                file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, PureLog Stealer, RedLine, Socks5SystemzBrowse
                                                                    AX3-GUI-45.exeGet hashmaliciousUnknownBrowse
                                                                      qgdf1HLJno.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):64
                                                                        Entropy (8bit):0.34726597513537405
                                                                        Encrypted:false
                                                                        SSDEEP:3:Nlll:Nll
                                                                        MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                        Malicious:false
                                                                        Preview:@...e...........................................................
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmp
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):13312
                                                                        Entropy (8bit):5.745960477552938
                                                                        Encrypted:false
                                                                        SSDEEP:384:BXvhMwoSitz/bjx7yxnbdn+EHvbsHoOODCg:BZ7FEAbd+EDsIO
                                                                        MD5:A813D18268AFFD4763DDE940246DC7E5
                                                                        SHA1:C7366E1FD925C17CC6068001BD38EAEF5B42852F
                                                                        SHA-256:E19781AABE466DD8779CB9C8FA41BBB73375447066BB34E876CF388A6ED63C64
                                                                        SHA-512:B310ED4CD2E94381C00A6A370FCB7CC867EBE425D705B69CAAAAFFDAFBAB91F72D357966916053E72E68ECF712F2AF7585500C58BB53EC3E1D539179FCB45FB4
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        • Antivirus: Virustotal, Detection: 1%, Browse
                                                                        Joe Sandbox View:
                                                                        • Filename: 1944b321.msi, Detection: malicious, Browse
                                                                        • Filename: Xzm9fAfKhB.exe, Detection: malicious, Browse
                                                                        • Filename: L9rm7AX4mp.exe, Detection: malicious, Browse
                                                                        • Filename: AX3-GUI-45.exe, Detection: malicious, Browse
                                                                        • Filename: file.exe, Detection: malicious, Browse
                                                                        • Filename: fe61hqe0Dt.exe, Detection: malicious, Browse
                                                                        • Filename: file.exe, Detection: malicious, Browse
                                                                        • Filename: file.exe, Detection: malicious, Browse
                                                                        • Filename: AX3-GUI-45.exe, Detection: malicious, Browse
                                                                        • Filename: qgdf1HLJno.exe, Detection: malicious, Browse
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........I...(...(...(..n ..(...(...(...$..(...$..(...$..(..Rich.(..................PE..L......B...........!..... ..........p........0....P..........................P.......................................;.......;..(............................@.......0...............................................0...............................text............ .................. ..`.rdata.......0.......$..............@..@.reloc.......@.......2..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmp
                                                                        File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):6144
                                                                        Entropy (8bit):4.215994423157539
                                                                        Encrypted:false
                                                                        SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                                        MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                                        SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                                        SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                                        SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmp
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):23312
                                                                        Entropy (8bit):4.596242908851566
                                                                        Encrypted:false
                                                                        SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                        MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                        SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                        SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                        SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):13312
                                                                        Entropy (8bit):5.745960477552938
                                                                        Encrypted:false
                                                                        SSDEEP:384:BXvhMwoSitz/bjx7yxnbdn+EHvbsHoOODCg:BZ7FEAbd+EDsIO
                                                                        MD5:A813D18268AFFD4763DDE940246DC7E5
                                                                        SHA1:C7366E1FD925C17CC6068001BD38EAEF5B42852F
                                                                        SHA-256:E19781AABE466DD8779CB9C8FA41BBB73375447066BB34E876CF388A6ED63C64
                                                                        SHA-512:B310ED4CD2E94381C00A6A370FCB7CC867EBE425D705B69CAAAAFFDAFBAB91F72D357966916053E72E68ECF712F2AF7585500C58BB53EC3E1D539179FCB45FB4
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........I...(...(...(..n ..(...(...(...$..(...$..(...$..(..Rich.(..................PE..L......B...........!..... ..........p........0....P..........................P.......................................;.......;..(............................@.......0...............................................0...............................text............ .................. ..`.rdata.......0.......$..............@..@.reloc.......@.......2..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp
                                                                        File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):6144
                                                                        Entropy (8bit):4.215994423157539
                                                                        Encrypted:false
                                                                        SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                                        MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                                        SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                                        SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                                        SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):23312
                                                                        Entropy (8bit):4.596242908851566
                                                                        Encrypted:false
                                                                        SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                        MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                        SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                        SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                        SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\Desktop\8n26gvrXUM.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):1181184
                                                                        Entropy (8bit):6.401110768123626
                                                                        Encrypted:false
                                                                        SSDEEP:24576:jYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5lNx94k:KGUhni7iSFCQ9J
                                                                        MD5:BCC236A3921E1388596A42B05686FF5E
                                                                        SHA1:43BFFBBAC6A1BF5F1FA21E971E06E6F1D0AF9263
                                                                        SHA-256:43A656BCD060E8A36502CA2DEB878D56A99078F13D3E57DCD73A87128588C9E9
                                                                        SHA-512:E3BAAF1A8F4EB0E1AB57A1FB35BC7DED476606B65FAFB09835D34705D8C661819C3CFA0ECC43C5A0D0085FD570DF581438DE27944E054E12C09A6933BBF5CE04
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 3%
                                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...V..O.....................N....................@..............................................@...............................7......8...........................................................................X...x............................text...<........................... ..`.itext.............................. ..`.data..../.......0..................@....bss....pa...............................idata...7.......8..................@....tls....<............ ...................rdata............... ..............@..@.rsrc...8............"..............@..@....................................@..@........................................................................................................................................
                                                                        Process:C:\Users\user\Desktop\8n26gvrXUM.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):1181184
                                                                        Entropy (8bit):6.401110768123626
                                                                        Encrypted:false
                                                                        SSDEEP:24576:jYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5lNx94k:KGUhni7iSFCQ9J
                                                                        MD5:BCC236A3921E1388596A42B05686FF5E
                                                                        SHA1:43BFFBBAC6A1BF5F1FA21E971E06E6F1D0AF9263
                                                                        SHA-256:43A656BCD060E8A36502CA2DEB878D56A99078F13D3E57DCD73A87128588C9E9
                                                                        SHA-512:E3BAAF1A8F4EB0E1AB57A1FB35BC7DED476606B65FAFB09835D34705D8C661819C3CFA0ECC43C5A0D0085FD570DF581438DE27944E054E12C09A6933BBF5CE04
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 3%
                                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...V..O.....................N....................@..............................................@...............................7......8...........................................................................X...x............................text...<........................... ..`.itext.............................. ..`.data..../.......0..................@....bss....pa...............................idata...7.......8..................@....tls....<............ ...................rdata............... ..............@..@.rsrc...8............"..............@..@....................................@..@........................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):1203559
                                                                        Entropy (8bit):6.373854032166884
                                                                        Encrypted:false
                                                                        SSDEEP:24576:bYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5lNx941:yGUhni7iSFCQ9e
                                                                        MD5:A6A8A9EA416599646B0F6C603068D2D3
                                                                        SHA1:689AAD3A2A42F749E0C173A2F9E6E3751F7178BE
                                                                        SHA-256:20E6E5672C89CA84CAA6A060F97CDBAF4B042AC21AFCD2524C5FD120E7844164
                                                                        SHA-512:93BF69A80833B176190EDDD926B34AD466A5A1EE7893BFEBB9E2179C42ACA1BB3C36DBB98DE509B2DEC1F97AFFA2862BF9CA8A797D487AA4443EB5CDAF1C2236
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 3%
                                                                        Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...V..O.....................N....................@..............................................@...............................7......8...........................................................................X...x............................text...<........................... ..`.itext.............................. ..`.data..../.......0..................@....bss....pa...............................idata...7.......8..................@....tls....<............ ...................rdata............... ..............@..@.rsrc...8............"..............@..@....................................@..@........................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp
                                                                        File Type:InnoSetup Log Grubby Farm, version 0x418, 3565 bytes, 065367\37\user\, C:\Users\user\AppData\Local\376\377\37
                                                                        Category:dropped
                                                                        Size (bytes):3565
                                                                        Entropy (8bit):3.7883420638542544
                                                                        Encrypted:false
                                                                        SSDEEP:96:pF/42pYFZn3JCdfc1AGlEDA4MZAe2L3xHh4G4:pFTqFZ30f7fDSmBH+G4
                                                                        MD5:316C835B5F022625F72E52F43D038662
                                                                        SHA1:2A6D959F80CA2D974C7F5123E737B2404D82E6EB
                                                                        SHA-256:FD690A6FE50EB0E18B4A61273424817C8E1B56D5F4D07FE006474D3FA6320EE3
                                                                        SHA-512:7F3102D37927E4A2980A393716BCB517C4BB88E5CE45B1F9EE87FBB0B90ADC00F84433B83DD0A045D8FACDE102C1CB12F84F8757FE948535686565EEFDC43BBF
                                                                        Malicious:false
                                                                        Preview:Inno Setup Uninstall Log (b)....................................Grubby Farm.....................................................................................................................Grubby Farm.................................................................................................................................%...............................................................................................................R.#(!........"Oz...............0.6.5.3.6.7......e.n.g.i.n.e.e.r......C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l................6...].. .....T....b...IFPS...............................................................................................................................................................BOOLEAN..............TEXECWAIT.................!MAIN....-1..'...dll:kernel32.dll.GetCurrentProcess.......(...dll:kernel32.dll.TerminateProcess............y... ...RESTARTINSTALLERWITHSILENTPARAMS....-1..EXPANDCONSTANT........E
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):1203559
                                                                        Entropy (8bit):6.373854032166884
                                                                        Encrypted:false
                                                                        SSDEEP:24576:bYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5lNx941:yGUhni7iSFCQ9e
                                                                        MD5:A6A8A9EA416599646B0F6C603068D2D3
                                                                        SHA1:689AAD3A2A42F749E0C173A2F9E6E3751F7178BE
                                                                        SHA-256:20E6E5672C89CA84CAA6A060F97CDBAF4B042AC21AFCD2524C5FD120E7844164
                                                                        SHA-512:93BF69A80833B176190EDDD926B34AD466A5A1EE7893BFEBB9E2179C42ACA1BB3C36DBB98DE509B2DEC1F97AFFA2862BF9CA8A797D487AA4443EB5CDAF1C2236
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 3%
                                                                        Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...V..O.....................N....................@..............................................@...............................7......8...........................................................................X...x............................text...<........................... ..`.itext.............................. ..`.data..../.......0..................@....bss....pa...............................idata...7.......8..................@....tls....<............ ...................rdata............... ..............@..@.rsrc...8............"..............@..@....................................@..@........................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp
                                                                        File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):1745567
                                                                        Entropy (8bit):7.095269474684338
                                                                        Encrypted:false
                                                                        SSDEEP:49152:0OlRYeHGFRTIKJTPtpR2sVRcr4kO/B8nLj1yucyUeR37:0OlRYeHGFRkK7JuawLjj6eR37
                                                                        MD5:C6A93561FA2B6AF08724AE1CA16AF71C
                                                                        SHA1:1C2DD7373C544B1C8CF6EAB0CA2E17D41AE62363
                                                                        SHA-256:8FA95C6F3629180087E4BD86D10F55AEC2AE3FE07A780AF7B8EDF23A39A2872D
                                                                        SHA-512:A50B3ACC0415B61CC39E2FC12311EE6B9B539D5AF0A828C73CA422875D1A96EC13B719C702B29C3F8915DAA958DE2A9FDDD20FE3D6D4E0A36F665EF872353FB9
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 43%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....ZH.n........&"...+.4...j...... ................................................U....`... .........................................q....................@...g...h...9...... ........................... 5..(...................`... ............................text....3.......4..................`..`.data...`....P.......8..............@....rdata.......`.......<..............@..@.pdata...g...@...h..................@..@.xdata..............|..............@..@.bss....@....p...........................edata..q............8..............@..@.idata........... ...:..............@....CRT....`............Z..............@....tls.................\..............@....reloc.. ............^..............@..B........................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp
                                                                        File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):1745567
                                                                        Entropy (8bit):7.095269474684338
                                                                        Encrypted:false
                                                                        SSDEEP:49152:0OlRYeHGFRTIKJTPtpR2sVRcr4kO/B8nLj1yucyUeR37:0OlRYeHGFRkK7JuawLjj6eR37
                                                                        MD5:C6A93561FA2B6AF08724AE1CA16AF71C
                                                                        SHA1:1C2DD7373C544B1C8CF6EAB0CA2E17D41AE62363
                                                                        SHA-256:8FA95C6F3629180087E4BD86D10F55AEC2AE3FE07A780AF7B8EDF23A39A2872D
                                                                        SHA-512:A50B3ACC0415B61CC39E2FC12311EE6B9B539D5AF0A828C73CA422875D1A96EC13B719C702B29C3F8915DAA958DE2A9FDDD20FE3D6D4E0A36F665EF872353FB9
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 43%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....ZH.n........&"...+.4...j...... ................................................U....`... .........................................q....................@...g...h...9...... ........................... 5..(...................`... ............................text....3.......4..................`..`.data...`....P.......8..............@....rdata.......`.......<..............@..@.pdata...g...@...h..................@..@.xdata..............|..............@..@.bss....@....p...........................edata..q............8..............@..@.idata........... ...:..............@....CRT....`............Z..............@....tls.................\..............@....reloc.. ............^..............@..B........................................................................................................................................................................
                                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Entropy (8bit):7.932606554344445
                                                                        TrID:
                                                                        • Win32 Executable (generic) a (10002005/4) 98.86%
                                                                        • Inno Setup installer (109748/4) 1.08%
                                                                        • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                        File name:8n26gvrXUM.exe
                                                                        File size:1'479'422 bytes
                                                                        MD5:c6f9f0ec394a72fb302efbcf74da2ea7
                                                                        SHA1:143c8fe025fbfd0afe9c88003315bc5a4720439a
                                                                        SHA256:0a63068ec9d94fef476d9e906fb4920de32e70b77daa24a8b2a0786f23889a1a
                                                                        SHA512:0ae6cce0267432ea2a6f44a40d9171238ee8c2025934e2b5a46d7cc7c4ffaefda483440f0cef7d1502c7e74124116565b11dbb1f14a6b6b02313ac45d3b64a45
                                                                        SSDEEP:24576:QMjhJ3I+qWJFFjV96zSzjq7z16g/RMcdGoKmS896ORyAt05bmktUNudtJjdPrF:jnwuVnFzjql6t5ofSs60tab7SNudXjdZ
                                                                        TLSH:2C652302B3C34871F8690A349C62C550EE17BD681DF6601B6EB9FE0E8DF92C25C7DA64
                                                                        File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                        Icon Hash:29226ee6b692c62f
                                                                        Entrypoint:0x416478
                                                                        Entrypoint Section:.itext
                                                                        Digitally signed:false
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                        DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                        Time Stamp:0x457CA289 [Mon Dec 11 00:12:57 2006 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:5
                                                                        OS Version Minor:0
                                                                        File Version Major:5
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:5
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:483f0c4259a9148c34961abbda6146c1
                                                                        Instruction
                                                                        push ebp
                                                                        mov ebp, esp
                                                                        add esp, FFFFFFA4h
                                                                        push ebx
                                                                        push esi
                                                                        push edi
                                                                        xor eax, eax
                                                                        mov dword ptr [ebp-3Ch], eax
                                                                        mov dword ptr [ebp-40h], eax
                                                                        mov dword ptr [ebp-5Ch], eax
                                                                        mov dword ptr [ebp-30h], eax
                                                                        mov dword ptr [ebp-38h], eax
                                                                        mov dword ptr [ebp-34h], eax
                                                                        mov dword ptr [ebp-2Ch], eax
                                                                        mov dword ptr [ebp-28h], eax
                                                                        mov dword ptr [ebp-14h], eax
                                                                        mov eax, 004152B8h
                                                                        call 00007FA458D70C91h
                                                                        xor eax, eax
                                                                        push ebp
                                                                        push 00416B45h
                                                                        push dword ptr fs:[eax]
                                                                        mov dword ptr fs:[eax], esp
                                                                        xor edx, edx
                                                                        push ebp
                                                                        push 00416B01h
                                                                        push dword ptr fs:[edx]
                                                                        mov dword ptr fs:[edx], esp
                                                                        mov eax, dword ptr [0041AB48h]
                                                                        call 00007FA458D7F53Bh
                                                                        call 00007FA458D7F0E2h
                                                                        lea edx, dword ptr [ebp-14h]
                                                                        xor eax, eax
                                                                        call 00007FA458D78D64h
                                                                        mov edx, dword ptr [ebp-14h]
                                                                        mov eax, 0041D6E8h
                                                                        call 00007FA458D6F2C7h
                                                                        push 00000002h
                                                                        push 00000000h
                                                                        push 00000001h
                                                                        mov ecx, dword ptr [0041D6E8h]
                                                                        mov dl, 01h
                                                                        mov eax, dword ptr [0040F080h]
                                                                        call 00007FA458D7964Fh
                                                                        mov dword ptr [0041D6ECh], eax
                                                                        xor edx, edx
                                                                        push ebp
                                                                        push 00416AADh
                                                                        push dword ptr fs:[edx]
                                                                        mov dword ptr fs:[edx], esp
                                                                        call 00007FA458D7F5C3h
                                                                        mov dword ptr [0041D6F4h], eax
                                                                        mov eax, dword ptr [0041D6F4h]
                                                                        cmp dword ptr [eax+0Ch], 01h
                                                                        jne 00007FA458D8092Ah
                                                                        mov eax, dword ptr [0041D6F4h]
                                                                        mov edx, 00000028h
                                                                        call 00007FA458D79B18h
                                                                        mov edx, dword ptr [0041D6F4h]
                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x1e0000xf9e.idata
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x210000x102d4.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x200000x18.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x1e3500x24c.idata
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x10000x143f80x14400c9bb3afc1ceaaa31127ccfa204c657efFalse0.5487316743827161data6.482216817915366IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        .itext0x160000xbe80xc001ba5adf2e1058c0460dcc814ba86fb32False0.6246744791666666data6.005798728198158IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        .data0x170000xd9c0xe00d5b22eff9e08edaa95f493c1a71158c0False0.2924107142857143data2.669288666959085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .bss0x180000x574c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .idata0x1e0000xf9e0x1000b47eaca4c149ee829de76a342b5560d5False0.35595703125data4.9677831942996935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .tls0x1f0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .rdata0x200000x180x2003746f5876803f8f30db5bb2deb8772aeFalse0.05078125data0.190488766434666IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .rsrc0x210000x102d40x10400fe2478415e1581a70914dfc06f95f5e6False0.30955528846153846data5.124529477041404IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                        RT_ICON0x2150c0x668Device independent bitmap graphic, 48 x 96 x 4, image size 0EnglishUnited States0.23902439024390243
                                                                        RT_ICON0x21b740x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishUnited States0.38306451612903225
                                                                        RT_ICON0x21e5c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.597972972972973
                                                                        RT_ICON0x21f840xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.6084754797441365
                                                                        RT_ICON0x22e2c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.8172382671480144
                                                                        RT_ICON0x236d40x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.7276011560693642
                                                                        RT_ICON0x23c3c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.4179460580912863
                                                                        RT_ICON0x261e40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.6719043151969981
                                                                        RT_ICON0x2728c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.8315602836879432
                                                                        RT_STRING0x276f40xc4data0.5969387755102041
                                                                        RT_STRING0x277b80xccdata0.6225490196078431
                                                                        RT_STRING0x278840x174data0.5510752688172043
                                                                        RT_STRING0x279f80x39cdata0.34523809523809523
                                                                        RT_STRING0x27d940x34cdata0.4218009478672986
                                                                        RT_STRING0x280e00x294data0.4106060606060606
                                                                        RT_RCDATA0x283740x82e8dataEnglishUnited States0.11261637622344235
                                                                        RT_RCDATA0x3065c0x10data1.5
                                                                        RT_RCDATA0x3066c0x1a0data0.8149038461538461
                                                                        RT_RCDATA0x3080c0x2cdata1.1818181818181819
                                                                        RT_GROUP_ICON0x308380x84dataEnglishUnited States0.6363636363636364
                                                                        RT_VERSION0x308bc0x4b8COM executable for DOSEnglishUnited States0.2855960264900662
                                                                        RT_MANIFEST0x30d740x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
                                                                        DLLImport
                                                                        oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                                        advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                                                                        user32.dllGetKeyboardType, LoadStringW, MessageBoxA, CharNextW
                                                                        kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetSystemInfo, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenW, lstrcpynW, LoadLibraryExW, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetCommandLineW, FreeLibrary, FindFirstFileW, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle, CloseHandle
                                                                        kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleW
                                                                        user32.dllCreateWindowExW, TranslateMessage, SetWindowLongW, PeekMessageW, MsgWaitForMultipleObjects, MessageBoxW, LoadStringW, GetSystemMetrics, ExitWindowsEx, DispatchMessageW, DestroyWindow, CharUpperBuffW, CallWindowProcW
                                                                        kernel32.dllWriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, SizeofResource, SignalObjectAndWait, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, RemoveDirectoryW, ReadFile, MultiByteToWideChar, LockResource, LoadResource, LoadLibraryW, LeaveCriticalSection, InitializeCriticalSection, GetWindowsDirectoryW, GetVersionExW, GetUserDefaultLangID, GetThreadLocale, GetSystemInfo, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesW, GetExitCodeProcess, GetEnvironmentVariableW, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentProcess, GetCommandLineW, GetCPInfo, InterlockedExchange, InterlockedCompareExchange, FreeLibrary, FormatMessageW, FindResourceW, EnumCalendarInfoW, EnterCriticalSection, DeleteFileW, DeleteCriticalSection, CreateProcessW, CreateFileW, CreateEventW, CreateDirectoryW, CompareStringW, CloseHandle
                                                                        advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey, OpenProcessToken, LookupPrivilegeValueW
                                                                        comctl32.dllInitCommonControls
                                                                        kernel32.dllSleep
                                                                        advapi32.dllAdjustTokenPrivileges
                                                                        oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                                                        Language of compilation systemCountry where language is spokenMap
                                                                        EnglishUnited States
                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                        2025-01-02T13:54:49.264763+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert1144.202.34.11256001192.168.2.649952TCP
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Jan 2, 2025 13:54:48.701648951 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:54:48.706423044 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:54:48.706499100 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:54:48.713896036 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:54:48.718699932 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:54:48.749716997 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:54:48.754508972 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:54:49.239095926 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:54:49.239156008 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:54:49.239222050 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:54:49.259989023 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:54:49.264763117 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:54:49.388621092 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:54:49.468127012 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:54:51.285958052 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:54:51.290826082 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:54:51.290885925 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:54:51.295653105 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:09.236325026 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:09.280642033 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:09.326706886 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:09.374392986 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:20.512564898 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:20.517414093 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:20.517462015 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:20.522207975 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:20.721147060 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:20.765091896 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:20.816849947 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:20.858802080 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:20.869229078 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:20.874083996 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:20.874128103 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:20.878890038 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:29.251753092 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:29.296346903 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:29.342197895 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:29.390065908 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:49.252211094 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:49.296442032 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:49.342639923 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:49.390263081 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:51.515675068 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:51.520498991 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:51.520574093 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:51.525357962 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:51.721124887 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:51.765117884 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:51.811619043 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:51.816565990 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:51.821367025 CET5600149952144.202.34.112192.168.2.6
                                                                        Jan 2, 2025 13:55:51.821408987 CET4995256001192.168.2.6144.202.34.112
                                                                        Jan 2, 2025 13:55:51.826219082 CET5600149952144.202.34.112192.168.2.6

                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:07:53:59
                                                                        Start date:02/01/2025
                                                                        Path:C:\Users\user\Desktop\8n26gvrXUM.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\8n26gvrXUM.exe"
                                                                        Imagebase:0x400000
                                                                        File size:1'479'422 bytes
                                                                        MD5 hash:C6F9F0EC394A72FB302EFBCF74DA2EA7
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:Borland Delphi
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:2
                                                                        Start time:07:54:00
                                                                        Start date:02/01/2025
                                                                        Path:C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmp
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\AppData\Local\Temp\is-HOBDA.tmp\8n26gvrXUM.tmp" /SL5="$203E2,1083099,161792,C:\Users\user\Desktop\8n26gvrXUM.exe"
                                                                        Imagebase:0x400000
                                                                        File size:1'181'184 bytes
                                                                        MD5 hash:BCC236A3921E1388596A42B05686FF5E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:Borland Delphi
                                                                        Antivirus matches:
                                                                        • Detection: 3%, ReversingLabs
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:3
                                                                        Start time:07:54:00
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"cmd.exe" /C timeout /T 3 & "C:\Users\user\Desktop\8n26gvrXUM.exe" /VERYSILENT /SUPPRESSMSGBOXES
                                                                        Imagebase:0x1c0000
                                                                        File size:236'544 bytes
                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:4
                                                                        Start time:07:54:00
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff66e660000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:5
                                                                        Start time:07:54:00
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\SysWOW64\timeout.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:timeout /T 3
                                                                        Imagebase:0xb50000
                                                                        File size:25'088 bytes
                                                                        MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:6
                                                                        Start time:07:54:03
                                                                        Start date:02/01/2025
                                                                        Path:C:\Users\user\Desktop\8n26gvrXUM.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\8n26gvrXUM.exe" /VERYSILENT /SUPPRESSMSGBOXES
                                                                        Imagebase:0x400000
                                                                        File size:1'479'422 bytes
                                                                        MD5 hash:C6F9F0EC394A72FB302EFBCF74DA2EA7
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:Borland Delphi
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:7
                                                                        Start time:07:54:03
                                                                        Start date:02/01/2025
                                                                        Path:C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\AppData\Local\Temp\is-JDMAQ.tmp\8n26gvrXUM.tmp" /SL5="$30426,1083099,161792,C:\Users\user\Desktop\8n26gvrXUM.exe" /VERYSILENT /SUPPRESSMSGBOXES
                                                                        Imagebase:0x400000
                                                                        File size:1'181'184 bytes
                                                                        MD5 hash:BCC236A3921E1388596A42B05686FF5E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:Borland Delphi
                                                                        Antivirus matches:
                                                                        • Detection: 3%, ReversingLabs
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:8
                                                                        Start time:07:54:03
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"regsvr32.exe" /s /i:SYNC "C:\Users\user\AppData\Roaming\\netapi32_1.drv"
                                                                        Imagebase:0x4d0000
                                                                        File size:20'992 bytes
                                                                        MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:false

                                                                        Target ID:9
                                                                        Start time:07:54:03
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\System32\regsvr32.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline: /s /i:SYNC "C:\Users\user\AppData\Roaming\\netapi32_1.drv"
                                                                        Imagebase:0x7ff79b3f0000
                                                                        File size:25'088 bytes
                                                                        MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.3362190126.00000000032F8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        Reputation:high
                                                                        Has exited:false

                                                                        Target ID:10
                                                                        Start time:07:54:03
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }"
                                                                        Imagebase:0x7ff6e3d50000
                                                                        File size:452'608 bytes
                                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:11
                                                                        Start time:07:54:03
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff66e660000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:12
                                                                        Start time:07:54:14
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{D26AEDB2-54A1-4069-8CFB-595FFA7EE9CA}' -Description 'MicrosoftEdgeUpdateTaskMachineUA' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
                                                                        Imagebase:0x7ff6e3d50000
                                                                        File size:452'608 bytes
                                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:13
                                                                        Start time:07:54:14
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff66e660000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:15
                                                                        Start time:07:54:16
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\System32\regsvr32.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\regsvr32.EXE /S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv
                                                                        Imagebase:0x7ff79b3f0000
                                                                        File size:25'088 bytes
                                                                        MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Target ID:16
                                                                        Start time:07:54:17
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\user\AppData\Roaming\netapi32_1.drv' }) { exit 0 } else { exit 1 }"
                                                                        Imagebase:0x7ff6e3d50000
                                                                        File size:452'608 bytes
                                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Target ID:17
                                                                        Start time:07:54:17
                                                                        Start date:02/01/2025
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff66e660000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Reset < >
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2158795361.0000000002441000.00000020.00000001.01000000.00000006.sdmp, Offset: 02440000, based on PE: true
                                                                          • Associated: 00000002.00000002.2158769498.0000000002440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                          • Associated: 00000002.00000002.2158813120.0000000002443000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2440000_8n26gvrXUM.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: invalid bit length repeat$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
                                                                          • API String ID: 0-3031085480
                                                                          • Opcode ID: eeb08c8356d9f56fe774a1a6a9df29cdcc614ab4269f685b735e4a74ab19c073
                                                                          • Instruction ID: 62d2cdf99b49707c3fe0c666b72d2face2bc8975dd1950e1ebf13da11ef9dd68
                                                                          • Opcode Fuzzy Hash: eeb08c8356d9f56fe774a1a6a9df29cdcc614ab4269f685b735e4a74ab19c073
                                                                          • Instruction Fuzzy Hash: EF624B756087458FDB08DF18C890A6ABBE1FF88304F04496EF896CB745EBB5D945CB81
                                                                          Strings
                                                                          • invalid distance code, xrefs: 02441650
                                                                          • invalid distance too far back, xrefs: 0244163B
                                                                          • invalid literal/length code, xrefs: 0244166A
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.2158795361.0000000002441000.00000020.00000001.01000000.00000006.sdmp, Offset: 02440000, based on PE: true
                                                                          • Associated: 00000002.00000002.2158769498.0000000002440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                          • Associated: 00000002.00000002.2158813120.0000000002443000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_2440000_8n26gvrXUM.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: invalid distance code$invalid distance too far back$invalid literal/length code
                                                                          • API String ID: 0-3255898291
                                                                          • Opcode ID: c8f1502a24b0ece081aa6722af53b20c0ade1a412c846e39fea09afbe166c5a6
                                                                          • Instruction ID: daf796276b67d882329327a1d7ddf570f50879a6e45332fdbf328c9f1a0beaed
                                                                          • Opcode Fuzzy Hash: c8f1502a24b0ece081aa6722af53b20c0ade1a412c846e39fea09afbe166c5a6
                                                                          • Instruction Fuzzy Hash: 2AE180316083858FD708CF28C59466AFBE1EBC5304F584A6EE8DAC7342EB75D94ACB51

                                                                          Execution Graph

                                                                          Execution Coverage:5.7%
                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                          Signature Coverage:0%
                                                                          Total number of Nodes:33
                                                                          Total number of Limit Nodes:7
                                                                          execution_graph 94307 2d80014 94308 2d8006a 94307->94308 94310 2d80096 94307->94310 94311 2dd0a56 94308->94311 94314 2ddabec 94311->94314 94316 2dd0a6e 94311->94316 94313 2dd0c88 94313->94310 94314->94310 94315 2dd0c9f LoadLibraryA 94315->94316 94316->94313 94316->94315 94317 2dd0d7c 94316->94317 94332 2dd0c9f 94317->94332 94320 2dd0c9f LoadLibraryA 94321 2dd0db2 94320->94321 94322 2dd0c9f LoadLibraryA 94321->94322 94330 2dd0dc8 94322->94330 94325 2dd0c9f LoadLibraryA 94325->94330 94326 2dd1daf 94326->94316 94328 2dd1358 VirtualAlloc 94328->94330 94330->94325 94330->94326 94330->94328 94336 2dd1dc7 94330->94336 94340 2dd5a20 94330->94340 94346 2dd32c3 LoadLibraryA 94330->94346 94347 2dd3426 LoadLibraryA 94330->94347 94348 2dd2f80 LoadLibraryA 94330->94348 94334 2dd0cd8 94332->94334 94333 2dd0d6d 94333->94320 94334->94333 94349 2dd7a09 LoadLibraryA 94334->94349 94339 2dd1df9 94336->94339 94337 2dd20ce LoadLibraryA 94337->94339 94338 2dd2208 94338->94330 94339->94337 94339->94338 94341 2dd5ae6 94340->94341 94342 2dd6107 SafeArrayDestroy 94341->94342 94343 2dd5fa3 SafeArrayCreate 94341->94343 94344 2dd5f57 CLRCreateInstance 94341->94344 94345 2dd6127 94341->94345 94342->94341 94343->94341 94344->94341 94345->94330 94346->94330 94347->94330 94348->94330 94349->94334
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: +F4$ +F4$ +F4$ +F4$ IF4$ IF4$ IF4$ IF4$ yF4$ yF4$ yF4$ yF4$&1_H$(3F4$(3F4$(3F4$(3F4$(MF4$(MF4$(MF4$(MF4$(iF4$(iF4$(iF4$(iF4$(vF4$(vF4$(vF4$(vF4$88F4$88F4$88F4$88F4$8jF4$8jF4$8jF4$8jF4$91_H$@(F4$@(F4$@(F4$@(F4$@HF4$@HF4$@HF4$@HF4$H$H$HVF4$HVF4$HVF4$HVF4$HzF4$HzF4$HzF4$HzF4$P$F4$P$F4$P$F4$P$F4$P1F4$P1F4$P1F4$P1F4$X{F4$X{F4$X{F4$X{F4$h6F4$h6F4$h6F4$h6F4$hUF4$hUF4$hUF4$hUF4$p.F4$p.F4$p.F4$pcF4$pcF4$pcF4$pcF4$x9F4$x9F4$x9F4$x9F4$xRF4$xRF4$xRF4$xRF4$xkF4$xkF4$xkF4$0_H$0_H$AF4$AF4$AF4$AF4$nF4$nF4$nF4$nF4$~F4$~F4$~F4$~F4
                                                                          • API String ID: 0-1688883694
                                                                          • Opcode ID: aa1c2757a47c3b5b9b8904291662050123117c5ea1af10a12d867a14b06de386
                                                                          • Instruction ID: fd48b04e4111421166f4ef9615b30d08b858f5e3cb42c2a7c2bb0f6fafd99ba1
                                                                          • Opcode Fuzzy Hash: aa1c2757a47c3b5b9b8904291662050123117c5ea1af10a12d867a14b06de386
                                                                          • Instruction Fuzzy Hash: 3DC3C452F0DD4B0FEBA6A62C44F527967C2EF9B244B5900BBD14DC7296EE2CEC029341
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID: CloseHandle$EnvironmentErrorFreeLastStringsmemcpy
                                                                          • String ID: program path has no file name$#$*+-./:?@\_cmd.exe /e:ON /v:OFF /d /c "$.exeprogram not found$PATHstd\src\sys_common\process.rs$\?\\$\cmd.exemaximum number of ProcThreadAttributes exceeded$]?\\$assertion failed: is_code_point_boundary(self, new_len)$assertion failed: self.height > 0$exe\\.\NULexit code:
                                                                          • API String ID: 3975177916-1077193248
                                                                          • Opcode ID: d42acf5933bc6688dd14b0afde4729129836f506148609f5942b4aeb37785f2b
                                                                          • Instruction ID: 122c6e35b93d6695a43c39772c2b2f92ea7104cccbbb3d3d458a794409675bda
                                                                          • Opcode Fuzzy Hash: d42acf5933bc6688dd14b0afde4729129836f506148609f5942b4aeb37785f2b
                                                                          • Instruction Fuzzy Hash: 4373A562B0EED184EB70AF25D8603FD23A2FB44789F544135DA4D6BB96DF7AD2418308

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 3812 7ffd3455000a-7ffd345500a9 3822 7ffd345500af-7ffd345500ba 3812->3822 3823 7ffd34552d57-7ffd34552d69 3812->3823 3825 7ffd345500e0-7ffd34551f5c 3822->3825 3826 7ffd345500bc-7ffd345500de 3822->3826 4106 7ffd34551f5e-7ffd34551f94 3825->4106 4107 7ffd34551f95-7ffd34551ff7 3825->4107 3826->3825 4106->4107 4114 7ffd34552123-7ffd3455218e call 7ffd34552dc2 4107->4114 4115 7ffd34551ffd-7ffd345520ea 4107->4115 4127 7ffd345522b1-7ffd34552370 call 7ffd34552e2c 4114->4127 4128 7ffd34552194-7ffd34552278 4114->4128 4115->4114 4156 7ffd345520ec-7ffd34552122 4115->4156 4165 7ffd34552372-7ffd345523a8 4127->4165 4166 7ffd345523a9-7ffd3455245f 4127->4166 4128->4127 4178 7ffd3455227a-7ffd345522b0 4128->4178 4156->4114 4165->4166 4186 7ffd34552461-7ffd34552497 4166->4186 4187 7ffd34552498-7ffd3455254b 4166->4187 4178->4127 4186->4187 4200 7ffd34552584-7ffd34552637 4187->4200 4201 7ffd3455254d-7ffd34552583 4187->4201 4215 7ffd34552670-7ffd345526d2 4200->4215 4216 7ffd34552639-7ffd3455266f 4200->4216 4201->4200 4223 7ffd345527f8-7ffd34552890 call 7ffd34552f46 4215->4223 4224 7ffd345526d8-7ffd345527bf 4215->4224 4216->4215 4247 7ffd34552892-7ffd345528c5 4223->4247 4248 7ffd345528c6-7ffd34552960 4223->4248 4224->4223 4261 7ffd345527c1-7ffd345527f7 4224->4261 4247->4248 4268 7ffd34552a34-7ffd34552aea 4248->4268 4269 7ffd34552966-7ffd3455298b 4248->4269 4261->4223 4292 7ffd34552b23 4268->4292 4293 7ffd34552aec-7ffd34552b22 4268->4293 4274 7ffd34552992-7ffd345529ef 4269->4274 4287 7ffd345529f1-7ffd345529f5 4274->4287 4288 7ffd345529fd-7ffd34552a33 4274->4288 4287->4269 4289 7ffd345529fb 4287->4289 4288->4268 4289->4268 4296 7ffd34552b2d-7ffd34552c33 4292->4296 4293->4292 4313 7ffd34552c35-7ffd34552c95 4296->4313 4314 7ffd34552c96-7ffd34552ca2 4296->4314 4313->4314 4315 7ffd34552d29-7ffd34552d50 4314->4315 4316 7ffd34552ca8-7ffd34552cbb 4314->4316 4315->3823 4319 7ffd34552cbd-7ffd34552d27 4316->4319 4320 7ffd34552d26-7ffd34552d27 4316->4320 4319->3823 4320->3823
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (b#4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-3492052578
                                                                          • Opcode ID: 9e06bc9260b09e96d2408c9d1a5839ccaed91814e4253c4ba1672fa6569b3900
                                                                          • Instruction ID: 2a003513f082c9a095dc732d06105005edde6a8549ea259990047e690b3a1ce7
                                                                          • Opcode Fuzzy Hash: 9e06bc9260b09e96d2408c9d1a5839ccaed91814e4253c4ba1672fa6569b3900
                                                                          • Instruction Fuzzy Hash: 614327307589194FE288FB28C8A67B573D6FBCD324B9441BDD40EC72D6CD29AC429B85
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$pH4
                                                                          • API String ID: 0-100780807
                                                                          • Opcode ID: d7f50e05cd3b9a4836118b90fd70c36a61611cda6df454c93b74106f46bcbdae
                                                                          • Instruction ID: 9643e31e498e5b7a812c8597e37d212b85d01df8398db03ff846ae3c5ffc561c
                                                                          • Opcode Fuzzy Hash: d7f50e05cd3b9a4836118b90fd70c36a61611cda6df454c93b74106f46bcbdae
                                                                          • Instruction Fuzzy Hash: D2F2C630B5894A8FEB98FB58C8E5AA877E1FF99314F5001B9D50DD3292DE3CB8419B41

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 4792 7ffd34551e43-7ffd34551f5c 4808 7ffd34551f5e-7ffd34551f94 4792->4808 4809 7ffd34551f95-7ffd34551ff7 4792->4809 4808->4809 4816 7ffd34552123-7ffd3455218e call 7ffd34552dc2 4809->4816 4817 7ffd34551ffd-7ffd345520ea 4809->4817 4829 7ffd345522b1-7ffd34552370 call 7ffd34552e2c 4816->4829 4830 7ffd34552194-7ffd34552278 4816->4830 4817->4816 4858 7ffd345520ec-7ffd34552122 4817->4858 4867 7ffd34552372-7ffd345523a8 4829->4867 4868 7ffd345523a9-7ffd3455245f 4829->4868 4830->4829 4880 7ffd3455227a-7ffd345522b0 4830->4880 4858->4816 4867->4868 4888 7ffd34552461-7ffd34552497 4868->4888 4889 7ffd34552498-7ffd3455254b 4868->4889 4880->4829 4888->4889 4902 7ffd34552584-7ffd34552637 4889->4902 4903 7ffd3455254d-7ffd34552583 4889->4903 4917 7ffd34552670-7ffd345526d2 4902->4917 4918 7ffd34552639-7ffd3455266f 4902->4918 4903->4902 4925 7ffd345527f8-7ffd34552890 call 7ffd34552f46 4917->4925 4926 7ffd345526d8-7ffd345527bf 4917->4926 4918->4917 4949 7ffd34552892-7ffd345528c5 4925->4949 4950 7ffd345528c6-7ffd34552960 4925->4950 4926->4925 4963 7ffd345527c1-7ffd345527f7 4926->4963 4949->4950 4970 7ffd34552a34-7ffd34552aea 4950->4970 4971 7ffd34552966-7ffd3455298b 4950->4971 4963->4925 4994 7ffd34552b23 4970->4994 4995 7ffd34552aec-7ffd34552b22 4970->4995 4976 7ffd34552992-7ffd345529ef 4971->4976 4989 7ffd345529f1-7ffd345529f5 4976->4989 4990 7ffd345529fd-7ffd34552a33 4976->4990 4989->4971 4991 7ffd345529fb 4989->4991 4990->4970 4991->4970 4998 7ffd34552b2d-7ffd34552c33 4994->4998 4995->4994 5015 7ffd34552c35-7ffd34552c95 4998->5015 5016 7ffd34552c96-7ffd34552ca2 4998->5016 5015->5016 5017 7ffd34552d29-7ffd34552d50 5016->5017 5018 7ffd34552ca8-7ffd34552cbb 5016->5018 5026 7ffd34552d57-7ffd34552d69 5017->5026 5021 7ffd34552cbd-7ffd34552d27 5018->5021 5022 7ffd34552d26-7ffd34552d27 5018->5022 5021->5026 5022->5026
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-1987985751
                                                                          • Opcode ID: 1a9cf10aa7bc006ae135d9f0c8991e4d9bdc68e9e890a7b24fce21e1266859de
                                                                          • Instruction ID: 2f8ca75e53480dbe973531c8410e5ded6bc1d58e88b979497c46558a0f0c4e39
                                                                          • Opcode Fuzzy Hash: 1a9cf10aa7bc006ae135d9f0c8991e4d9bdc68e9e890a7b24fce21e1266859de
                                                                          • Instruction Fuzzy Hash: 4F92AE31B599094FEBC9FB2884B66B4B3D2FF99314B5401B9D00EC7292DD2DBC429B85

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 5036 7ffd3436d33f-7ffd3436d341 5037 7ffd3436d343-7ffd34373f75 5036->5037 5038 7ffd3436d3b4-7ffd3436d42a 5036->5038 5041 7ffd3436d434-7ffd3436d449 5038->5041 5042 7ffd3436d42c-7ffd3436d432 5038->5042 5042->5041 5044 7ffd3436d44a-7ffd3436d461 5042->5044 5045 7ffd3436d463-7ffd3436d469 5044->5045 5046 7ffd3436d46b-7ffd3436d46c 5044->5046 5047 7ffd3436d471-7ffd3436d4c8 5045->5047 5046->5047 5048 7ffd3436d4cf-7ffd3436d4ed call 7ffd3436c4c0 5047->5048 5049 7ffd3436d4ca 5047->5049 5052 7ffd3436d4f3-7ffd3436d52a call 7ffd3436d0b0 5048->5052 5053 7ffd3436d7d6-7ffd3436d7e3 5048->5053 5049->5048 5079 7ffd3436d53c-7ffd3436d5cb call 7ffd3436d0b0 call 7ffd3436d1a0 call 7ffd3436d1c8 5052->5079 5080 7ffd3436d52c-7ffd3436d537 5052->5080 5055 7ffd3436df09-7ffd3436df16 5053->5055 5056 7ffd3436d7e9-7ffd3436d86d call 7ffd3436d0b0 call 7ffd3436d100 5053->5056 5058 7ffd3436e0ae-7ffd3436e0bb 5055->5058 5059 7ffd3436df1c-7ffd3436df46 call 7ffd3436d0d8 5055->5059 5111 7ffd3436d873-7ffd3436d876 5056->5111 5112 7ffd3436db1a-7ffd3436db1d 5056->5112 5060 7ffd3436e0c1-7ffd3436e0eb call 7ffd3436d0d8 5058->5060 5061 7ffd3436e2a6-7ffd3436e2b3 5058->5061 5059->5058 5091 7ffd3436df4c-7ffd3436df9f call 7ffd34356db0 call 7ffd3436d0b0 5059->5091 5060->5061 5098 7ffd3436e0f1-7ffd3436e144 call 7ffd34356db0 call 7ffd3436d0b0 5060->5098 5067 7ffd3436e312-7ffd3436e31a 5061->5067 5068 7ffd3436e2b5-7ffd3436e305 call 7ffd34356db0 call 7ffd3436d0b0 5061->5068 5070 7ffd3436e31c-7ffd3436e324 5067->5070 5071 7ffd3436e32a-7ffd3436e33f 5067->5071 5068->5067 5114 7ffd3436e307 5068->5114 5077 7ffd3436e34a-7ffd3436e3b9 call 7ffd34365948 call 7ffd3436a808 5070->5077 5078 7ffd3436e326-7ffd3436e328 5070->5078 5137 7ffd3436e3c4-7ffd3436e3d1 call 7ffd3436a830 5077->5137 5078->5071 5078->5077 5086 7ffd3436d7d0-7ffd3436d7d1 5079->5086 5173 7ffd3436d5d1-7ffd3436d6de call 7ffd34356db0 call 7ffd3436d150 call 7ffd34363010 call 7ffd34356db0 call 7ffd3436d1f0 call 7ffd3436d218 5079->5173 5080->5086 5086->5053 5091->5058 5135 7ffd3436dfa5-7ffd3436e097 call 7ffd34356db0 call 7ffd3436d128 call 7ffd34356db0 call 7ffd3436d150 call 7ffd34356db0 call 7ffd34363260 5091->5135 5141 7ffd3436e17f-7ffd3436e1dc call 7ffd34356db0 call 7ffd3436d100 5098->5141 5142 7ffd3436e146-7ffd3436e17d call 7ffd34356db0 call 7ffd3436d0b0 5098->5142 5111->5112 5117 7ffd3436d87c-7ffd3436d8a7 call 7ffd34356db0 5111->5117 5112->5055 5118 7ffd3436db23-7ffd3436db2e 5112->5118 5114->5067 5132 7ffd3436d8a9 5117->5132 5118->5055 5122 7ffd3436db34-7ffd3436db5a call 7ffd34368b80 call 7ffd34368c60 5118->5122 5122->5055 5153 7ffd3436db60-7ffd3436db7b call 7ffd34368d30 5122->5153 5145 7ffd3436d8b4-7ffd3436da75 call 7ffd3436d128 call 7ffd34356db0 call 7ffd3436d150 call 7ffd34356db0 call 7ffd34363260 call 7ffd34356db0 call 7ffd34363260 call 7ffd34356db0 call 7ffd34363260 call 7ffd34356db0 call 7ffd3436d178 call 7ffd34356db0 call 7ffd34363360 5132->5145 5135->5058 5243 7ffd3436e099-7ffd3436e0a7 5135->5243 5151 7ffd3436e3d6-7ffd3436e4da call 7ffd3436a858 call 7ffd3436cfe8 call 7ffd3436d010 call 7ffd3436d038 call 7ffd3436d060 call 7ffd34361b40 5137->5151 5141->5061 5190 7ffd3436e1e2-7ffd3436e1ea 5141->5190 5142->5141 5292 7ffd3436da77-7ffd3436dac1 call 7ffd34356db0 call 7ffd34363360 5145->5292 5293 7ffd3436dac8-7ffd3436db17 call 7ffd34356db0 call 7ffd34363260 5145->5293 5276 7ffd3436e4dc-7ffd3436e4e7 5151->5276 5277 7ffd3436e4e9-7ffd3436e4fd call 7ffd343642f0 5151->5277 5171 7ffd3436db91-7ffd3436dbd3 call 7ffd34356db0 call 7ffd3436a1a0 5153->5171 5172 7ffd3436db7d-7ffd3436db89 5153->5172 5199 7ffd3436deef-7ffd3436df03 call 7ffd34368c60 5171->5199 5200 7ffd3436dbd9-7ffd3436dbe4 5171->5200 5172->5171 5279 7ffd3436d6f2-7ffd3436d6f8 5173->5279 5280 7ffd3436d6e0-7ffd3436d6ee 5173->5280 5190->5061 5195 7ffd3436e1f0-7ffd3436e2a3 call 7ffd34356db0 call 7ffd3436d128 call 7ffd34356db0 call 7ffd3436d150 5190->5195 5195->5061 5199->5055 5199->5153 5205 7ffd3436e340-7ffd3436e341 5200->5205 5206 7ffd3436dbea-7ffd3436dbfb 5200->5206 5205->5077 5206->5199 5243->5058 5281 7ffd3436e4ff-7ffd3436e55d call 7ffd3436d088 5276->5281 5277->5281 5279->5086 5285 7ffd3436d6fe-7ffd3436d73c call 7ffd34356db0 call 7ffd3436a1a0 5279->5285 5280->5279 5285->5086 5303 7ffd3436d742-7ffd3436d782 5285->5303 5292->5293 5293->5112 5311 7ffd3436d784-7ffd3436d78c 5303->5311 5312 7ffd3436d790-7ffd3436d7c9 5303->5312 5311->5312 5312->5086
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 8E4$;Q_A$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-3191074168
                                                                          • Opcode ID: 469b1435d6859379b4c3a85f4ec537e4791f8618a761522307ec7385ce5fc5d1
                                                                          • Instruction ID: 20d377158689e5d7c401855b0559ee4c1d35e1a338e385938204315af9cfccb3
                                                                          • Opcode Fuzzy Hash: 469b1435d6859379b4c3a85f4ec537e4791f8618a761522307ec7385ce5fc5d1
                                                                          • Instruction Fuzzy Hash: 7892A13075CA4A4BE698FB1884E27B5B3D2FB9A324F40017ED54ED32D2DE3CA8459746
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID: CreateHeapmemcpy$AllocAttributesErrorFileLastMutex
                                                                          • String ID: $/i:S$SYNC$a Display implementation returned an error unexpectedly/rustc/f6e511eec7342f59a25f7c0534f1dbea00d01b14\library\alloc\src\string.rs
                                                                          • API String ID: 622075969-830671369
                                                                          • Opcode ID: 410052c8f563e268baf8f9bb690f9967612beb368af972c5d74a04c65992e04b
                                                                          • Instruction ID: d5de0fb91b2d5badbb4c8d66591c60f89901548f9976e7ac40e1bf8e4e4e8883
                                                                          • Opcode Fuzzy Hash: 410052c8f563e268baf8f9bb690f9967612beb368af972c5d74a04c65992e04b
                                                                          • Instruction Fuzzy Hash: A1F2717170EAC282EA71AB51F4507EAA362FB84780F404136DA8C67B9BDF7ED144CB44
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID: CloseHandle$memcpymemset
                                                                          • String ID: :$called `Result::unwrap()` on an `Err` value
                                                                          • API String ID: 3399779480-2450422549
                                                                          • Opcode ID: 1949d718701eb245e5e19fe9809a7876fca49a504e09f021527acdefe541dd75
                                                                          • Instruction ID: d1e62d43f4bd6bb5dec19833b8c2a8c5dfc077687aac8fac1bcf1c0da4be7ac4
                                                                          • Opcode Fuzzy Hash: 1949d718701eb245e5e19fe9809a7876fca49a504e09f021527acdefe541dd75
                                                                          • Instruction Fuzzy Hash: 8E237222A0EFC691FA719B54F4503EAA361FB84744F405236DACC62B96DF7DE284CB44

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 6291 7ffda338a040-7ffda338a085 memset 6292 7ffda338a08b-7ffda338a0c5 call 7ffda3387180 6291->6292 6293 7ffda338a271-7ffda338a278 6291->6293 6300 7ffda338a0c7-7ffda338a0ca 6292->6300 6301 7ffda338a0e0-7ffda338a0f0 call 7ffda34224c0 6292->6301 6295 7ffda338a27e-7ffda338a2b8 call 7ffda3387180 6293->6295 6296 7ffda338a491-7ffda338a503 AddVectoredExceptionHandler NtQueryInformationProcess call 7ffda338fe80 6293->6296 6309 7ffda338a2ba-7ffda338a2bd 6295->6309 6310 7ffda338a2e0-7ffda338a2f0 call 7ffda34224c0 6295->6310 6307 7ffda338a509-7ffda338a530 NtQuerySystemInformation 6296->6307 6308 7ffda338a93a-7ffda338a944 call 7ffda340f690 6296->6308 6304 7ffda338a0cc-7ffda338a0ce 6300->6304 6305 7ffda338a10d-7ffda338a137 call 7ffda34103a0 GetModuleHandleA 6300->6305 6301->6305 6324 7ffda338a0f2-7ffda338a0f8 6301->6324 6314 7ffda338a0d0-7ffda338a0d4 6304->6314 6329 7ffda338a139-7ffda338a144 LoadLibraryA 6305->6329 6330 7ffda338a14a-7ffda338a187 call 7ffda3387180 6305->6330 6317 7ffda338a536-7ffda338a560 6307->6317 6318 7ffda338a887-7ffda338a8bb call 7ffda338fe90 6307->6318 6322 7ffda338a949-7ffda338a981 call 7ffda341c8b0 6308->6322 6311 7ffda338a33c-7ffda338a358 call 7ffda34103a0 6309->6311 6312 7ffda338a2bf-7ffda338a2c1 6309->6312 6310->6311 6332 7ffda338a2f2-7ffda338a2f8 6310->6332 6344 7ffda338a35b-7ffda338a3a0 GetModuleHandleA call 7ffda3387180 6311->6344 6321 7ffda338a2d0-7ffda338a2d4 6312->6321 6323 7ffda338a0d6-7ffda338a0dc 6314->6323 6314->6324 6317->6318 6328 7ffda338a566-7ffda338a5bf 6317->6328 6345 7ffda338a8f6-7ffda338a914 6318->6345 6331 7ffda338a2d6-7ffda338a2dc 6321->6331 6321->6332 6342 7ffda338a986-7ffda338a99b 6322->6342 6323->6314 6334 7ffda338a0de 6323->6334 6324->6322 6336 7ffda338a0fe-7ffda338a109 GetModuleHandleA 6324->6336 6338 7ffda338a5c0-7ffda338a5cd 6328->6338 6329->6330 6339 7ffda338a915-7ffda338a932 6329->6339 6362 7ffda338a189-7ffda338a18c 6330->6362 6363 7ffda338a1a1-7ffda338a1b1 call 7ffda34224c0 6330->6363 6331->6321 6341 7ffda338a2de 6331->6341 6343 7ffda338a2fa-7ffda338a337 call 7ffda341c8b0 6332->6343 6332->6344 6334->6305 6336->6330 6346 7ffda338a10b 6336->6346 6347 7ffda338a5ce 6338->6347 6348 7ffda338a600-7ffda338a60c 6338->6348 6354 7ffda338a938 6339->6354 6355 7ffda338a85a-7ffda338a866 6339->6355 6341->6311 6364 7ffda338a99d-7ffda338a9ad call 7ffda338fe90 6342->6364 6365 7ffda338a9ff-7ffda338aa05 6342->6365 6343->6342 6368 7ffda338a3c1-7ffda338a3d1 call 7ffda34224c0 6344->6368 6369 7ffda338a3a2-7ffda338a3a5 6344->6369 6346->6329 6350 7ffda338a5cf-7ffda338a5da 6347->6350 6349 7ffda338a60e-7ffda338a61a 6348->6349 6348->6350 6361 7ffda338a63a-7ffda338a682 NtOpenThread 6349->6361 6357 7ffda338a6a7-7ffda338a6b4 6350->6357 6358 7ffda338a5e0-7ffda338a5eb 6350->6358 6354->6345 6360 7ffda338a8f1 call 7ffda338fe90 6355->6360 6378 7ffda338a6ba-7ffda338a6ec call 7ffda338fe90 6357->6378 6379 7ffda338a86b-7ffda338a86e 6357->6379 6358->6338 6367 7ffda338a5ed 6358->6367 6360->6345 6374 7ffda338a631-7ffda338a638 6361->6374 6375 7ffda338a684-7ffda338a696 6361->6375 6372 7ffda338a1fd-7ffda338a219 call 7ffda34103a0 6362->6372 6373 7ffda338a18e 6362->6373 6363->6372 6395 7ffda338a1b3-7ffda338a1b9 6363->6395 6364->6365 6370 7ffda338aa07-7ffda338aa46 call 7ffda338fe90 6365->6370 6371 7ffda338aa4b-7ffda338aa5e call 7ffda3433140 6365->6371 6367->6357 6386 7ffda338a41d-7ffda338a439 call 7ffda34103a0 6368->6386 6409 7ffda338a3d3-7ffda338a3d9 6368->6409 6385 7ffda338a3a7-7ffda338a3a9 6369->6385 6369->6386 6370->6371 6407 7ffda338a21c-7ffda338a22a GetProcAddress 6372->6407 6381 7ffda338a190-7ffda338a195 6373->6381 6374->6350 6374->6361 6391 7ffda338a698-7ffda338a6a2 call 7ffda33866a0 6375->6391 6392 7ffda338a620-7ffda338a62c 6375->6392 6412 7ffda338a6f0-7ffda338a6f6 6378->6412 6379->6318 6389 7ffda338a870-7ffda338a882 call 7ffda338fe90 6379->6389 6394 7ffda338a197-7ffda338a19d 6381->6394 6381->6395 6398 7ffda338a3b0-7ffda338a3b5 6385->6398 6413 7ffda338a43c-7ffda338a44a GetProcAddress 6386->6413 6389->6318 6391->6392 6392->6374 6394->6381 6405 7ffda338a19f 6394->6405 6406 7ffda338a1bb-7ffda338a1f8 call 7ffda341c8b0 6395->6406 6395->6407 6408 7ffda338a3b7-7ffda338a3bd 6398->6408 6398->6409 6405->6372 6406->6342 6417 7ffda338a7df-7ffda338a7fd 6407->6417 6418 7ffda338a230-7ffda338a245 6407->6418 6408->6398 6419 7ffda338a3bf 6408->6419 6409->6413 6420 7ffda338a3db-7ffda338a418 call 7ffda341c8b0 6409->6420 6414 7ffda338a6fc-7ffda338a70c NtGetContextThread 6412->6414 6415 7ffda338a7b0-7ffda338a7d4 6412->6415 6421 7ffda338a81d-7ffda338a83b 6413->6421 6422 7ffda338a450-7ffda338a465 6413->6422 6423 7ffda338a8bd-7ffda338a8df 6414->6423 6424 7ffda338a712-7ffda338a719 6414->6424 6425 7ffda338a7da 6415->6425 6426 7ffda338a8e1-7ffda338a8ee 6415->6426 6427 7ffda338a84e-7ffda338a854 6417->6427 6428 7ffda338a7ff-7ffda338a816 call 7ffda338fe90 6417->6428 6430 7ffda338a247-7ffda338a253 call 7ffda338fe90 6418->6430 6431 7ffda338a258-7ffda338a25e 6418->6431 6419->6386 6420->6342 6421->6427 6438 7ffda338a83d-7ffda338a849 call 7ffda338fe90 6421->6438 6433 7ffda338a467-7ffda338a473 call 7ffda338fe90 6422->6433 6434 7ffda338a478-7ffda338a47e 6422->6434 6423->6345 6423->6426 6435 7ffda338a71b-7ffda338a741 6424->6435 6436 7ffda338a74d-7ffda338a754 6424->6436 6425->6345 6426->6360 6427->6345 6427->6355 6428->6355 6451 7ffda338a818 6428->6451 6430->6431 6431->6293 6440 7ffda338a260-7ffda338a26c call 7ffda338fe90 6431->6440 6433->6434 6434->6296 6445 7ffda338a480-7ffda338a48c call 7ffda338fe90 6434->6445 6435->6436 6443 7ffda338a756-7ffda338a77c 6436->6443 6444 7ffda338a788-7ffda338a795 NtSetContextThread 6436->6444 6438->6427 6440->6293 6443->6444 6444->6423 6449 7ffda338a79b-7ffda338a7aa NtClose 6444->6449 6445->6296 6449->6412 6449->6415 6451->6345
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID: HandleModule$AddressContextInformationProcQueryThread$ExceptionHandlerLibraryLoadProcessSystemVectoredmemset
                                                                          • String ID: called `Result::unwrap()` on an `Err` value/rustc/f6e511eec7342f59a25f7c0534f1dbea00d01b14\library\alloc\src\collections\btree\navigate.rs
                                                                          • API String ID: 2177257871-362855569
                                                                          • Opcode ID: e45670c3bc7dfe4d6d85d0c5af0b219f249f79a7f3f1dde18880113d17d33a10
                                                                          • Instruction ID: 690d1d346e80a0403737944bd8e57c364b348f3cc7ab8e2755789b45a3eb962d
                                                                          • Opcode Fuzzy Hash: e45670c3bc7dfe4d6d85d0c5af0b219f249f79a7f3f1dde18880113d17d33a10
                                                                          • Instruction Fuzzy Hash: 53429431B0EB8282EA619B51E4603BAB7A2FF45784F044135DE8D67B97DF7EE0458708

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 6452 7ffd3435cef3-7ffd3435cf12 6455 7ffd3435cf61-7ffd3435cf7a 6452->6455 6456 7ffd3435cf14-7ffd3435ddee 6452->6456 6461 7ffd3435cfc9 6455->6461 6462 7ffd3435cf7c-7ffd3435cfa7 6455->6462 6459 7ffd3435ddf4-7ffd3435de1a call 7ffd3435d570 6456->6459 6460 7ffd3435df7c-7ffd3435dfbc call 7ffd34356db0 6456->6460 6485 7ffd3435dfc3-7ffd3435e041 call 7ffd34356db0 * 2 6459->6485 6486 7ffd3435de20-7ffd3435de73 call 7ffd3435d598 6459->6486 6460->6485 6464 7ffd3435d019-7ffd3435d041 6461->6464 6465 7ffd3435cfcc-7ffd3435d017 6461->6465 6474 7ffd343a3aa0-7ffd343a3ab0 6462->6474 6487 7ffd3435d043-7ffd3435d049 6464->6487 6488 7ffd3435d0b7-7ffd3435d0be 6464->6488 6465->6464 6476 7ffd343a3aca-7ffd343a3ace 6474->6476 6477 7ffd343a3ab2-7ffd343a3ac5 call 7ffd343a2dc0 6474->6477 6483 7ffd343a3adc-7ffd343a3ae9 6476->6483 6484 7ffd343a3ad0-7ffd343a3adb 6476->6484 6477->6476 6491 7ffd343a3f49-7ffd343a3ff7 call 7ffd34354340 6483->6491 6492 7ffd343a3aef-7ffd343a3b02 6483->6492 6568 7ffd3435e043 6485->6568 6569 7ffd3435e045-7ffd3435e082 call 7ffd343530d0 6485->6569 6595 7ffd3435de7a-7ffd3435de81 6486->6595 6596 7ffd3435de75-7ffd3435de78 6486->6596 6489 7ffd3435d0bf-7ffd3435d0c2 6487->6489 6490 7ffd3435d04b-7ffd3435d07a 6487->6490 6488->6489 6500 7ffd3435d0d3-7ffd3435d0d6 6488->6500 6508 7ffd3435d111-7ffd3435d112 6489->6508 6509 7ffd3435d0c4 6489->6509 6527 7ffd3435d0c9 6490->6527 6528 7ffd3435d07c-7ffd3435d0ae 6490->6528 6547 7ffd343a52b0-7ffd343a52b9 6491->6547 6495 7ffd343a3b10-7ffd343a3b1b 6492->6495 6496 7ffd343a3b04-7ffd343a3b0f 6492->6496 6503 7ffd343a3d72-7ffd343a3d97 call 7ffd3439c538 6495->6503 6504 7ffd343a3b21-7ffd343a3b2d 6495->6504 6513 7ffd3435d0e8-7ffd3435d0ee 6500->6513 6514 7ffd3435d0d8 6500->6514 6533 7ffd343a3d9e-7ffd343a3dc3 call 7ffd3439c538 6503->6533 6504->6491 6510 7ffd343a3b33-7ffd343a3b4e 6504->6510 6516 7ffd3435d161-7ffd3435d19f 6508->6516 6517 7ffd3435d114-7ffd3435d116 6508->6517 6518 7ffd3435d0c5-7ffd3435d0c6 6509->6518 6520 7ffd343a3b5c-7ffd343a3b60 6510->6520 6521 7ffd343a3b50-7ffd343a3b5b 6510->6521 6543 7ffd3435d0ef-7ffd3435d0f5 6513->6543 6525 7ffd3435d0da 6514->6525 6553 7ffd3435d1aa-7ffd3435d1bc call 7ffd3435bb50 6516->6553 6538 7ffd3435d119-7ffd3435d120 6517->6538 6518->6525 6526 7ffd3435d0c8 6518->6526 6532 7ffd343a3b66-7ffd343a3b72 6520->6532 6520->6533 6541 7ffd3435d129-7ffd3435d147 6525->6541 6542 7ffd3435d0dc-7ffd3435d0de 6525->6542 6526->6527 6527->6538 6539 7ffd3435d0cc-7ffd3435d0d0 6527->6539 6528->6518 6589 7ffd3435d0b0-7ffd3435d0b6 6528->6589 6532->6491 6544 7ffd343a3b78-7ffd343a3b93 6532->6544 6566 7ffd343a3dca-7ffd343a3def call 7ffd3439c538 6533->6566 6538->6547 6539->6500 6560 7ffd3435d149-7ffd3435d15f 6541->6560 6542->6543 6550 7ffd3435d0e0-7ffd3435d0e6 6542->6550 6552 7ffd3435d0f6-7ffd3435d0fa 6543->6552 6554 7ffd343a3b95-7ffd343a3b9a 6544->6554 6555 7ffd343a3b9f-7ffd343a3ba3 6544->6555 6562 7ffd343a52c8-7ffd343a52cc 6547->6562 6563 7ffd343a52bb-7ffd343a52c0 6547->6563 6550->6513 6550->6552 6552->6560 6590 7ffd3435d0fc-7ffd3435d10e 6552->6590 6579 7ffd3435d1c1-7ffd3435d1f7 6553->6579 6565 7ffd343a3d6b-7ffd343a3d71 6554->6565 6555->6566 6567 7ffd343a3ba9-7ffd343a3bb5 6555->6567 6560->6516 6574 7ffd343a52c2-7ffd343a52c7 6562->6574 6578 7ffd343a52ce-7ffd343a530a call 7ffd34356db0 call 7ffd3435e660 6562->6578 6563->6574 6575 7ffd343a5311-7ffd343a53a2 call 7ffd34356db0 call 7ffd3435e660 call 7ffd343530d0 6563->6575 6593 7ffd343a3df6-7ffd343a3e1b call 7ffd3439c538 6566->6593 6567->6491 6580 7ffd343a3bbb-7ffd343a3bd6 6567->6580 6568->6569 6585 7ffd3435e085-7ffd3435e0b4 6568->6585 6578->6575 6581 7ffd343a3bd8-7ffd343a3bdd 6580->6581 6582 7ffd343a3be2-7ffd343a3be6 6580->6582 6581->6565 6582->6593 6594 7ffd343a3bec-7ffd343a3bf8 6582->6594 6585->6474 6589->6488 6589->6539 6590->6508 6624 7ffd343a3e22-7ffd343a3e47 call 7ffd3439c538 6593->6624 6594->6491 6603 7ffd343a3bfe-7ffd343a3c19 6594->6603 6605 7ffd3435de83-7ffd3435dea7 call 7ffd3435d658 6595->6605 6606 7ffd3435dea9-7ffd3435dec8 call 7ffd3435d5c0 6595->6606 6596->6595 6614 7ffd343a3c25-7ffd343a3c29 6603->6614 6615 7ffd343a3c1b-7ffd343a3c20 6603->6615 6646 7ffd3435decd-7ffd3435deec 6605->6646 6606->6646 6623 7ffd343a3c2f-7ffd343a3c3b 6614->6623 6614->6624 6615->6565 6623->6491 6629 7ffd343a3c41-7ffd343a3c5c 6623->6629 6643 7ffd343a3e4e-7ffd343a3e73 call 7ffd3439c538 6624->6643 6635 7ffd343a3c68-7ffd343a3c6c 6629->6635 6636 7ffd343a3c5e-7ffd343a3c63 6629->6636 6635->6643 6644 7ffd343a3c72-7ffd343a3c7e 6635->6644 6636->6565 6660 7ffd343a3e7a-7ffd343a3e9f call 7ffd3439c538 6643->6660 6644->6491 6649 7ffd343a3c84-7ffd343a3c9f 6644->6649 6646->6460 6653 7ffd343a3cab-7ffd343a3caf 6649->6653 6654 7ffd343a3ca1-7ffd343a3ca6 6649->6654 6659 7ffd343a3cb5-7ffd343a3cc1 6653->6659 6653->6660 6654->6565 6659->6491 6663 7ffd343a3cc7-7ffd343a3ce2 6659->6663 6668 7ffd343a3ea6-7ffd343a3ecb call 7ffd3439c538 6660->6668 6665 7ffd343a3cee-7ffd343a3cf2 6663->6665 6666 7ffd343a3ce4-7ffd343a3ce9 6663->6666 6665->6668 6669 7ffd343a3cf8-7ffd343a3d04 6665->6669 6666->6565 6678 7ffd343a3ed2-7ffd343a3ef7 call 7ffd3439c538 6668->6678 6669->6491 6672 7ffd343a3d0a-7ffd343a3d25 6669->6672 6674 7ffd343a3d27-7ffd343a3d2c 6672->6674 6675 7ffd343a3d2e-7ffd343a3d32 6672->6675 6674->6565 6677 7ffd343a3d38-7ffd343a3d3f 6675->6677 6675->6678 6677->6491 6681 7ffd343a3d45-7ffd343a3d60 6677->6681 6684 7ffd343a3efe-7ffd343a3f48 call 7ffd3439c510 6678->6684 6683 7ffd343a3d66 6681->6683 6681->6684 6683->6565 6684->6491
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$^$x~E4
                                                                          • API String ID: 0-730899913
                                                                          • Opcode ID: baeda2051e73de203ee980ef7780c0fd449ab88b14c4372893cef057fa37274f
                                                                          • Instruction ID: dbcf8ef445d473a7962babbd20bb2e8cd2a07788186ba950cdea261d47e713b2
                                                                          • Opcode Fuzzy Hash: baeda2051e73de203ee980ef7780c0fd449ab88b14c4372893cef057fa37274f
                                                                          • Instruction Fuzzy Hash: 0A725821B5DA4A4FEB98B76894B51F973D1EF96310B0442BAD04EC72D3DE3CB8429781
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@}A4$H$H*54$h~A4
                                                                          • API String ID: 0-1500607289
                                                                          • Opcode ID: 06753ab8fb17db45db8c4c26db36d13f96b872667bcedeebb2a7849f024f33b2
                                                                          • Instruction ID: 4d162139ae588c747f70786fdb7f915f68137b1abcb458eaa5ed0781b1154b96
                                                                          • Opcode Fuzzy Hash: 06753ab8fb17db45db8c4c26db36d13f96b872667bcedeebb2a7849f024f33b2
                                                                          • Instruction Fuzzy Hash: 9922277668D7890FE35AAB2488651B47BD1EF83224F0501FBD58DCB0A3DE2D78069352
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: z84$0YM4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$z=N4$TM4
                                                                          • API String ID: 0-1324440660
                                                                          • Opcode ID: 1d13c19fc5e99ee3d75c9e6495b7022e7a13f4b2fb5ddd65ad533c5a8bb5b021
                                                                          • Instruction ID: e452dc5236fe7af7843486b1b2f97a8f963c18bbf55acee1e1936b11b9c6dcf9
                                                                          • Opcode Fuzzy Hash: 1d13c19fc5e99ee3d75c9e6495b7022e7a13f4b2fb5ddd65ad533c5a8bb5b021
                                                                          • Instruction Fuzzy Hash: E842B531B5CA194FDB94FB5C98A26B9B3D1FB9A314B0001BAD14DD3292DE3CBC429785
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID: Process$CurrentPrng
                                                                          • String ID:
                                                                          • API String ID: 716580790-0
                                                                          • Opcode ID: 4e1d21dcb0f84e24a9a07dff92e70f91c53a1ae1f6bcaa5b1fac968b579dc2e7
                                                                          • Instruction ID: c5297fd14fff288f514d60458cc0a0aae4dc5dadda519aa7a0eefd68a92b9423
                                                                          • Opcode Fuzzy Hash: 4e1d21dcb0f84e24a9a07dff92e70f91c53a1ae1f6bcaa5b1fac968b579dc2e7
                                                                          • Instruction Fuzzy Hash: C2221623B0AA828AE714AF21D4603BD37A2BB047D8F144A36EE5D57BD6DF7ED5418304
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 1M_^$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-1136826106
                                                                          • Opcode ID: 9b31750a00e79469ca660b6da72a3128e4b2c6d7cb0bcac07d3e0e9f717d2c10
                                                                          • Instruction ID: 0c0e966a99079afe70eacb59d5fc52e342d4b933755ca07bd34b26392a81a64c
                                                                          • Opcode Fuzzy Hash: 9b31750a00e79469ca660b6da72a3128e4b2c6d7cb0bcac07d3e0e9f717d2c10
                                                                          • Instruction Fuzzy Hash: 4B02E316B0E5A71AEE64B7ACA4F31FA7794DF43338B0802B6D5CCDB283DC1D68465285
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (C^4$@3A4$@3A4$htE4$htE4$htE4
                                                                          • API String ID: 0-666281828
                                                                          • Opcode ID: 24a50f50b35fd25e8d2297f7be43c434d340bcde0a29412a38970708b0a6ddcb
                                                                          • Instruction ID: dea697ccab4d91ec68b987d15f6195293657b7b103e561e43ca6cd4290b8785a
                                                                          • Opcode Fuzzy Hash: 24a50f50b35fd25e8d2297f7be43c434d340bcde0a29412a38970708b0a6ddcb
                                                                          • Instruction Fuzzy Hash: AFC1F521B1DA494FE795EB2884F62B9B7D2FF9A310B4401BED04EC72D3CE2DA8419741
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 1M_^$@3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2794628847
                                                                          • Opcode ID: da5fc59ae75478c45f7e8a37bf9b27fe75fec16ade27c2fc0d05f8c8083b3bb8
                                                                          • Instruction ID: 5b9001a485a29f9466a44901b9802ecf1193bd7562439e58e24e1d65e3140e85
                                                                          • Opcode Fuzzy Hash: da5fc59ae75478c45f7e8a37bf9b27fe75fec16ade27c2fc0d05f8c8083b3bb8
                                                                          • Instruction Fuzzy Hash: 41A1F226B0D5971AEE58B7AC64F31FA77D4EF53338B0802BAD58DC7283DC1D68425285
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2486409910
                                                                          • Opcode ID: 916d88c6b5d0335b46b2cb9857036a6d9f1e45103f1e849756c4f1e18c9661a8
                                                                          • Instruction ID: 00cc7c0f88b4c0eace4138912e05f307ea9e68ce8ff7e2c108708b91b3dceab7
                                                                          • Opcode Fuzzy Hash: 916d88c6b5d0335b46b2cb9857036a6d9f1e45103f1e849756c4f1e18c9661a8
                                                                          • Instruction Fuzzy Hash: AA12B330B589198FEB84FB18C4E6AB973E1FF99314B404279D50DC3292DE3DB8419B85
                                                                          APIs
                                                                          • BCryptGenRandom.BCRYPT(?,?,?,00007FFDA3399CF5,?,?,?,00007FFDA33875E3), ref: 00007FFDA339A1F2
                                                                          • SystemFunction036.ADVAPI32(?,?,?,00007FFDA3399CF5,?,?,?,00007FFDA33875E3), ref: 00007FFDA339A205
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID: CryptFunction036RandomSystem
                                                                          • String ID:
                                                                          • API String ID: 1232939966-0
                                                                          • Opcode ID: c031059723b10d59420d2a20c74ec451050b05ffebddda9da0033cc7770c6797
                                                                          • Instruction ID: 8ee1dd7c6a76fe78c72b7f9f149a05870d70875edc530b5ce6636ccee045747c
                                                                          • Opcode Fuzzy Hash: c031059723b10d59420d2a20c74ec451050b05ffebddda9da0033cc7770c6797
                                                                          • Instruction Fuzzy Hash: 6AF0B452F0F95945FE7934662E6457590430F297F0D288335AD3DABBE7AC6AE8432208
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: M_L
                                                                          • API String ID: 0-290739141
                                                                          • Opcode ID: cb684a89223f5b3c5f4bbfe8e62a1c119686d86beab365819887d2415a301128
                                                                          • Instruction ID: 651253334393ce5c45c486008080adda8dfa7f525706e782b933d8add8cf6101
                                                                          • Opcode Fuzzy Hash: cb684a89223f5b3c5f4bbfe8e62a1c119686d86beab365819887d2415a301128
                                                                          • Instruction Fuzzy Hash: 12720631B4C9494FEB68EA58C8A66B873D1FF95310F1402F9D55EC7292DE38BC468782
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e42d62b76ce351cc3b2edb9238a129efda5f09f15fbd608db181a48d2dadf99d
                                                                          • Instruction ID: 1d5ac943eab38defd9c498d6c9702fef79eda5b313722a63b8b79b52e432475b
                                                                          • Opcode Fuzzy Hash: e42d62b76ce351cc3b2edb9238a129efda5f09f15fbd608db181a48d2dadf99d
                                                                          • Instruction Fuzzy Hash: FD72A870A0DA498FDB96EF28C4A4AB57BE1FF66304F1441E9D04EC7292DE39E846C741
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9f4757f0412d2c8b6c09c0bc7c2686323dc33c5aab3f43f7445f055b145d1347
                                                                          • Instruction ID: 47da3bf244091c27d6644114e0a7985bede75945272ff703550ba5f9142d3c5e
                                                                          • Opcode Fuzzy Hash: 9f4757f0412d2c8b6c09c0bc7c2686323dc33c5aab3f43f7445f055b145d1347
                                                                          • Instruction Fuzzy Hash: B2F17111F5DE4F0BEAE7AA2804F517D26D2EF97290B5800BBD64DC72C3DD2CB806A245
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 08b0eee25f199c8d9cc694ba3adba5395537488074a06e6a4d499b38133c56e4
                                                                          • Instruction ID: 0041ff28179dccefbec2c66b75bd6bfe393a0e74d3748fdb82a973585c3b471b
                                                                          • Opcode Fuzzy Hash: 08b0eee25f199c8d9cc694ba3adba5395537488074a06e6a4d499b38133c56e4
                                                                          • Instruction Fuzzy Hash: BCF1D471B0891D4FEB68EA6C889577873D1FB99311F1402B9D99ED3292DE38BC438781
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 129689170d262ea574d0a749edae01c7bae68435ff25eeac55bd2b55f1078519
                                                                          • Instruction ID: 985f15d58e28c4c24a9e067a8bc355c2660b1f9625b48610e1b70b9c28931373
                                                                          • Opcode Fuzzy Hash: 129689170d262ea574d0a749edae01c7bae68435ff25eeac55bd2b55f1078519
                                                                          • Instruction Fuzzy Hash: C6918471A1894E9FE798EB58D8A67A97BE1FB55315F40017AD00DD33A2CE7D2805CB80
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b3edf6d7fb55ec98be2c54e9b3f802fc3b9f5e6acc22f916113606c89b8412cc
                                                                          • Instruction ID: 0c9f6d7b9850984ce52aadfe6dbb78dff990acc7372d4cb344563d82769249cf
                                                                          • Opcode Fuzzy Hash: b3edf6d7fb55ec98be2c54e9b3f802fc3b9f5e6acc22f916113606c89b8412cc
                                                                          • Instruction Fuzzy Hash: D051F421A4D6C50FE792A76894A03A53BE2EFCB320F0901FBC149CB193CE7D68469751

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 2774 7ffd34355829-7ffd34355851 2776 7ffd34355853 2774->2776 2777 7ffd34355817-7ffd34355826 call 7ffd34354340 2774->2777 2779 7ffd343558cd-7ffd34355903 call 7ffd34352bc8 call 7ffd34352bf0 2776->2779 2780 7ffd34355855-7ffd343558a9 call 7ffd34352a68 call 7ffd34352a90 2776->2780 2794 7ffd34355929-7ffd34355957 call 7ffd34352c18 2779->2794 2795 7ffd34355905-7ffd34355928 call 7ffd34355520 2779->2795 2799 7ffd343558ae-7ffd343558cb 2780->2799 2808 7ffd343559fd-7ffd34355a2b call 7ffd34354390 2794->2808 2809 7ffd3435595d-7ffd34355968 2794->2809 2795->2794 2799->2779 2816 7ffd34355a2e-7ffd34355a52 call 7ffd343554d8 2808->2816 2827 7ffd34356455-7ffd34356478 call 7ffd343543b8 2808->2827 2811 7ffd3435596a-7ffd34355987 2809->2811 2812 7ffd343559bb-7ffd343559c6 2809->2812 2818 7ffd343559b2-7ffd343559ba 2811->2818 2819 7ffd34355989-7ffd343559b0 2811->2819 2812->2816 2817 7ffd343559c8-7ffd343559fc call 7ffd343554b0 2812->2817 2816->2827 2817->2808 2818->2812 2819->2812 2840 7ffd3435647e-7ffd343564a1 call 7ffd343543b8 2827->2840 2841 7ffd34355a57-7ffd34355a89 call 7ffd343543e0 2827->2841 2840->2827 2852 7ffd343564a3-7ffd343564ae 2840->2852 2850 7ffd34355ab0-7ffd34355abb 2841->2850 2851 7ffd34355a8b-7ffd34355aaf call 7ffd34354408 2841->2851 2855 7ffd34355ae2-7ffd34355aed 2850->2855 2856 7ffd34355abd-7ffd34355ae1 call 7ffd34354408 2850->2856 2851->2850 2859 7ffd34356470-7ffd34356478 call 7ffd343543b8 2852->2859 2860 7ffd343564b0-7ffd343564df call 7ffd34354340 2852->2860 2857 7ffd34355b13-7ffd34355b1e 2855->2857 2858 7ffd34355aef-7ffd34355b0e call 7ffd34354430 2855->2858 2856->2855 2864 7ffd34355b8f-7ffd34355beb call 7ffd34354480 2857->2864 2865 7ffd34355b20-7ffd34355b44 call 7ffd34354458 2857->2865 2858->2857 2859->2840 2859->2841 2884 7ffd343564e1-7ffd34356522 call 7ffd34355438 2860->2884 2895 7ffd34355bf1-7ffd34355c14 call 7ffd343544a8 2864->2895 2896 7ffd34355b68-7ffd34355b83 2864->2896 2865->2864 2897 7ffd34356693-7ffd343566ae 2884->2897 2898 7ffd34356528-7ffd3435652a 2884->2898 2913 7ffd34355c1a-7ffd34355c26 2895->2913 2914 7ffd34355b46-7ffd34355b61 2895->2914 2909 7ffd34355b8a 2896->2909 2912 7ffd343566b5-7ffd343566d7 2897->2912 2898->2897 2901 7ffd34356530-7ffd34356532 2898->2901 2901->2884 2903 7ffd34356534-7ffd3435655e call 7ffd34355460 2901->2903 2903->2912 2923 7ffd34356564-7ffd3435657d 2903->2923 2909->2864 2939 7ffd343566d8-7ffd343566e7 call 7ffd343543b8 2912->2939 2921 7ffd34355c7a-7ffd34355c82 2913->2921 2922 7ffd34355c28-7ffd34355c78 call 7ffd34354b78 2913->2922 2914->2896 2934 7ffd34355c84-7ffd34355cd5 call 7ffd34355540 call 7ffd343544d0 2921->2934 2935 7ffd34355cd6-7ffd34355d4c call 7ffd343544f8 call 7ffd34354520 2921->2935 2922->2921 2928 7ffd343565d2-7ffd3435666a call 7ffd34355488 call 7ffd343554b0 2923->2928 2929 7ffd3435657f-7ffd343565b4 call 7ffd34355438 2923->2929 2984 7ffd3435666f 2928->2984 2953 7ffd343565b9-7ffd343565c0 2929->2953 2934->2935 2935->2909 2978 7ffd34355d52-7ffd34355e97 call 7ffd34354548 call 7ffd34354570 call 7ffd34354598 2935->2978 2939->2852 2952 7ffd343566ed 2939->2952 2952->2827 2957 7ffd34356671-7ffd3435668c 2953->2957 2958 7ffd343565c6-7ffd343565c8 2953->2958 2957->2897 2958->2957 2962 7ffd343565ce-7ffd343565d0 2958->2962 2962->2928 2962->2929 3003 7ffd34355f14-7ffd34355f1f call 7ffd34354610 2978->3003 3004 7ffd34355e99-7ffd34355ed6 call 7ffd343545e8 2978->3004 2984->2939 3009 7ffd34355f21-7ffd34356295 call 7ffd34354730 call 7ffd34354838 call 7ffd34354860 call 7ffd34354888 call 7ffd343548b0 call 7ffd343548d8 call 7ffd34354900 call 7ffd34354928 call 7ffd34354950 call 7ffd34354978 call 7ffd343549a0 call 7ffd343549c8 call 7ffd343549f0 call 7ffd34354a18 call 7ffd34354a40 call 7ffd34354a68 call 7ffd34354a90 call 7ffd34354ab8 call 7ffd34354ae0 call 7ffd34354b08 call 7ffd34354b30 call 7ffd34354b58 call 7ffd34355398 3003->3009 3010 7ffd343562e8-7ffd34356316 call 7ffd34354610 call 7ffd343544d0 3003->3010 3014 7ffd34355f04-7ffd34355f10 3004->3014 3015 7ffd34355ed8-7ffd34355ee9 call 7ffd34350468 3004->3015 3148 7ffd3435629a-7ffd343562e3 call 7ffd343553c0 call 7ffd343553e8 3009->3148 3026 7ffd3435632f-7ffd343563bb call 7ffd34354750 call 7ffd343544f8 call 7ffd34354798 call 7ffd34354610 call 7ffd343544d0 3010->3026 3027 7ffd34356318-7ffd3435632d 3010->3027 3014->3003 3019 7ffd34355eee-7ffd34355f02 3015->3019 3019->3014 3057 7ffd343563d4-7ffd3435644f call 7ffd343547c0 call 7ffd343547e8 call 7ffd34354610 call 7ffd34354810 3026->3057 3058 7ffd343563bd-7ffd343563d2 3026->3058 3027->3026 3089 7ffd34356454 3057->3089 3058->3057 3089->2827 3148->3010
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: :$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@}A4$H$H*54
                                                                          • API String ID: 0-2302672141
                                                                          • Opcode ID: 12733a09eb1587f1d29658bf825afc7bd60aff60cea72a49324f3890e14ad7c9
                                                                          • Instruction ID: b16d563f45f10d15ed73b88426a76503d1538dd6ed4e9119026920954b466f91
                                                                          • Opcode Fuzzy Hash: 12733a09eb1587f1d29658bf825afc7bd60aff60cea72a49324f3890e14ad7c9
                                                                          • Instruction Fuzzy Hash: D592D562B5D98A4BEB98F75884B22B4A2C2FF9A750F4402FAD10DD33C3DD2D78415786

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 3156 7ffd34355e68-7ffd34355e98 call 7ffd343545c0 call 7ffd343545e8 3163 7ffd34355e9a-7ffd34355ea5 3156->3163 3164 7ffd34355ec6-7ffd34355ecc 3156->3164 3163->3164 3165 7ffd34355ecf-7ffd34355ed6 call 7ffd343545e8 3163->3165 3164->3165 3168 7ffd34355f04-7ffd34355f10 3165->3168 3169 7ffd34355ed8-7ffd34355ee9 call 7ffd34350468 3165->3169 3173 7ffd34355f14-7ffd34355f1f call 7ffd34354610 3168->3173 3171 7ffd34355eee-7ffd34355f02 3169->3171 3171->3168 3177 7ffd34355f21-7ffd34355f2c 3173->3177 3178 7ffd343562e8-7ffd34356316 call 7ffd34354610 call 7ffd343544d0 3173->3178 3180 7ffd34355f2e-7ffd34355f3a call 7ffd34354730 3177->3180 3187 7ffd3435632f-7ffd343563bb call 7ffd34354750 call 7ffd343544f8 call 7ffd34354798 call 7ffd34354610 call 7ffd343544d0 3178->3187 3188 7ffd34356318-7ffd3435632d 3178->3188 3184 7ffd34355f3f-7ffd34355f48 3180->3184 3191 7ffd34355f53-7ffd34355f5b call 7ffd34354838 3184->3191 3218 7ffd343563d4-7ffd34356439 call 7ffd343547c0 call 7ffd343547e8 call 7ffd34354610 3187->3218 3219 7ffd343563bd-7ffd343563d2 3187->3219 3188->3187 3194 7ffd34355f60-7ffd34355f93 call 7ffd34354860 3191->3194 3208 7ffd34355f9e-7ffd34355fa6 call 7ffd34354888 3194->3208 3212 7ffd34355fab-7ffd34355fde call 7ffd343548b0 3208->3212 3227 7ffd34355fe9-7ffd34355ff1 call 7ffd343548d8 3212->3227 3245 7ffd34356444-7ffd3435644f call 7ffd34354810 3218->3245 3219->3218 3231 7ffd34355ff6-7ffd3435604d call 7ffd34354900 call 7ffd34354928 3227->3231 3252 7ffd34356058-7ffd34356066 call 7ffd34354950 3231->3252 3250 7ffd34356454 3245->3250 3251 7ffd34356455-7ffd34356478 call 7ffd343543b8 3250->3251 3260 7ffd3435647e-7ffd343564a1 call 7ffd343543b8 3251->3260 3261 7ffd34355a57-7ffd34355a60 3251->3261 3255 7ffd3435606b-7ffd34356072 3252->3255 3258 7ffd34356074-7ffd34356087 call 7ffd34354978 3255->3258 3266 7ffd3435608c-7ffd34356122 call 7ffd343549a0 call 7ffd343549c8 call 7ffd343549f0 3258->3266 3260->3251 3277 7ffd343564a3-7ffd343564ae 3260->3277 3267 7ffd34355a6b-7ffd34355a78 call 7ffd343543e0 3261->3267 3335 7ffd3435612d-7ffd34356135 call 7ffd34354a18 3266->3335 3272 7ffd34355a7d-7ffd34355a89 3267->3272 3275 7ffd34355ab0-7ffd34355abb 3272->3275 3276 7ffd34355a8b-7ffd34355aaf call 7ffd34354408 3272->3276 3281 7ffd34355ae2-7ffd34355aed 3275->3281 3282 7ffd34355abd-7ffd34355ae1 call 7ffd34354408 3275->3282 3276->3275 3286 7ffd34356470-7ffd34356478 call 7ffd343543b8 3277->3286 3287 7ffd343564b0-7ffd343564df call 7ffd34354340 3277->3287 3284 7ffd34355b13-7ffd34355b1e 3281->3284 3285 7ffd34355aef-7ffd34355b0e call 7ffd34354430 3281->3285 3282->3281 3292 7ffd34355b8f-7ffd34355b96 3284->3292 3293 7ffd34355b20-7ffd34355b44 call 7ffd34354458 3284->3293 3285->3284 3286->3260 3286->3261 3316 7ffd343564e1-7ffd343564f2 3287->3316 3299 7ffd34355b98-7ffd34355bb0 3292->3299 3293->3292 3311 7ffd34355bbb-7ffd34355bd1 3299->3311 3323 7ffd34355bdc-7ffd34355be4 call 7ffd34354480 3311->3323 3324 7ffd343564fd-7ffd34356516 call 7ffd34355438 3316->3324 3329 7ffd34355be9-7ffd34355beb 3323->3329 3330 7ffd3435651b-7ffd34356522 3324->3330 3331 7ffd34355bf1-7ffd34355bfa 3329->3331 3332 7ffd34355b68-7ffd34355b83 3329->3332 3333 7ffd34356693-7ffd343566ae 3330->3333 3334 7ffd34356528-7ffd3435652a 3330->3334 3344 7ffd34355c05-7ffd34355c0d call 7ffd343544a8 3331->3344 3350 7ffd34355b8a 3332->3350 3353 7ffd343566b5-7ffd343566d7 3333->3353 3334->3333 3338 7ffd34356530-7ffd34356532 3334->3338 3342 7ffd3435613a-7ffd34356196 call 7ffd34354a40 call 7ffd34354a68 3335->3342 3338->3316 3341 7ffd34356534-7ffd3435655e call 7ffd34355460 3338->3341 3341->3353 3367 7ffd34356564-7ffd3435657d 3341->3367 3402 7ffd343561a1-7ffd343561a9 call 7ffd34354a90 3342->3402 3351 7ffd34355c12-7ffd34355c14 3344->3351 3350->3292 3355 7ffd34355c1a-7ffd34355c26 3351->3355 3356 7ffd34355b46-7ffd34355b61 3351->3356 3385 7ffd343566d8-7ffd343566e7 call 7ffd343543b8 3353->3385 3365 7ffd34355c7a-7ffd34355c82 3355->3365 3366 7ffd34355c28-7ffd34355c78 call 7ffd34354b78 3355->3366 3356->3332 3380 7ffd34355c84-7ffd34355cd5 call 7ffd34355540 call 7ffd343544d0 3365->3380 3381 7ffd34355cd6-7ffd34355d4c call 7ffd343544f8 call 7ffd34354520 3365->3381 3366->3365 3372 7ffd343565d2-7ffd34356654 call 7ffd34355488 3367->3372 3373 7ffd3435657f-7ffd34356590 3367->3373 3439 7ffd3435665f-7ffd3435666a call 7ffd343554b0 3372->3439 3390 7ffd3435659b-7ffd343565b4 call 7ffd34355438 3373->3390 3380->3381 3381->3350 3435 7ffd34355d52-7ffd34355d5f 3381->3435 3385->3277 3400 7ffd343566ed 3385->3400 3401 7ffd343565b9-7ffd343565c0 3390->3401 3400->3251 3406 7ffd34356671-7ffd3435668c 3401->3406 3407 7ffd343565c6-7ffd343565c8 3401->3407 3413 7ffd343561ae-7ffd343561e1 call 7ffd34354ab8 3402->3413 3406->3333 3407->3406 3412 7ffd343565ce-7ffd343565d0 3407->3412 3412->3372 3412->3373 3433 7ffd343561ec-7ffd343561f4 call 7ffd34354ae0 3413->3433 3438 7ffd343561f9-7ffd34356282 call 7ffd34354b08 call 7ffd34354b30 call 7ffd34354b58 3433->3438 3440 7ffd34355d6a-7ffd34355d8c call 7ffd34354548 3435->3440 3469 7ffd3435628d-7ffd34356295 call 7ffd34355398 3438->3469 3444 7ffd3435666f 3439->3444 3445 7ffd34355d91-7ffd34355e97 call 7ffd34354570 call 7ffd34354598 3440->3445 3444->3385 3445->3173 3483 7ffd34355e99-7ffd34355ea5 3445->3483 3472 7ffd3435629a-7ffd343562e3 call 7ffd343553c0 call 7ffd343553e8 3469->3472 3472->3178 3483->3165
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@}A4$H$H*54
                                                                          • API String ID: 0-3593054924
                                                                          • Opcode ID: e4fb6d264d59f2ea4e4521913bda22b2e289af01d428c4ed91afa0c53b195fc7
                                                                          • Instruction ID: 921b19063d65be490d2333b219ce3287bc667282a3e347ec57271499f78281c7
                                                                          • Opcode Fuzzy Hash: e4fb6d264d59f2ea4e4521913bda22b2e289af01d428c4ed91afa0c53b195fc7
                                                                          • Instruction Fuzzy Hash: FF22B362B9C98A4BF798F71884B22B4A2C2EFDA754B4402F9D10DD32D3DD3DB8415786

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 3486 7ffd34355ea8-7ffd34355ecc call 7ffd343545c0 3491 7ffd34355ecf-7ffd34355ed6 call 7ffd343545e8 3486->3491 3494 7ffd34355f04-7ffd34355f10 3491->3494 3495 7ffd34355ed8-7ffd34355ee9 call 7ffd34350468 3491->3495 3499 7ffd34355f14-7ffd34355f1f call 7ffd34354610 3494->3499 3497 7ffd34355eee-7ffd34355f02 3495->3497 3497->3494 3503 7ffd34355f21-7ffd34355f2c 3499->3503 3504 7ffd343562e8-7ffd34356316 call 7ffd34354610 call 7ffd343544d0 3499->3504 3506 7ffd34355f2e-7ffd34355f3a call 7ffd34354730 3503->3506 3513 7ffd3435632f-7ffd343563bb call 7ffd34354750 call 7ffd343544f8 call 7ffd34354798 call 7ffd34354610 call 7ffd343544d0 3504->3513 3514 7ffd34356318-7ffd3435632d 3504->3514 3510 7ffd34355f3f-7ffd34355f48 3506->3510 3517 7ffd34355f53-7ffd34355f5b call 7ffd34354838 3510->3517 3544 7ffd343563d4-7ffd34356439 call 7ffd343547c0 call 7ffd343547e8 call 7ffd34354610 3513->3544 3545 7ffd343563bd-7ffd343563d2 3513->3545 3514->3513 3520 7ffd34355f60-7ffd34355f93 call 7ffd34354860 3517->3520 3534 7ffd34355f9e-7ffd34355fa6 call 7ffd34354888 3520->3534 3538 7ffd34355fab-7ffd34355fde call 7ffd343548b0 3534->3538 3553 7ffd34355fe9-7ffd34355ff1 call 7ffd343548d8 3538->3553 3571 7ffd34356444-7ffd3435644f call 7ffd34354810 3544->3571 3545->3544 3557 7ffd34355ff6-7ffd3435604d call 7ffd34354900 call 7ffd34354928 3553->3557 3578 7ffd34356058-7ffd34356066 call 7ffd34354950 3557->3578 3576 7ffd34356454 3571->3576 3577 7ffd34356455-7ffd34356478 call 7ffd343543b8 3576->3577 3586 7ffd3435647e-7ffd343564a1 call 7ffd343543b8 3577->3586 3587 7ffd34355a57-7ffd34355a60 3577->3587 3581 7ffd3435606b-7ffd34356072 3578->3581 3584 7ffd34356074-7ffd34356087 call 7ffd34354978 3581->3584 3592 7ffd3435608c-7ffd34356122 call 7ffd343549a0 call 7ffd343549c8 call 7ffd343549f0 3584->3592 3586->3577 3603 7ffd343564a3-7ffd343564ae 3586->3603 3593 7ffd34355a6b-7ffd34355a78 call 7ffd343543e0 3587->3593 3661 7ffd3435612d-7ffd34356135 call 7ffd34354a18 3592->3661 3598 7ffd34355a7d-7ffd34355a89 3593->3598 3601 7ffd34355ab0-7ffd34355abb 3598->3601 3602 7ffd34355a8b-7ffd34355aaf call 7ffd34354408 3598->3602 3607 7ffd34355ae2-7ffd34355aed 3601->3607 3608 7ffd34355abd-7ffd34355ae1 call 7ffd34354408 3601->3608 3602->3601 3612 7ffd34356470-7ffd34356478 call 7ffd343543b8 3603->3612 3613 7ffd343564b0-7ffd343564df call 7ffd34354340 3603->3613 3610 7ffd34355b13-7ffd34355b1e 3607->3610 3611 7ffd34355aef-7ffd34355b0e call 7ffd34354430 3607->3611 3608->3607 3618 7ffd34355b8f-7ffd34355b96 3610->3618 3619 7ffd34355b20-7ffd34355b44 call 7ffd34354458 3610->3619 3611->3610 3612->3586 3612->3587 3642 7ffd343564e1-7ffd343564f2 3613->3642 3625 7ffd34355b98-7ffd34355bb0 3618->3625 3619->3618 3637 7ffd34355bbb-7ffd34355bd1 3625->3637 3649 7ffd34355bdc-7ffd34355be4 call 7ffd34354480 3637->3649 3650 7ffd343564fd-7ffd34356516 call 7ffd34355438 3642->3650 3655 7ffd34355be9-7ffd34355beb 3649->3655 3656 7ffd3435651b-7ffd34356522 3650->3656 3657 7ffd34355bf1-7ffd34355bfa 3655->3657 3658 7ffd34355b68-7ffd34355b83 3655->3658 3659 7ffd34356693-7ffd343566ae 3656->3659 3660 7ffd34356528-7ffd3435652a 3656->3660 3670 7ffd34355c05-7ffd34355c0d call 7ffd343544a8 3657->3670 3676 7ffd34355b8a 3658->3676 3679 7ffd343566b5-7ffd343566d7 3659->3679 3660->3659 3664 7ffd34356530-7ffd34356532 3660->3664 3668 7ffd3435613a-7ffd34356196 call 7ffd34354a40 call 7ffd34354a68 3661->3668 3664->3642 3667 7ffd34356534-7ffd3435655e call 7ffd34355460 3664->3667 3667->3679 3693 7ffd34356564-7ffd3435657d 3667->3693 3728 7ffd343561a1-7ffd343561a9 call 7ffd34354a90 3668->3728 3677 7ffd34355c12-7ffd34355c14 3670->3677 3676->3618 3681 7ffd34355c1a-7ffd34355c26 3677->3681 3682 7ffd34355b46-7ffd34355b61 3677->3682 3711 7ffd343566d8-7ffd343566e7 call 7ffd343543b8 3679->3711 3691 7ffd34355c7a-7ffd34355c82 3681->3691 3692 7ffd34355c28-7ffd34355c78 call 7ffd34354b78 3681->3692 3682->3658 3706 7ffd34355c84-7ffd34355cd5 call 7ffd34355540 call 7ffd343544d0 3691->3706 3707 7ffd34355cd6-7ffd34355d4c call 7ffd343544f8 call 7ffd34354520 3691->3707 3692->3691 3698 7ffd343565d2-7ffd34356654 call 7ffd34355488 3693->3698 3699 7ffd3435657f-7ffd34356590 3693->3699 3765 7ffd3435665f-7ffd3435666a call 7ffd343554b0 3698->3765 3716 7ffd3435659b-7ffd343565b4 call 7ffd34355438 3699->3716 3706->3707 3707->3676 3761 7ffd34355d52-7ffd34355d5f 3707->3761 3711->3603 3726 7ffd343566ed 3711->3726 3727 7ffd343565b9-7ffd343565c0 3716->3727 3726->3577 3732 7ffd34356671-7ffd3435668c 3727->3732 3733 7ffd343565c6-7ffd343565c8 3727->3733 3739 7ffd343561ae-7ffd343561e1 call 7ffd34354ab8 3728->3739 3732->3659 3733->3732 3738 7ffd343565ce-7ffd343565d0 3733->3738 3738->3698 3738->3699 3759 7ffd343561ec-7ffd343561f4 call 7ffd34354ae0 3739->3759 3764 7ffd343561f9-7ffd34356282 call 7ffd34354b08 call 7ffd34354b30 call 7ffd34354b58 3759->3764 3766 7ffd34355d6a-7ffd34355d8c call 7ffd34354548 3761->3766 3795 7ffd3435628d-7ffd34356295 call 7ffd34355398 3764->3795 3770 7ffd3435666f 3765->3770 3771 7ffd34355d91-7ffd34355e97 call 7ffd34354570 call 7ffd34354598 3766->3771 3770->3711 3771->3499 3809 7ffd34355e99-7ffd34355ea5 3771->3809 3798 7ffd3435629a-7ffd343562e3 call 7ffd343553c0 call 7ffd343553e8 3795->3798 3798->3504 3809->3491
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@}A4$H$H*54
                                                                          • API String ID: 0-1835446601
                                                                          • Opcode ID: bd66096c2956a1841ca4f0555d43749fcf6eca4c5b4bba571a62b817c03fffc0
                                                                          • Instruction ID: a1705d5f45c61f7fc566f11e1a1b5d4cfd9287d54c07eb1d3b5843900759e69c
                                                                          • Opcode Fuzzy Hash: bd66096c2956a1841ca4f0555d43749fcf6eca4c5b4bba571a62b817c03fffc0
                                                                          • Instruction Fuzzy Hash: 1E22B362B9C98A4BE798F71884B22B4A2C2EFDA750B4402F9D10DD33D3DD3DB8415786

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 6217 7ffda33d1830-7ffda33d187b call 7ffda33e0940 6220 7ffda33d1881-7ffda33d18b0 6217->6220 6221 7ffda33d1a3f-7ffda33d1a46 6217->6221 6223 7ffda33d18b7-7ffda33d1907 6220->6223 6224 7ffda33d18b2 CloseHandle 6220->6224 6222 7ffda33d1a67-7ffda33d1a7d 6221->6222 6225 7ffda33d1909-7ffda33d190b 6223->6225 6226 7ffda33d1956-7ffda33d1958 6223->6226 6224->6223 6227 7ffda33d1978-7ffda33d198b call 7ffda33dc570 6225->6227 6228 7ffda33d190d-7ffda33d191b call 7ffda33df930 6225->6228 6229 7ffda33d1999-7ffda33d19a8 WaitForSingleObject 6226->6229 6230 7ffda33d195a-7ffda33d196d call 7ffda33dc570 6226->6230 6242 7ffda33d1aac-7ffda33d1ad3 call 7ffda341c8b0 6227->6242 6243 7ffda33d1991 6227->6243 6236 7ffda33d1920-7ffda33d1923 6228->6236 6232 7ffda33d19aa-7ffda33d19b9 GetLastError 6229->6232 6233 7ffda33d19ef-7ffda33d19fd call 7ffda3432b0c 6229->6233 6249 7ffda33d1973-7ffda33d1976 6230->6249 6250 7ffda33d1a7e-7ffda33d1aaa call 7ffda341c8b0 6230->6250 6237 7ffda33d19ca-7ffda33d19d5 6232->6237 6238 7ffda33d19bb-7ffda33d19c5 call 7ffda338fe90 6232->6238 6248 7ffda33d1a02-7ffda33d1a04 6233->6248 6236->6229 6244 7ffda33d1925-7ffda33d1951 call 7ffda341c8b0 6236->6244 6246 7ffda33d19e6-7ffda33d19ed 6237->6246 6247 7ffda33d19d7-7ffda33d19e1 call 7ffda338fe90 6237->6247 6238->6237 6260 7ffda33d1ad8-7ffda33d1b3a call 7ffda339d2f0 CloseHandle 6242->6260 6251 7ffda33d1994 CloseHandle 6243->6251 6244->6260 6256 7ffda33d1a26-7ffda33d1a3a CloseHandle * 2 6246->6256 6247->6246 6248->6232 6257 7ffda33d1a06-7ffda33d1a22 6248->6257 6249->6251 6250->6260 6251->6229 6261 7ffda33d1a3c 6256->6261 6262 7ffda33d1a48-7ffda33d1a63 6256->6262 6257->6256 6267 7ffda33d1b4b-7ffda33d1b52 6260->6267 6268 7ffda33d1b3c-7ffda33d1b46 call 7ffda338fe90 6260->6268 6261->6221 6262->6222 6269 7ffda33d1b63-7ffda33d1bcb call 7ffda339db90 CloseHandle * 2 call 7ffda3433140 call 7ffda33e0940 6267->6269 6270 7ffda33d1b54-7ffda33d1b5e call 7ffda338fe90 6267->6270 6268->6267 6279 7ffda33d1bdc-7ffda33d1bf3 6269->6279 6280 7ffda33d1bcd-7ffda33d1bd7 6269->6280 6270->6269 6282 7ffda33d1bf5-7ffda33d1bf9 CloseHandle 6279->6282 6283 7ffda33d1bfe-7ffda33d1c0d WaitForSingleObject 6279->6283 6281 7ffda33d1c74-7ffda33d1c87 6280->6281 6282->6283 6284 7ffda33d1c27-7ffda33d1c3c GetExitCodeProcess 6283->6284 6285 7ffda33d1c0f-7ffda33d1c25 GetLastError 6283->6285 6284->6285 6287 7ffda33d1c3e-7ffda33d1c44 6284->6287 6286 7ffda33d1c46-7ffda33d1c5c CloseHandle * 2 6285->6286 6288 7ffda33d1c66-7ffda33d1c6a 6286->6288 6289 7ffda33d1c5e-7ffda33d1c61 CloseHandle 6286->6289 6287->6286 6288->6281 6290 7ffda33d1c6c-7ffda33d1c6f CloseHandle 6288->6290 6289->6288 6290->6281
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID: CloseHandle$ErrorLastObjectSingleWait
                                                                          • String ID: called `Result::unwrap()` on an `Err` value
                                                                          • API String ID: 1454876536-2333694755
                                                                          • Opcode ID: ab81b0607d95766b5d9cfa66bc362d198cee87a77d5559b4752dc2213c3f31e5
                                                                          • Instruction ID: 3407043023d76ea1fd503bd0bdd197377e319c1e9fbbf4e954eeaedaa4b6ed39
                                                                          • Opcode Fuzzy Hash: ab81b0607d95766b5d9cfa66bc362d198cee87a77d5559b4752dc2213c3f31e5
                                                                          • Instruction Fuzzy Hash: 09C18F32F09A868AEB54AF61E4603FC3762BB44788F144431EE4D67B9ADF7AD581C344

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 6695 7ffd3435f80d-7ffd3435f80e 6696 7ffd3435f810-7ffd3435f816 6695->6696 6697 7ffd3435f83b-7ffd3435f83e 6695->6697 6702 7ffd3435f842-7ffd3435f846 6696->6702 6703 7ffd3435f818-7ffd3435f81e 6696->6703 6698 7ffd3435f840-7ffd3435f851 6697->6698 6699 7ffd3435f865-7ffd3435f86d 6697->6699 6705 7ffd3435f853-7ffd3435f856 6698->6705 6706 7ffd3435f86e-7ffd3435f894 6698->6706 6699->6706 6707 7ffd3435f849 6702->6707 6703->6707 6715 7ffd3435f820-7ffd3435f826 6703->6715 6708 7ffd3435f857-7ffd3435f858 6705->6708 6710 7ffd3435f897-7ffd3436bee2 6706->6710 6709 7ffd3435f84a-7ffd3435f84e 6707->6709 6707->6710 6713 7ffd343767a0-7ffd3437682c call 7ffd34375358 call 7ffd3436c060 call 7ffd34365510 call 7ffd3437682d 6708->6713 6714 7ffd3435f850-7ffd343713f9 6709->6714 6744 7ffd3436bee4 6710->6744 6745 7ffd3436bee6-7ffd3436bee9 6710->6745 6722 7ffd343713fb-7ffd34371409 6714->6722 6723 7ffd3437140a-7ffd3437141c call 7ffd343651e0 6714->6723 6715->6714 6724 7ffd3435f828-7ffd3435f82e 6715->6724 6732 7ffd34371422-7ffd34371449 call 7ffd34371090 6723->6732 6733 7ffd343714cd-7ffd343714d1 6723->6733 6724->6708 6735 7ffd3435f830-7ffd3435f836 6724->6735 6775 7ffd3437144f-7ffd343714b6 call 7ffd343710b8 call 7ffd3435c700 call 7ffd3436c2a0 6732->6775 6776 7ffd3437183d-7ffd3437187c call 7ffd34356db0 6732->6776 6739 7ffd343714d3-7ffd343714f5 call 7ffd34371068 6733->6739 6740 7ffd34371505-7ffd34371509 6733->6740 6761 7ffd3435f85e 6735->6761 6762 7ffd3435f838-7ffd3435f83e 6735->6762 6772 7ffd343714fa-7ffd343714fe 6739->6772 6742 7ffd3437150b-7ffd3437153f call 7ffd34370f80 6740->6742 6743 7ffd34371545-7ffd34371549 6740->6743 6742->6743 6766 7ffd34371883-7ffd343718b5 call 7ffd34371040 6742->6766 6748 7ffd3437154f-7ffd34371553 6743->6748 6749 7ffd3437182e-7ffd3437183c 6743->6749 6744->6745 6751 7ffd3436beeb-7ffd3436bf64 call 7ffd3435c700 call 7ffd34363e28 call 7ffd3436a6c8 6745->6751 6752 7ffd3436bf66-7ffd3436bf9f call 7ffd34363ef0 6745->6752 6748->6749 6757 7ffd34371559-7ffd3437156b call 7ffd3436b350 6748->6757 6751->6752 6843 7ffd3436bfa0-7ffd3436c009 call 7ffd34356db0 6751->6843 6781 7ffd3437156d-7ffd3437157f call 7ffd34369cd0 6757->6781 6782 7ffd343715c6-7ffd343715ca 6757->6782 6761->6699 6762->6698 6762->6699 6815 7ffd343718c1 6766->6815 6816 7ffd343718b7-7ffd343718bd 6766->6816 6772->6740 6847 7ffd343714c2-7ffd343714c6 6775->6847 6848 7ffd343714b8-7ffd343714c0 6775->6848 6776->6766 6781->6782 6799 7ffd34371581-7ffd343715b1 call 7ffd34371018 6781->6799 6790 7ffd343715d0-7ffd343715f6 call 7ffd3436a648 6782->6790 6791 7ffd343717f5-7ffd343717f9 6782->6791 6790->6791 6820 7ffd343715fc-7ffd34371622 call 7ffd3436fef8 6790->6820 6791->6749 6797 7ffd343717fb-7ffd34371827 call 7ffd3436a6c8 6791->6797 6797->6749 6828 7ffd34371829-7ffd3437182c 6797->6828 6829 7ffd343715b6-7ffd343715b9 6799->6829 6823 7ffd343718c5-7ffd34371902 call 7ffd343530d0 6815->6823 6826 7ffd343718c3 6815->6826 6822 7ffd343718bf 6816->6822 6816->6823 6850 7ffd3437176a-7ffd343717ee call 7ffd3435c700 call 7ffd3436c2a0 call 7ffd3436ff20 6820->6850 6851 7ffd34371628-7ffd34371684 call 7ffd34370fc8 call 7ffd3435c700 call 7ffd3436c2a0 6820->6851 6822->6815 6823->6713 6826->6823 6828->6749 6829->6782 6833 7ffd343715bb-7ffd343715bf 6829->6833 6833->6782 6867 7ffd3436c052-7ffd3436c059 6843->6867 6868 7ffd3436c00b-7ffd3436c042 call 7ffd343530d0 6843->6868 6847->6733 6848->6733 6850->6791 6851->6850 6882 7ffd3437168a-7ffd34371713 call 7ffd3435c700 call 7ffd3436c2a0 call 7ffd34370ff0 call 7ffd3436ff20 6851->6882 6870 7ffd3436c0a2-7ffd3436c0a7 6867->6870 6871 7ffd3436c05b-7ffd3436c074 6867->6871 6871->6870 6882->6850 6900 7ffd34371715-7ffd34371765 call 7ffd3435c700 call 7ffd3436c2a0 call 7ffd3436ff20 6882->6900 6900->6791
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$HH4$3Z$cb
                                                                          • API String ID: 0-3785232885
                                                                          • Opcode ID: e6290be1bc3abedd8164c4f05cfb4d282985c0cf5359b4e01a547548bb9e4dd4
                                                                          • Instruction ID: b5d14861e77ec20f0af56d229e00b1deed04ed8c3e8c632403fcb241dbb6a356
                                                                          • Opcode Fuzzy Hash: e6290be1bc3abedd8164c4f05cfb4d282985c0cf5359b4e01a547548bb9e4dd4
                                                                          • Instruction Fuzzy Hash: 9612F422B5C94A4FEF98FB6888A62B877D1EF9A310F44417AD54DD3382DD3CB8418785

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 6909 7ffd343601f5-7ffd3436029f call 7ffd3435e6c0 6917 7ffd34360356-7ffd343603b2 call 7ffd3435e6e8 call 7ffd3435e3e0 6909->6917 6918 7ffd343602a5-7ffd343602dd call 7ffd3435e548 6909->6918 6940 7ffd34360401-7ffd3436042b call 7ffd3435e458 6917->6940 6941 7ffd343603b4-7ffd343603d7 call 7ffd3435ff70 6917->6941 6927 7ffd343602df-7ffd343602ec 6918->6927 6928 7ffd343602f6-7ffd3436031c call 7ffd34360030 6918->6928 6927->6928 6932 7ffd343602ee-7ffd343602f4 6927->6932 6943 7ffd3436031e-7ffd34360341 call 7ffd34360058 6928->6943 6944 7ffd34360346-7ffd34360355 6928->6944 6932->6928 6956 7ffd3436042d-7ffd34360430 6940->6956 6957 7ffd34360458-7ffd3436045c 6940->6957 6953 7ffd343603dc-7ffd343603df 6941->6953 6943->6944 6953->6940 6955 7ffd343603e1-7ffd343603e4 6953->6955 6960 7ffd343603ef-7ffd34360400 6955->6960 6961 7ffd343603e6-7ffd343603e9 6955->6961 6956->6957 6962 7ffd34360432-7ffd34360456 call 7ffd3435e6c0 6956->6962 6958 7ffd34360462-7ffd343604c4 call 7ffd3435e710 call 7ffd3435e738 6957->6958 6959 7ffd34360679-7ffd34360688 6957->6959 6979 7ffd343604ca-7ffd343604fc call 7ffd3435fea8 6958->6979 6980 7ffd3436058c-7ffd343605d7 call 7ffd3435fe30 call 7ffd3435e6c0 6958->6980 6961->6960 6964 7ffd34360699-7ffd343606c5 call 7ffd34360008 6961->6964 6962->6957 6989 7ffd34360504-7ffd34360507 6979->6989 6990 7ffd343604fe-7ffd343604ff 6979->6990 6998 7ffd343605d9-7ffd34360623 call 7ffd3435bf80 call 7ffd3435fe80 6980->6998 6999 7ffd34360625 6980->6999 6992 7ffd3436052e-7ffd34360530 6989->6992 6993 7ffd34360509-7ffd34360527 call 7ffd3435e3e0 6989->6993 6990->6989 6996 7ffd34360532-7ffd34360551 call 7ffd3435fed0 6992->6996 6997 7ffd34360556-7ffd34360698 call 7ffd343606c6 6992->6997 7007 7ffd34360561-7ffd3436058a call 7ffd3435fef8 6993->7007 7008 7ffd34360529-7ffd3436052c 6993->7008 6996->6997 7002 7ffd34360628-7ffd3436062c 6998->7002 6999->7002 7009 7ffd3436062e-7ffd3436064d call 7ffd3435fe58 7002->7009 7010 7ffd34360670-7ffd34360678 call 7ffd343606c6 7002->7010 7007->6980 7008->6992 7008->7007 7028 7ffd34360652-7ffd34360664 call 7ffd3435fe30 7009->7028 7010->6959 7028->7010
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-523893428
                                                                          • Opcode ID: 380f904d401ccf3718b8f210b9bd37eaed3e4a5f47837b874fe14486a5853eab
                                                                          • Instruction ID: e082211811a853cb9bb18a0c9dfbcda849f2ec0efebe68918a7f2fa5621ff06a
                                                                          • Opcode Fuzzy Hash: 380f904d401ccf3718b8f210b9bd37eaed3e4a5f47837b874fe14486a5853eab
                                                                          • Instruction Fuzzy Hash: 1AE1A321B5C95A4BEB58FB5894E21F9B3E1EF8A724F04017AE54DD32C2DE3CB8015B85

                                                                          Control-flow Graph

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$xkF4
                                                                          • API String ID: 0-122209077
                                                                          • Opcode ID: 98e88e9b46efe472b83c66d4f78ef5b21155e6349619db10456818f8ed4cf8ab
                                                                          • Instruction ID: eba016def226b632203be364a2cb87224fb777217041663ed807db107748f3bb
                                                                          • Opcode Fuzzy Hash: 98e88e9b46efe472b83c66d4f78ef5b21155e6349619db10456818f8ed4cf8ab
                                                                          • Instruction Fuzzy Hash: FDB19421F1DC5A4BEA9AF75844BA278B6C1EF9A754B4402B9E10ED3383DD1CFC415386

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 7135 7ffda3387f00-7ffda3387f1d call 7ffda3432a4c 7138 7ffda3387f23-7ffda3387f38 call 7ffda34329fc 7135->7138 7139 7ffda33883f4-7ffda3388408 7135->7139 7138->7139 7142 7ffda3387f3e-7ffda3387f48 GetModuleHandleA 7138->7142 7142->7139 7143 7ffda3387f4e-7ffda3387f55 7142->7143 7143->7139 7144 7ffda3387f5b-7ffda3387ff7 call 7ffda33965a0 call 7ffda3388610 call 7ffda3387180 call 7ffda3432bf4 call 7ffda3387180 GetProcAddress 7143->7144 7155 7ffda3387ff9-7ffda3388002 call 7ffda338fe90 7144->7155 7156 7ffda3388007-7ffda338800f 7144->7156 7155->7156 7157 7ffda3388011-7ffda338801a call 7ffda338fe90 7156->7157 7158 7ffda338801f-7ffda338809a call 7ffda3387180 GetModuleHandleA call 7ffda3387180 GetProcAddress 7156->7158 7157->7158 7165 7ffda33880aa-7ffda33880b2 7158->7165 7166 7ffda338809c-7ffda33880a5 call 7ffda338fe90 7158->7166 7168 7ffda33880c2-7ffda338813b call 7ffda3387180 LoadLibraryA call 7ffda3387180 GetProcAddress 7165->7168 7169 7ffda33880b4-7ffda33880bd call 7ffda338fe90 7165->7169 7166->7165 7175 7ffda338814b-7ffda3388153 7168->7175 7176 7ffda338813d-7ffda3388146 call 7ffda338fe90 7168->7176 7169->7168 7178 7ffda3388155-7ffda338815e call 7ffda338fe90 7175->7178 7179 7ffda3388163-7ffda33881dc call 7ffda3387180 LoadLibraryA call 7ffda3387180 GetProcAddress 7175->7179 7176->7175 7178->7179 7185 7ffda33881ec-7ffda33881f4 7179->7185 7186 7ffda33881de-7ffda33881e7 call 7ffda338fe90 7179->7186 7188 7ffda33881f6-7ffda33881ff call 7ffda338fe90 7185->7188 7189 7ffda3388204-7ffda338827d call 7ffda3387180 LoadLibraryA call 7ffda3387180 GetProcAddress 7185->7189 7186->7185 7188->7189 7195 7ffda338828d-7ffda3388295 7189->7195 7196 7ffda338827f-7ffda3388288 call 7ffda338fe90 7189->7196 7198 7ffda33882a5-7ffda338831e call 7ffda3387180 LoadLibraryA call 7ffda3387180 GetProcAddress 7195->7198 7199 7ffda3388297-7ffda33882a0 call 7ffda338fe90 7195->7199 7196->7195 7205 7ffda338832e-7ffda3388336 7198->7205 7206 7ffda3388320-7ffda3388329 call 7ffda338fe90 7198->7206 7199->7198 7208 7ffda3388346-7ffda3388384 7205->7208 7209 7ffda3388338-7ffda3388341 call 7ffda338fe90 7205->7209 7206->7205 7211 7ffda3388386-7ffda3388389 7208->7211 7212 7ffda33883b8-7ffda33883c0 7208->7212 7209->7208 7211->7212 7213 7ffda338838b-7ffda338838e 7211->7213 7212->7139 7214 7ffda33883c2-7ffda33883c6 7212->7214 7213->7212 7215 7ffda3388390-7ffda33883a5 CreateEventW 7213->7215 7214->7139 7216 7ffda33883c8-7ffda33883d8 call 7ffda338fe90 7214->7216 7215->7212 7217 7ffda33883a7-7ffda33883b6 WaitForSingleObject 7215->7217 7216->7139 7217->7212 7219 7ffda33883da-7ffda33883ef call 7ffda3432c8c call 7ffda3432a7c call 7ffda3385430 7217->7219 7219->7139
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$LibraryLoad$HandleModule$CreateEventObjectSingleWait
                                                                          • String ID:
                                                                          • API String ID: 229642238-0
                                                                          • Opcode ID: 62b12860c9e2652c94a4486b1b70a594db286f786e78e9cf5ef73cdcf5f6392b
                                                                          • Instruction ID: 15486c682527ee3f7393fc7d104aca96cd73f95851c903ed99ad7ed601faae40
                                                                          • Opcode Fuzzy Hash: 62b12860c9e2652c94a4486b1b70a594db286f786e78e9cf5ef73cdcf5f6392b
                                                                          • Instruction Fuzzy Hash: FBC1B221B0EA4642FE54AB61E4207BA6363BF85BC4F448535ED4C6B797DEBFE1048708

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 7226 7ffd34367f53-7ffd34367f6a 7228 7ffd343680ad-7ffd343680cd 7226->7228 7229 7ffd34367f70-7ffd34367f93 call 7ffd34366338 7226->7229 7232 7ffd343680d3-7ffd343680d5 7228->7232 7233 7ffd34368366-7ffd34368383 7228->7233 7243 7ffd34367f98-7ffd34367fd2 call 7ffd34366360 7229->7243 7232->7233 7235 7ffd343680db-7ffd3436811f call 7ffd343662e8 7232->7235 7236 7ffd34367b3e-7ffd34367b88 call 7ffd343662a8 7233->7236 7237 7ffd34368389-7ffd3436838c 7233->7237 7235->7233 7262 7ffd34368125-7ffd34368130 7235->7262 7236->7233 7258 7ffd34367b8e-7ffd34367c30 call 7ffd3435c700 call 7ffd34363e28 call 7ffd34363e50 7236->7258 7241 7ffd343683be-7ffd3436842f call 7ffd343664a0 call 7ffd343664c8 7237->7241 7242 7ffd3436838e-7ffd34368392 7237->7242 7291 7ffd34368431-7ffd3436844d 7241->7291 7292 7ffd34368496-7ffd3436849c 7241->7292 7242->7241 7245 7ffd34368394-7ffd343683b9 call 7ffd34363e78 7242->7245 7268 7ffd34368004-7ffd343680a8 call 7ffd34366388 7243->7268 7269 7ffd34367fd4-7ffd34367ffe call 7ffd343663b0 7243->7269 7245->7241 7258->7233 7324 7ffd34367c36-7ffd34367c39 7258->7324 7262->7233 7266 7ffd34368136-7ffd34368185 call 7ffd34366310 7262->7266 7283 7ffd3436818a-7ffd34368359 call 7ffd34366310 * 3 call 7ffd34356db0 call 7ffd34366310 call 7ffd34356db0 call 7ffd34366310 call 7ffd34356db0 call 7ffd34366310 call 7ffd34356db0 7266->7283 7268->7233 7269->7233 7269->7268 7283->7233 7361 7ffd34368361 call 7ffd34366310 7283->7361 7291->7292 7298 7ffd3436844f-7ffd3436845c 7291->7298 7295 7ffd3436849e-7ffd343684d6 call 7ffd34366520 7292->7295 7296 7ffd34368507-7ffd3436850c 7292->7296 7325 7ffd34368500-7ffd34368505 7295->7325 7326 7ffd343684d8-7ffd343684fb call 7ffd34366548 7295->7326 7300 7ffd34368512-7ffd343685d5 call 7ffd34366570 * 4 call 7ffd34366598 7296->7300 7301 7ffd343685da-7ffd343685eb 7296->7301 7304 7ffd3436848d-7ffd34368494 7298->7304 7305 7ffd3436845e-7ffd3436848b call 7ffd343664f8 7298->7305 7300->7301 7304->7292 7304->7298 7305->7304 7327 7ffd34367c89-7ffd34367ca6 7324->7327 7328 7ffd34367c3b-7ffd34367c83 call 7ffd343642f0 call 7ffd34366478 7324->7328 7325->7295 7325->7296 7326->7325 7327->7233 7328->7233 7328->7327 7361->7233
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$pH4
                                                                          • API String ID: 0-1242002959
                                                                          • Opcode ID: 55c15c0c3ba27ff1aaf1e98570df04fc5dd8fbe4647856501332408dd07350a7
                                                                          • Instruction ID: 87973e951ff969aa120b0760cc230baf22a743272df1f75c88aadf0cabeed6fa
                                                                          • Opcode Fuzzy Hash: 55c15c0c3ba27ff1aaf1e98570df04fc5dd8fbe4647856501332408dd07350a7
                                                                          • Instruction Fuzzy Hash: 2012C630A58A5A8FEB58FB18C8E26A8B7E1FB9D754F100179D50DD3291DE3CB841CB85

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 7362 7ffd34367cb0-7ffd34367cf0 call 7ffd343663d8 7367 7ffd34367e34-7ffd34367f45 call 7ffd34366400 call 7ffd34366428 call 7ffd34366388 7362->7367 7368 7ffd34367cf6-7ffd34367da8 call 7ffd34356db0 call 7ffd343642f0 call 7ffd34356db0 call 7ffd34366450 7362->7368 7397 7ffd34368366-7ffd34368383 7367->7397 7368->7367 7388 7ffd34367dae-7ffd34367de0 7368->7388 7392 7ffd34367de2-7ffd34367e0f call 7ffd343642f0 call 7ffd343631e0 7388->7392 7393 7ffd34367e11-7ffd34367e22 7388->7393 7392->7393 7408 7ffd34367e26-7ffd34367e2e 7392->7408 7393->7388 7394 7ffd34367e24 7393->7394 7394->7367 7399 7ffd34367b3e-7ffd34367b88 call 7ffd343662a8 7397->7399 7400 7ffd34368389-7ffd3436838c 7397->7400 7399->7397 7416 7ffd34367b8e-7ffd34367c30 call 7ffd3435c700 call 7ffd34363e28 call 7ffd34363e50 7399->7416 7403 7ffd343683be-7ffd3436842f call 7ffd343664a0 call 7ffd343664c8 7400->7403 7404 7ffd3436838e-7ffd34368392 7400->7404 7430 7ffd34368431-7ffd3436844d 7403->7430 7431 7ffd34368496-7ffd3436849c 7403->7431 7404->7403 7407 7ffd34368394-7ffd343683b9 call 7ffd34363e78 7404->7407 7407->7403 7408->7367 7416->7397 7456 7ffd34367c36-7ffd34367c39 7416->7456 7430->7431 7436 7ffd3436844f-7ffd3436845c 7430->7436 7433 7ffd3436849e-7ffd343684d6 call 7ffd34366520 7431->7433 7434 7ffd34368507-7ffd3436850c 7431->7434 7457 7ffd34368500-7ffd34368505 7433->7457 7458 7ffd343684d8-7ffd343684fb call 7ffd34366548 7433->7458 7437 7ffd34368512-7ffd343685d5 call 7ffd34366570 * 4 call 7ffd34366598 7434->7437 7438 7ffd343685da-7ffd343685eb 7434->7438 7441 7ffd3436848d-7ffd34368494 7436->7441 7442 7ffd3436845e-7ffd3436848b call 7ffd343664f8 7436->7442 7437->7438 7441->7431 7441->7436 7442->7441 7459 7ffd34367c89-7ffd34367ca6 7456->7459 7460 7ffd34367c3b-7ffd34367c83 call 7ffd343642f0 call 7ffd34366478 7456->7460 7457->7433 7457->7434 7458->7457 7459->7397 7460->7397 7460->7459
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$pH4
                                                                          • API String ID: 0-3047578828
                                                                          • Opcode ID: b46f87fc071cc6666d436242a90f5512118fef7f57c1e1ec1f7b68621d81e522
                                                                          • Instruction ID: 5e185b3116d5aa053b594769fbf6531d22523bf126206e72c20188aba4e6b06f
                                                                          • Opcode Fuzzy Hash: b46f87fc071cc6666d436242a90f5512118fef7f57c1e1ec1f7b68621d81e522
                                                                          • Instruction Fuzzy Hash: C5F1AA30B58A5A8BE758FB18C8E67A4B7E1FB99710F1001B9D54DD3292DE3C7C818B85
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@_H4$tL_L
                                                                          • API String ID: 0-3408336913
                                                                          • Opcode ID: 7ca1d2524882c5cc3c87ea0f72c84af14259ab612fe2954baefd1b8e795895a5
                                                                          • Instruction ID: 4cd367659d45483b7b930e95967636921f6ea42c3441a7eacebbc7ba6d1d68e8
                                                                          • Opcode Fuzzy Hash: 7ca1d2524882c5cc3c87ea0f72c84af14259ab612fe2954baefd1b8e795895a5
                                                                          • Instruction Fuzzy Hash: 8AE1E721B5C95A4BEB98F71C84F62B877D2FF9A360B4401BAD54EC3282DD3CB8425785
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2822809586
                                                                          • Opcode ID: ea6d8d203fe6bf2097d343a957a52b656e724ef6bac9dfdeaad7548059ce94b3
                                                                          • Instruction ID: ad7cf72743d85d22ee240910835c28bc8ff12834fe18b28feaba6d02fb6a3605
                                                                          • Opcode Fuzzy Hash: ea6d8d203fe6bf2097d343a957a52b656e724ef6bac9dfdeaad7548059ce94b3
                                                                          • Instruction Fuzzy Hash: 3BF1F421B5C94A4FEF88FB1888E66747BD2EF9A314B4042B9D54EC3287DD3CB8425785
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 8#H4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-4092471185
                                                                          • Opcode ID: bd1e4d7adfe48764cf5984c86a0fd5eb28ba4fff6f93971bab1fc37d5d53035d
                                                                          • Instruction ID: 99efcbbdeb3404476f089cf05cdcf9df6a286978866813bea3540b4a6fc9bb28
                                                                          • Opcode Fuzzy Hash: bd1e4d7adfe48764cf5984c86a0fd5eb28ba4fff6f93971bab1fc37d5d53035d
                                                                          • Instruction Fuzzy Hash: F3C10421B4CA464BFB98FB1884E62B4B7D2EF96360F440179D54DC32D3DD3DB8429A85
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-546224849
                                                                          • Opcode ID: 4c5105d59c58471479ab1198ef0be1a75a85d8874321b06f7b6a0115de698e02
                                                                          • Instruction ID: 2301612117889a0056167ca38d7774346e2504fe8c690df2504fc3cfdc3bf4b7
                                                                          • Opcode Fuzzy Hash: 4c5105d59c58471479ab1198ef0be1a75a85d8874321b06f7b6a0115de698e02
                                                                          • Instruction Fuzzy Hash: DF91D021B4CA474BEB98BB2884E62B4B3D6EF96360F44017AD54DC32D3DD3DB8429A45
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$tL_L
                                                                          • API String ID: 0-2331327643
                                                                          • Opcode ID: d38cf3ccd1b5074489ab9e0f10857707c879f97593c344942ca708088fb759a1
                                                                          • Instruction ID: fe142c1167626b911996d4e5be7cc11edba5ec4be6359e9068d832da854b565c
                                                                          • Opcode Fuzzy Hash: d38cf3ccd1b5074489ab9e0f10857707c879f97593c344942ca708088fb759a1
                                                                          • Instruction Fuzzy Hash: A481D521B5C99A4BEB98F71844F55B4B7D1EF9B320F0401BAE54DC3282DE3CB8415786
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4$tL_L
                                                                          • API String ID: 0-2331327643
                                                                          • Opcode ID: d5db170a0d69653516b6e19b3d6e854ffc2af2ff0b2fb9a85f9efb60f48b733b
                                                                          • Instruction ID: ac03495e60a494b6796cef522c4f0a0b3dcc40ed1612485cbc456cb62f2f1ba2
                                                                          • Opcode Fuzzy Hash: d5db170a0d69653516b6e19b3d6e854ffc2af2ff0b2fb9a85f9efb60f48b733b
                                                                          • Instruction Fuzzy Hash: 1D51C361B5C9974BEA98F71844F2674A3C2EF9A760B04017AE54DD32C3DE3CBC425B86
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID: CloseCreateEventHandleOverlappedResult
                                                                          • String ID:
                                                                          • API String ID: 3756958029-0
                                                                          • Opcode ID: 814235ea1b5f1181f872c8bfe1cb36ca6ba4520b100e86159d2a427416c22418
                                                                          • Instruction ID: a1319c9eb197291ed7ebb42754804b2ecf580493fa0d672c8f123f6a78fe5fd4
                                                                          • Opcode Fuzzy Hash: 814235ea1b5f1181f872c8bfe1cb36ca6ba4520b100e86159d2a427416c22418
                                                                          • Instruction Fuzzy Hash: 45619423F0DE4589FB10AA75C4A13BC2BA2AB157C8F144832DE0D67B97CF3AD5958344
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3361045403.0000000002D80000.00000040.00000020.00020000.00000000.sdmp, Offset: 02D80000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_2d80000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID: LibraryLoad
                                                                          • String ID: 5\~$5\~$@$d
                                                                          • API String ID: 1029625771-872558757
                                                                          • Opcode ID: 432abaf52b1931f4a4d756fa3dc7670f7fdf06fad49cd8c3503e079c7b5aee6c
                                                                          • Instruction ID: a3471ae6d8bb8bd3702d89d3c60a5147c92a1e351298a08a78ca10fce65cacfc
                                                                          • Opcode Fuzzy Hash: 432abaf52b1931f4a4d756fa3dc7670f7fdf06fad49cd8c3503e079c7b5aee6c
                                                                          • Instruction Fuzzy Hash: D1A14628A2CF854BDB2C492884B523932D5FB95618FB4555EE8CF82B93D750CD4BC683
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-4027356800
                                                                          • Opcode ID: 2929e1a5f522a8b0e73a21239ee99105427f3c4c0b19aaaea9b7a939dc19b54f
                                                                          • Instruction ID: be63866311efd02ae10366ec6539e1ff4f94f4bc2c478ee8a47566d3bab9a2a4
                                                                          • Opcode Fuzzy Hash: 2929e1a5f522a8b0e73a21239ee99105427f3c4c0b19aaaea9b7a939dc19b54f
                                                                          • Instruction Fuzzy Hash: 6071C721B18E4A4FEB98FB5884E66B9B7E5EF99320F04067AD14DD32C2DE3CB8405745
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-4027356800
                                                                          • Opcode ID: e2d05a9135638adfbfef5fde7fd961100d629e105b332eabde5ceea7baa1ed8f
                                                                          • Instruction ID: fba8c439fdeed456a228bac5473a5078510e0b7bcd451d0a06a4a04adea748c9
                                                                          • Opcode Fuzzy Hash: e2d05a9135638adfbfef5fde7fd961100d629e105b332eabde5ceea7baa1ed8f
                                                                          • Instruction Fuzzy Hash: B8611A31B5CA060BFA58FB1894E75B5B3C5EB8A324F40017DE98EC32C3DD2DB8425686
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-4027356800
                                                                          • Opcode ID: fa8fc9ab1e396550a6a2db26ef204062b1e981139df0dca29ea7258005bcdb68
                                                                          • Instruction ID: 53a1466f296de2a6215dded1a3597fa75316ac05e8c14e948a43be2e27e60b57
                                                                          • Opcode Fuzzy Hash: fa8fc9ab1e396550a6a2db26ef204062b1e981139df0dca29ea7258005bcdb68
                                                                          • Instruction Fuzzy Hash: 7641F811B5E98A4BFB98FB5898F55B5A2C1FF9A264F04017AE50CD3283DD2CB8414346
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2151912093
                                                                          • Opcode ID: 2456a22fe7ffe1582ffe1fb700a169b486ff6cb0a1864c25a7cad92434c960f7
                                                                          • Instruction ID: 088bf02b10d8cc64d7b3363d278b567f71196ae5a9a3623b5b004f99b85e7597
                                                                          • Opcode Fuzzy Hash: 2456a22fe7ffe1582ffe1fb700a169b486ff6cb0a1864c25a7cad92434c960f7
                                                                          • Instruction Fuzzy Hash: 76812832B5DA4A0FF758B75C98E61B577D1EB96330B04017AE54EC3283EC2E78424786
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2151912093
                                                                          • Opcode ID: 729c99339c0b0ffca71b73fa265f022479b9b7f14004f959530b35c2172b5b83
                                                                          • Instruction ID: 8b5635c06065059d1401e69d005302217de140a14e52be4c1cf8517787a97903
                                                                          • Opcode Fuzzy Hash: 729c99339c0b0ffca71b73fa265f022479b9b7f14004f959530b35c2172b5b83
                                                                          • Instruction Fuzzy Hash: F3918230A5895A8FEB94FB58C4E5BA8B7A1FF99354F4001B9D10DD3292DE3CB8819B41
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2151912093
                                                                          • Opcode ID: 414fbf0f1787aa8492ec37b19f322f09d57ee3474af487303ed24738da8a9ca3
                                                                          • Instruction ID: 026ee6d781c0ed4cc7e731be2399c57dd28c4b6c996407a3e413c3c516775dad
                                                                          • Opcode Fuzzy Hash: 414fbf0f1787aa8492ec37b19f322f09d57ee3474af487303ed24738da8a9ca3
                                                                          • Instruction Fuzzy Hash: 53717370B5855A4FEB98FB18C8E16A8B3E1FF99310F5001B9D54DD3282DE3CAD819B41
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast
                                                                          • String ID:
                                                                          • API String ID: 1452528299-0
                                                                          • Opcode ID: 500c22ea5d1c7f879a626e7af5a88f5d3f78f08348a645fc4fd2ea38574c4cde
                                                                          • Instruction ID: 53db646e5b66054e9a3a1a407c38945ccf4553d3adc6a935eefae31bae4b8884
                                                                          • Opcode Fuzzy Hash: 500c22ea5d1c7f879a626e7af5a88f5d3f78f08348a645fc4fd2ea38574c4cde
                                                                          • Instruction Fuzzy Hash: 26612892F0E95645FB656A2194243B927E26F05BD8F144A31CD4F27BCBEE3FE8418304
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2151912093
                                                                          • Opcode ID: 0233aa3975b400101eaf74561a3ff088f5a90eefdba9c1706d1a51c89f7095ff
                                                                          • Instruction ID: 392560b5238525b1a9641fa6a3dac56f42de594b1e5afbcf65654f47c6ba7a85
                                                                          • Opcode Fuzzy Hash: 0233aa3975b400101eaf74561a3ff088f5a90eefdba9c1706d1a51c89f7095ff
                                                                          • Instruction Fuzzy Hash: F8418231B5899F8BEB54FF5888E52A9B3D1FF8A324F140676E50DD3282DE3CA8419741
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-4193656703
                                                                          • Opcode ID: 85ef3db7bf604a02f7d99419150aacfec47a9a91eb07b2f843a937ec8992523f
                                                                          • Instruction ID: 215ffdd627c79ea2948686c05136c06ea2e0c28dbd6c0af6418cf717c8e10e1b
                                                                          • Opcode Fuzzy Hash: 85ef3db7bf604a02f7d99419150aacfec47a9a91eb07b2f843a937ec8992523f
                                                                          • Instruction Fuzzy Hash: C0C1F621B1C95A4FE658F71C98A66B577D2FF9A320B04427ED48EC3293DD2DB8024786
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-4193656703
                                                                          • Opcode ID: 60f3017e7e4ebc8abfab9b23e10abb7a9cc47d3f959c44bf4ea54b0f5c8a4a4b
                                                                          • Instruction ID: cb3b450d86aa1ce21eb8ac847f0dfeac315a2442ee08246e864af05f756c0842
                                                                          • Opcode Fuzzy Hash: 60f3017e7e4ebc8abfab9b23e10abb7a9cc47d3f959c44bf4ea54b0f5c8a4a4b
                                                                          • Instruction Fuzzy Hash: 8741C721759A994FEB58F76894F22A9B7E1EF8A350F4402B6E04DC32C3DD3C78018782
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (b#4$@3A4$@3A4$L$Q4
                                                                          • API String ID: 0-173553263
                                                                          • Opcode ID: 6f51dd11636fc79bc7f7d83624e066536dd4218180e7020a803f70263d15e3a7
                                                                          • Instruction ID: 8f2074b3ad8a20a824f669d03ed44e1bb0e229fb7b59a93afd5585170dc264b6
                                                                          • Opcode Fuzzy Hash: 6f51dd11636fc79bc7f7d83624e066536dd4218180e7020a803f70263d15e3a7
                                                                          • Instruction Fuzzy Hash: 3E411732F0D9454FEB99EB1888A26A5B3D1EF9A320B0401BAE14ED7283DD2CF8058745
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-4193656703
                                                                          • Opcode ID: 26469bf0c93a19b2b3562af2a22d087bc3fee19e8df738dd501cff297d6c4b91
                                                                          • Instruction ID: 26f74bc985968bdad2ea83747ff459a769d8ac52acf18f5ca0bf9efd91de71f2
                                                                          • Opcode Fuzzy Hash: 26469bf0c93a19b2b3562af2a22d087bc3fee19e8df738dd501cff297d6c4b91
                                                                          • Instruction Fuzzy Hash: FD410421B5EA8B4BF799FB5888F55B4A2C0FF9A260F04057AE54CD3293DD2CB8018746
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $/i:S$SYNC
                                                                          • API String ID: 0-2968757536
                                                                          • Opcode ID: 52e109eb80c539991cd9c790973fce2dece5765b26daa102c75c802937407dce
                                                                          • Instruction ID: 4ace35c9efa6286abce5e8fbd53fcb356b51ce1e72fdb9877c92357c60735c88
                                                                          • Opcode Fuzzy Hash: 52e109eb80c539991cd9c790973fce2dece5765b26daa102c75c802937407dce
                                                                          • Instruction Fuzzy Hash: ED028D3270EEC681EA31AB55F4507EAA362FB84784F004126DE8C67B9ADF7ED145CB44
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $/i:S$SYNC
                                                                          • API String ID: 0-2968757536
                                                                          • Opcode ID: aa9a9cd3064d74a9b86100cbc379946e90ffc3ead70f38367e187b72343efcd9
                                                                          • Instruction ID: 2afc4fc9ba25f3f022da2aa175aea0df5c43a816aa3afa7991686e4cda27e367
                                                                          • Opcode Fuzzy Hash: aa9a9cd3064d74a9b86100cbc379946e90ffc3ead70f38367e187b72343efcd9
                                                                          • Instruction Fuzzy Hash: 82027C3270EEC681EA31AB55F4507EAA362FB84784F004126DE8C67B9ADF7ED145CB44
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $/i:S$SYNC
                                                                          • API String ID: 0-2968757536
                                                                          • Opcode ID: 79dfbac661689dd04925f9bda332d31a6ffb05789bc8c7a8735d8eb7b025bb02
                                                                          • Instruction ID: 44c3fea1f6721db607b65631700d6ca9cdc343affe2a40487e0aa4e8ee9b8a50
                                                                          • Opcode Fuzzy Hash: 79dfbac661689dd04925f9bda332d31a6ffb05789bc8c7a8735d8eb7b025bb02
                                                                          • Instruction Fuzzy Hash: 67028C3270EEC681EA31AB55F4507EAA362FB84784F004126DE8C63B9ADF7ED145CB44
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $/i:S$SYNC
                                                                          • API String ID: 0-2968757536
                                                                          • Opcode ID: b8b2f81fc27a745220d86db47dd0eb80518589feba5ba8183af30f55b3bbc780
                                                                          • Instruction ID: a2bf2f9a849cf72987f8b0b535696a29f06306497111b946a1d81694b351b57f
                                                                          • Opcode Fuzzy Hash: b8b2f81fc27a745220d86db47dd0eb80518589feba5ba8183af30f55b3bbc780
                                                                          • Instruction Fuzzy Hash: 88027C3270EEC681EA31AB55F4507EAA362FB84784F004126DE8C67B9ADF7ED145CB44
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $/i:S$SYNC
                                                                          • API String ID: 0-2968757536
                                                                          • Opcode ID: 3d2ddbb27bd5ac5c2025ababf670fe11a272893392fb4342accfef381fe9b600
                                                                          • Instruction ID: 9ce8bb02c6918b140cd82be81b5bb36bd17533a77dbbc9e472e40b3689dfa9fb
                                                                          • Opcode Fuzzy Hash: 3d2ddbb27bd5ac5c2025ababf670fe11a272893392fb4342accfef381fe9b600
                                                                          • Instruction Fuzzy Hash: A6027D3270EEC681EA31AB55F4507EAA362FB84784F004126DE8C67B9ADF7ED145CB44
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID: CloseHandle$CreateErrorEventLast
                                                                          • String ID:
                                                                          • API String ID: 3743700123-0
                                                                          • Opcode ID: 98d2a2f06b653b22a13e2036d501e1887043cc6f1aa98077720f9b60e3440225
                                                                          • Instruction ID: 694e9c63062f1e0bd499325c623a6a5902953c31a9884956473153322b738fcf
                                                                          • Opcode Fuzzy Hash: 98d2a2f06b653b22a13e2036d501e1887043cc6f1aa98077720f9b60e3440225
                                                                          • Instruction Fuzzy Hash: 4411D522B0A74556F6599B12B5603793251AF88790F184035DE9C57BC3DF7DA0E28304
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2486409910
                                                                          • Opcode ID: 27cacc5043701a8a159ed5ead1c4c324f4aa739a0ae079bda6ad1d1b4812ed57
                                                                          • Instruction ID: 83405f4a81e6ede2f4d6c5e1bea40711216ed038bd5db1210186f9b3e8897aee
                                                                          • Opcode Fuzzy Hash: 27cacc5043701a8a159ed5ead1c4c324f4aa739a0ae079bda6ad1d1b4812ed57
                                                                          • Instruction Fuzzy Hash: 8ED1B731A1858A8FDB84EB58C4E5AA877E2FF99324F4401B9C50DD72D6DE3DB841DB40
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2486409910
                                                                          • Opcode ID: 37c58622722faaab3e379903e79a40499343512e77cb56f7990ce37dc5b6609f
                                                                          • Instruction ID: af669c575dff1353c902948eb87b26048edfbcc1bb3f9ba598c40c2d7de1a512
                                                                          • Opcode Fuzzy Hash: 37c58622722faaab3e379903e79a40499343512e77cb56f7990ce37dc5b6609f
                                                                          • Instruction Fuzzy Hash: A8B12722B4C9894BF764F66888A62B97BD0FF96324F4404F9D14DC72C3DD2C784A9781
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2486409910
                                                                          • Opcode ID: eaa9e2801c26da36d9c4ba69dee1472a75f5c9dce72a1070720ce85115604632
                                                                          • Instruction ID: 1e77900c424220bd5e2f27153af8d886097fdf88e611f7e27d05375c2887ca1a
                                                                          • Opcode Fuzzy Hash: eaa9e2801c26da36d9c4ba69dee1472a75f5c9dce72a1070720ce85115604632
                                                                          • Instruction Fuzzy Hash: 2281C431F1D9494FEB99FB1884A66B977D2FB99320B040279D14FC3392DE2CB8019786
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2486409910
                                                                          • Opcode ID: 07add386c45082accd7baa6cf44db6c48ebc408c7bf4e9f116e366893263784f
                                                                          • Instruction ID: e1624290f28cbf8485ca8214e518570e4a42f19b41192202b916b6fd88adcfac
                                                                          • Opcode Fuzzy Hash: 07add386c45082accd7baa6cf44db6c48ebc408c7bf4e9f116e366893263784f
                                                                          • Instruction Fuzzy Hash: 49819030A5894A8FEB98FB58C4E5BA8B7E1FF99310F4041B9D10DD3292DE3CB8419B41
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2486409910
                                                                          • Opcode ID: ae8f4191bb22f6a84aa0ecb4f38ad2ea70577a370aba4a6a16f42925ed22cc5f
                                                                          • Instruction ID: ec936c1cbce1d79c592ce6187e2700804633bb57721c83265fc1203823ac80f1
                                                                          • Opcode Fuzzy Hash: ae8f4191bb22f6a84aa0ecb4f38ad2ea70577a370aba4a6a16f42925ed22cc5f
                                                                          • Instruction Fuzzy Hash: 1551917174CA8A4FEB88FB18C8E16A573E1FB96324F00017AE54DC3282DE3CE8518745
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID: Value
                                                                          • String ID:
                                                                          • API String ID: 3702945584-0
                                                                          • Opcode ID: 0d0c33d4ae84c9c6ac08cf005ca708583dd0807289b50ca2b2cc0b6748987ae7
                                                                          • Instruction ID: eef3e0dcaad35aa99d14fa07efe3b71d4c33c1665a008b70096123a1d59e20f4
                                                                          • Opcode Fuzzy Hash: 0d0c33d4ae84c9c6ac08cf005ca708583dd0807289b50ca2b2cc0b6748987ae7
                                                                          • Instruction Fuzzy Hash: A4A1B531B1EEC181FA559B19E0213F9A3A2FF94794F149131EA8C137A6EF7EE5818344
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (@^4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-69467789
                                                                          • Opcode ID: d1b43a2ba59b0ee81578f6a82121c250b568a910f5f7c8bfe7ab6ec6d6803145
                                                                          • Instruction ID: 09258fc9bf91a994b93453114272f134bbb6f73553a75b45bfb3ca1a92f394b8
                                                                          • Opcode Fuzzy Hash: d1b43a2ba59b0ee81578f6a82121c250b568a910f5f7c8bfe7ab6ec6d6803145
                                                                          • Instruction Fuzzy Hash: 50512A31F0DA8D4FDB56EB6858A55F97BE1EF8A310F0401BBD54DD3282DE2CA8058786
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2486409910
                                                                          • Opcode ID: 130e18ff2d974fa5eb7ef59bff9bb8eeba13d3eb8c5b6950b47c5aaa1ec6292f
                                                                          • Instruction ID: b78b76da3b6d8f54ca2fe1690d454a80707b487890f1d82dc01743788eae347e
                                                                          • Opcode Fuzzy Hash: 130e18ff2d974fa5eb7ef59bff9bb8eeba13d3eb8c5b6950b47c5aaa1ec6292f
                                                                          • Instruction Fuzzy Hash: CC51F831F185894FE796AF6888A91F4BBE0EF96311F4401FAD50EC7297DC1CA8458741
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2486409910
                                                                          • Opcode ID: fb9aeb1e55abed02652b3677a81b803fc1bb01ad4999d242be284b89c10e35a2
                                                                          • Instruction ID: 84f330c673b82643d9a878f3fe73f37df803fd8bd0bf020b917e3d1e1b79490f
                                                                          • Opcode Fuzzy Hash: fb9aeb1e55abed02652b3677a81b803fc1bb01ad4999d242be284b89c10e35a2
                                                                          • Instruction Fuzzy Hash: C7410822B1DA894BE759B76C58661B577D0EF8B324F0406BBE14DC32C3ED2CB8014786
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2486409910
                                                                          • Opcode ID: 2ebf88be33784bdc978799caf1bf4d10aae630c818590e826c7a74a10f9dce5c
                                                                          • Instruction ID: 5a6227ea944a65b7a9ae86687ad45ee5013cdad40becfa2fc8b563a65bbc4efa
                                                                          • Opcode Fuzzy Hash: 2ebf88be33784bdc978799caf1bf4d10aae630c818590e826c7a74a10f9dce5c
                                                                          • Instruction Fuzzy Hash: C641E621B9EACA0FE799F76844B62A967D1EF96610B4801F9D44DC73D3DC2CBC424386
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2486409910
                                                                          • Opcode ID: b33a1169c8c5fbcc5697cc5d6034f78aec8ac692c6a3574bac0718db7e62b873
                                                                          • Instruction ID: fcbee1594f8245e5caa14287b754676074c4216ea1c6e24114ec3bf19d5156af
                                                                          • Opcode Fuzzy Hash: b33a1169c8c5fbcc5697cc5d6034f78aec8ac692c6a3574bac0718db7e62b873
                                                                          • Instruction Fuzzy Hash: 2441D63171DB884FEB54EF5888A65E9BBD1FB99314F0402BFE44CD3282DE29B4008746
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$X?E4
                                                                          • API String ID: 0-1827199398
                                                                          • Opcode ID: d38fa9057949e3fe96b2ab3e46c8e74ea0b9ee628a6d0f55d901236b50e04ded
                                                                          • Instruction ID: 1cd4e436d12d1942100dad9261f0e04c60cacc03af4d545d53d8af389202d4f9
                                                                          • Opcode Fuzzy Hash: d38fa9057949e3fe96b2ab3e46c8e74ea0b9ee628a6d0f55d901236b50e04ded
                                                                          • Instruction Fuzzy Hash: 90310622B4C9895FE799FB6898A62B8B7D1EF9A210F0801FAD54DC72C3DD3C78458741
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2486409910
                                                                          • Opcode ID: 6309be0400757c055c6b93c39c5d6cac011950fa6f0f95a2e23b8b5906f4d92f
                                                                          • Instruction ID: 9decaff21b0081fdb4681323e330dc8a75614adad9c45520486b36bfd64b0338
                                                                          • Opcode Fuzzy Hash: 6309be0400757c055c6b93c39c5d6cac011950fa6f0f95a2e23b8b5906f4d92f
                                                                          • Instruction Fuzzy Hash: A031F522B1CA554BF748B76C54662B573C1EBCA764F0406BEE18DD3283ED3CF8415A8A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2486409910
                                                                          • Opcode ID: f2b00b07fe54526c6a38ca7bcfaf62126f68da54f008eab5569b0a6a005171db
                                                                          • Instruction ID: 06d59b2b21a92fe00e0060299dbd4730fa44f95bf35a7d79656a24dcf92e9743
                                                                          • Opcode Fuzzy Hash: f2b00b07fe54526c6a38ca7bcfaf62126f68da54f008eab5569b0a6a005171db
                                                                          • Instruction Fuzzy Hash: D231C122B4CA874EE788FB1C94E61A977D1FF86224F08067AD18CD72C3DE2DA9414646
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (b#4$@3A4$@3A4$L
                                                                          • API String ID: 0-3462152323
                                                                          • Opcode ID: 0e54efdc5e7bee0507ba11b6f2e29e2f9dd766a3376d112c6c4ba5442ad0c9f1
                                                                          • Instruction ID: 1d342b4d662900f52ddfdc43328a3bdf09e3a3d4c5f5c89fa52c48636d5dba4c
                                                                          • Opcode Fuzzy Hash: 0e54efdc5e7bee0507ba11b6f2e29e2f9dd766a3376d112c6c4ba5442ad0c9f1
                                                                          • Instruction Fuzzy Hash: 3031E432B1D9464FEB98FB1C94A26A4B3D1EB99320B0401B9D44EE7387DD2CF8058785
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2486409910
                                                                          • Opcode ID: dbce12ce6ced61cd4d0de2a84549ae79e66592ac3616c8590eebecd85819b0f6
                                                                          • Instruction ID: 252fae6180c4ff44d6a59ec07520c478135e6b1ba186bfaa704e89ab67bf12a6
                                                                          • Opcode Fuzzy Hash: dbce12ce6ced61cd4d0de2a84549ae79e66592ac3616c8590eebecd85819b0f6
                                                                          • Instruction Fuzzy Hash: 85210921F0DA8D4FEB99EB5888B55F8F7D1EB9A720F0402BAE00DD3282DD1CB8004746
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4$@3A4
                                                                          • API String ID: 0-2486409910
                                                                          • Opcode ID: f9fb24cd525bcac53ea88e87299e201c524c3694db33fa0f8769fffc07952cc0
                                                                          • Instruction ID: 952e2ca42ccc97eb7a6cbadaf5609d9d2167599f603d9b3f3aebd3ac5d15c54b
                                                                          • Opcode Fuzzy Hash: f9fb24cd525bcac53ea88e87299e201c524c3694db33fa0f8769fffc07952cc0
                                                                          • Instruction Fuzzy Hash: 4C21AA6174C9874FEA88F71894E6279B2D1FF9A324F44067AE18DD32C2DE3D6441474B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: {U4$@3A4$@3A4
                                                                          • API String ID: 0-3537246270
                                                                          • Opcode ID: 28e9574910b0423bce7bee73e153643d6f3868fc10be679a521f46c52e6f2e1a
                                                                          • Instruction ID: 2bc2bbade699d8459325d233b0d84a2cf9ef5dbb54e0de60143503494a09f9ba
                                                                          • Opcode Fuzzy Hash: 28e9574910b0423bce7bee73e153643d6f3868fc10be679a521f46c52e6f2e1a
                                                                          • Instruction Fuzzy Hash: 5A41E621F0DA4D5FD396E72888A66B5B7E1FF9A210B0401FAD04EC7293DE1CA8459741
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: xkF4$xkF4$xkF4
                                                                          • API String ID: 0-3355040245
                                                                          • Opcode ID: 84c623c39464d951247267ed60dfc8f8814797fc5e511fd0a19ea55267e6624f
                                                                          • Instruction ID: 3ada31247e974445eae9761b15defefcec3fa6be29715200a73b1461fd7412a9
                                                                          • Opcode Fuzzy Hash: 84c623c39464d951247267ed60dfc8f8814797fc5e511fd0a19ea55267e6624f
                                                                          • Instruction Fuzzy Hash: A141C122B1DD4A0FE6D6EB2C44B423DA6C2FFDA654B54417AD24DD3296DE2CE8029341
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: p.F4$p.F4$p.F4
                                                                          • API String ID: 0-1027796014
                                                                          • Opcode ID: bae005a9ec637945a4d1964197069311d86e820fe148ce4332a5f12d0e125320
                                                                          • Instruction ID: a1fc0b67f1b0cbf31905a68592a3a4794ef457f3d9354c5bd21a864baec887e3
                                                                          • Opcode Fuzzy Hash: bae005a9ec637945a4d1964197069311d86e820fe148ce4332a5f12d0e125320
                                                                          • Instruction Fuzzy Hash: 3E41A262B1DE8A1FE7D6EB2C44A527967C2FFEA244B54407BD14DC3286DD2CF8029341
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4
                                                                          • API String ID: 0-3063612242
                                                                          • Opcode ID: 15c8b0980f56adbbae308e09fc6928d867ad67d2161e3e0e21eb7c0f82649ef3
                                                                          • Instruction ID: 5f7c4fec7d40b39d19995c211c6bef36690b63a8ddaa3f4f6ca597bbb84a63b2
                                                                          • Opcode Fuzzy Hash: 15c8b0980f56adbbae308e09fc6928d867ad67d2161e3e0e21eb7c0f82649ef3
                                                                          • Instruction Fuzzy Hash: 0F418235B4894E8FEB88FF18C8A16A9BBA0FF59314F0045B9E15DC72D2DE79A841C744
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: =74$@3A4$@3A4
                                                                          • API String ID: 0-198681823
                                                                          • Opcode ID: ae0c8a619b6ce83a1413700e087c3ef2d0cfb3198ea1705d9329e0795601e63c
                                                                          • Instruction ID: 7ffb1ca761b2637873a4523954aff48f1a5c99044b67675f3f650c4e09dd2fd4
                                                                          • Opcode Fuzzy Hash: ae0c8a619b6ce83a1413700e087c3ef2d0cfb3198ea1705d9329e0795601e63c
                                                                          • Instruction Fuzzy Hash: 2731F82172DA854FD759F76898A16A5B7E0EBA6310F4402BBD04DC32D3DD6DB8058382
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4
                                                                          • API String ID: 0-3063612242
                                                                          • Opcode ID: 51ad4e2dec7533de348d20021e879ac3e1e5fcee0e8d7c4df68c56c984e5dc6d
                                                                          • Instruction ID: e57b46116edb6ffdaaa327b0ec590432e18c5f2cd91f497e7c7c259251af945f
                                                                          • Opcode Fuzzy Hash: 51ad4e2dec7533de348d20021e879ac3e1e5fcee0e8d7c4df68c56c984e5dc6d
                                                                          • Instruction Fuzzy Hash: 9931F722B1DE990BE398A75C68A9175BBC1EBDA624B0403FFE44CD3293DD2D7C414286
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4
                                                                          • API String ID: 0-3063612242
                                                                          • Opcode ID: 63ed712fc018cef0fca4b09e0d5a4e51245c08bc7e95b3aa4485c649e20713f6
                                                                          • Instruction ID: 5a2343907a102750de814c368c96183d852b472857b0e60915c17f4c9a47a751
                                                                          • Opcode Fuzzy Hash: 63ed712fc018cef0fca4b09e0d5a4e51245c08bc7e95b3aa4485c649e20713f6
                                                                          • Instruction Fuzzy Hash: 9E316F30B48A4E8FEB88FF18C8A17A9B7A1FF99304F004579E55DD32C6DE79A8018744
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4
                                                                          • API String ID: 0-3063612242
                                                                          • Opcode ID: 0c9ec099cfcd325d64b953a987a9b35cc3c9c8c8b723a2760e47a3774f14ba82
                                                                          • Instruction ID: dbbce51eb89c1de817418631613d311d69f627d98359379a7f5c837dc3f04812
                                                                          • Opcode Fuzzy Hash: 0c9ec099cfcd325d64b953a987a9b35cc3c9c8c8b723a2760e47a3774f14ba82
                                                                          • Instruction Fuzzy Hash: 9621F621E0E6C94FD7A6EB7444B62B5BBD0EF57320B4405FAD04DC72A3DD2CA8448346
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$3Q4
                                                                          • API String ID: 0-2280264602
                                                                          • Opcode ID: 333439495fb425b6b8a6b41371a28fd88a4cc7f0e24a948e9480bb5d2aa7043f
                                                                          • Instruction ID: 983e5ca7f531ea0d6c6cb047dda66c4a045a7836771ef160813b9fb681ae7b19
                                                                          • Opcode Fuzzy Hash: 333439495fb425b6b8a6b41371a28fd88a4cc7f0e24a948e9480bb5d2aa7043f
                                                                          • Instruction Fuzzy Hash: DD210721B5DB894FE7D5F73844AA2B9BBD0EF56314F0405BFE948D3192ED2CA4808342
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4
                                                                          • API String ID: 0-3063612242
                                                                          • Opcode ID: 963441769db611d1c0987424b7e2a51c1e38161f9fcb5d5b83abf7d2e5c8908e
                                                                          • Instruction ID: cf53822864cf259e3247494f266c5f64562f6a494f65a5e84baa9a3fea243ee8
                                                                          • Opcode Fuzzy Hash: 963441769db611d1c0987424b7e2a51c1e38161f9fcb5d5b83abf7d2e5c8908e
                                                                          • Instruction Fuzzy Hash: 43118431B1CA498FEB58FB5898A25A8B7E0FF89610F4401BAE44DD3286DE3CB8404781
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4$@3A4
                                                                          • API String ID: 0-3063612242
                                                                          • Opcode ID: febc163a550fddf035328f314473f63512b5e781af5517f908e2d886d934f0dd
                                                                          • Instruction ID: 93bdab51766e1a91ddc80dd480a734a4755e547edeb52c57adaa63a6ecb920c7
                                                                          • Opcode Fuzzy Hash: febc163a550fddf035328f314473f63512b5e781af5517f908e2d886d934f0dd
                                                                          • Instruction Fuzzy Hash: 7B01C475F0D94D4AEB49EF64C0B55F8BAA1FF96310F1003BAE40ED3296DD2DB8418681
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: `K4$d
                                                                          • API String ID: 0-667312335
                                                                          • Opcode ID: f248fc994834eb723c598a9c953a6178f8d049fb47206e7cbb845ef6706915b6
                                                                          • Instruction ID: 643d275fea20b7e3731b5b2c5650d9623d62ad6e63c76344e5413638df8aa914
                                                                          • Opcode Fuzzy Hash: f248fc994834eb723c598a9c953a6178f8d049fb47206e7cbb845ef6706915b6
                                                                          • Instruction Fuzzy Hash: 08E12430B18A098FDB58EF18C8A157577E1FF9A310B1485B9D58AC7296DE39E842CB80
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4
                                                                          • API String ID: 0-266369152
                                                                          • Opcode ID: c6a5cf17ffc62a0a6126df4d5076b28220d52b91d8fe5b9fd77a1b8452991aa8
                                                                          • Instruction ID: b85d7109058449d7c953a6afe9cacd5463838c1c59f32043b5fc573966a6f725
                                                                          • Opcode Fuzzy Hash: c6a5cf17ffc62a0a6126df4d5076b28220d52b91d8fe5b9fd77a1b8452991aa8
                                                                          • Instruction Fuzzy Hash: 6E619030A1864A8FDB94FB58C8E2AA477E2FF99314F404179C50ED7296DE3DAC41DB41
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$;
                                                                          • API String ID: 0-2984178292
                                                                          • Opcode ID: d28d037ce6c82c851a2064c46e0784f69cb95a9dd44515746f683fa30eaf2e3a
                                                                          • Instruction ID: a1b614ccbf3f00ab9ff1617a7cdc45400d81fd8b33f8905e3556fc1a4f7d329b
                                                                          • Opcode Fuzzy Hash: d28d037ce6c82c851a2064c46e0784f69cb95a9dd44515746f683fa30eaf2e3a
                                                                          • Instruction Fuzzy Hash: 2C411431B5DA490FE799FB2884F62F577D2EF9A22070402FAD54EC3293DD2D68429781
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4
                                                                          • API String ID: 0-266369152
                                                                          • Opcode ID: 43b0b894a716e5a33a0cffa8d8f8a765daf25f03117ea6f6b54bad95a31508f5
                                                                          • Instruction ID: 8e283c04ede98e5550eb0aee196eddd6a2bcef3a1981cf49dc3c0f041e0aee75
                                                                          • Opcode Fuzzy Hash: 43b0b894a716e5a33a0cffa8d8f8a765daf25f03117ea6f6b54bad95a31508f5
                                                                          • Instruction Fuzzy Hash: 0341BA31A4C68A4FEB54BB1C84966B57BE1FF96320F14017AE589C3292DE3CB8429745
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4
                                                                          • API String ID: 0-266369152
                                                                          • Opcode ID: 11a278c3eb3bc299df3ec348e85d0c744ed225e211c613ebb3799d10981b9507
                                                                          • Instruction ID: 77aa345de95eb6eb99f2eca140510bfe7459474a3c23c3e7f08381d5af4b48c9
                                                                          • Opcode Fuzzy Hash: 11a278c3eb3bc299df3ec348e85d0c744ed225e211c613ebb3799d10981b9507
                                                                          • Instruction Fuzzy Hash: C841C83171C68A4FEB58FA1C84966B97BD1FB96320F14013EE58DC3292DE3CB8429745
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (MF4$(MF4
                                                                          • API String ID: 0-2073750113
                                                                          • Opcode ID: ce3a8a6eb67072be78bc8f18badcc58edec22c42acea62a90635d2fa8b8b7e33
                                                                          • Instruction ID: 736a9ba71d25fca2e5caa1df8ccc2d18e07264fac16106742379d7d0a84a8d02
                                                                          • Opcode Fuzzy Hash: ce3a8a6eb67072be78bc8f18badcc58edec22c42acea62a90635d2fa8b8b7e33
                                                                          • Instruction Fuzzy Hash: DB41C361B1CE8A0FE792EB2C54A567967D2FFD9304B5500BED58DC3293ED2CE9029341
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: HzF4$HzF4
                                                                          • API String ID: 0-3002283447
                                                                          • Opcode ID: aac01162e100ef4ac45b2bcc4f0077c1b7a315d5c4f6ab1b39d3538643278d1c
                                                                          • Instruction ID: 891605bd738d7cc113edf1e3908b50a663669da3435be87ed123bcda2b7a0a48
                                                                          • Opcode Fuzzy Hash: aac01162e100ef4ac45b2bcc4f0077c1b7a315d5c4f6ab1b39d3538643278d1c
                                                                          • Instruction Fuzzy Hash: 1E419261B1CA8A0FE796E72C44B46797BD1FF9A200F1944BED18DC72A6DD2CE902D341
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: AF4$AF4
                                                                          • API String ID: 0-2653918432
                                                                          • Opcode ID: 675000c0f621a6a19dfe980665938425e992b262f53e34132ade0b55729dc449
                                                                          • Instruction ID: 3323d9fd99a84cf5549f159b9697df62d79ee9645e9f88e9f59aa521830055db
                                                                          • Opcode Fuzzy Hash: 675000c0f621a6a19dfe980665938425e992b262f53e34132ade0b55729dc449
                                                                          • Instruction Fuzzy Hash: 0E41B121B1CA4A4FE796EB2C94A567977D1FF9A200F5904BAD18DC7292DE3CF901D301
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: ~F4$~F4
                                                                          • API String ID: 0-685830136
                                                                          • Opcode ID: 4daf0cb82fd8d1ae352b79a27af0bd24226df3ca390093ca65ef17246785fb0c
                                                                          • Instruction ID: f2385d59a8d93df6977348608e4d7a9798922feaf876dad1ec5a3c11ff520a02
                                                                          • Opcode Fuzzy Hash: 4daf0cb82fd8d1ae352b79a27af0bd24226df3ca390093ca65ef17246785fb0c
                                                                          • Instruction Fuzzy Hash: 6B41C461B1CA8A4FE796EB1C84A463977D1FF9A200B1944BEE14DC72A2DE2CF901D301
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @HF4$@HF4
                                                                          • API String ID: 0-748214974
                                                                          • Opcode ID: 660460397db42c8da8727872e5f6f86799697216074eb43f87b98adeaa105fd4
                                                                          • Instruction ID: b23303575ecd6414a570245ece6deb8fac960183a4324e11863629bfe658ee40
                                                                          • Opcode Fuzzy Hash: 660460397db42c8da8727872e5f6f86799697216074eb43f87b98adeaa105fd4
                                                                          • Instruction Fuzzy Hash: E541B221B1CA8A4FE796EB1C84E563977D1FF9A200B1904BAD14DC7292DE2CF901D341
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: hUF4$hUF4
                                                                          • API String ID: 0-2205640973
                                                                          • Opcode ID: c41cc52848c0f95cfc936aadb64be297c77134751da07003265337a914ab0b36
                                                                          • Instruction ID: f6c730f1a02c84413f6c4f341597259c217756478d400a0579e5439659ce4c35
                                                                          • Opcode Fuzzy Hash: c41cc52848c0f95cfc936aadb64be297c77134751da07003265337a914ab0b36
                                                                          • Instruction Fuzzy Hash: 4841BE21B1CD4A0FE7D6EB2C44A463AA6C2FFDA240B58447AE14DD3396DE3CE8029341
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4
                                                                          • API String ID: 0-266369152
                                                                          • Opcode ID: bb69c93237c2f7568f76aa7f9701e1ebc29008025e04bd414257a66b8e6b9690
                                                                          • Instruction ID: 2e9c89314a48233d0b7014582ce3b88b533231453d6fb758cd186ac88ece7013
                                                                          • Opcode Fuzzy Hash: bb69c93237c2f7568f76aa7f9701e1ebc29008025e04bd414257a66b8e6b9690
                                                                          • Instruction Fuzzy Hash: 8D31FB71F1DA894FE786EB6884A61B8B7E1FF96310F0441FEC14AC3292DE2CE8058741
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4
                                                                          • API String ID: 0-266369152
                                                                          • Opcode ID: a34446cda4b5d5fd968316b4dc0266965d3cda5944f28fecacd1ba01527d2d16
                                                                          • Instruction ID: b0ee4a1358999640ff9595e229e0f8a6721261f07f773a64caab7fba72cfbf4b
                                                                          • Opcode Fuzzy Hash: a34446cda4b5d5fd968316b4dc0266965d3cda5944f28fecacd1ba01527d2d16
                                                                          • Instruction Fuzzy Hash: D131E772B0994E0BEB94FBAC94A61EDB7E0FF96314B0401B6D10CD3282DD3D78465781
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4
                                                                          • API String ID: 0-266369152
                                                                          • Opcode ID: 9324702d8f80f2e7bf14f48b3e1176ca86da6b8a5c09ff95963ba198a9445534
                                                                          • Instruction ID: 3395669f8a51a3e03ce991ebbcc77d2fd0dda271954cdf55b176f6c1224782d3
                                                                          • Opcode Fuzzy Hash: 9324702d8f80f2e7bf14f48b3e1176ca86da6b8a5c09ff95963ba198a9445534
                                                                          • Instruction Fuzzy Hash: 4E213C31A0C6994FD759FF6C88655A97BE0FF99220705027FD448D72D3DE286806C781
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4
                                                                          • API String ID: 0-266369152
                                                                          • Opcode ID: 50c5b638cfa811fde29b0e85a03895590e6a07254708670b8b7788fc37848ed5
                                                                          • Instruction ID: c88364cd0051417b22c4e6e08f7d2a5597ce7cc4ab847c1928468fd6ab274b60
                                                                          • Opcode Fuzzy Hash: 50c5b638cfa811fde29b0e85a03895590e6a07254708670b8b7788fc37848ed5
                                                                          • Instruction Fuzzy Hash: 7E21FB52B0EAC54FE755EB2848B11A4BBA0FF57650B4905FBD088C72D3DD2DB8458B82
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4
                                                                          • API String ID: 0-266369152
                                                                          • Opcode ID: a195634d9adfa7e964f026ebe804d94f7633fc3686df8152863a46e35eea70e8
                                                                          • Instruction ID: b0b76b8467290a3eed88120e768b04dcc74fda67867ea4fc979f83cc83c7061b
                                                                          • Opcode Fuzzy Hash: a195634d9adfa7e964f026ebe804d94f7633fc3686df8152863a46e35eea70e8
                                                                          • Instruction Fuzzy Hash: A0219062B5881D4FEB94FB5C94A26ECB7E1EF99320B0402BAE50DD3286CE3C384157D1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$+^4
                                                                          • API String ID: 0-1721650127
                                                                          • Opcode ID: f7da525affcaa08dd079758d53350e43ad0c13a12631397ebad683c2f4561cb9
                                                                          • Instruction ID: 2bfa353208fe7d4508855a668f2506735e7d2a5a005229220264c373227eb88b
                                                                          • Opcode Fuzzy Hash: f7da525affcaa08dd079758d53350e43ad0c13a12631397ebad683c2f4561cb9
                                                                          • Instruction Fuzzy Hash: A221C232F1895D4FEB85EBA884A66BDB7E1FF89310F4401B7D50DD3292DE2CA8415781
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$@3A4
                                                                          • API String ID: 0-266369152
                                                                          • Opcode ID: 8f0c6f453324e7cc8d14478c202f3fce2dc197459743eb27f95aff41f4a1c970
                                                                          • Instruction ID: a65317ce6c3e12fa8d7f99ed90dc5a333b67b0f4e3ce69bc2fa8e30ac470a5cd
                                                                          • Opcode Fuzzy Hash: 8f0c6f453324e7cc8d14478c202f3fce2dc197459743eb27f95aff41f4a1c970
                                                                          • Instruction Fuzzy Hash: B5312130A585598FDB94FB54C8E2BA8B3E1FB99314F5401B9D00ED7292DE3C6C81DB41
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4$_
                                                                          • API String ID: 0-1391310414
                                                                          • Opcode ID: ea02b481187b74de3e9ae35f5fee8da2bd846674c7fb862fb14203b3a8439d1d
                                                                          • Instruction ID: 05b80060002a9e508656aa516e721543e339cf33d290e9487335a30bd2fcc6bd
                                                                          • Opcode Fuzzy Hash: ea02b481187b74de3e9ae35f5fee8da2bd846674c7fb862fb14203b3a8439d1d
                                                                          • Instruction Fuzzy Hash: F4F0E901B4EA9706F769776468B31716AC0DB57300F0801FAC948C71CBDC6D7C465386
                                                                          APIs
                                                                            • Part of subcall function 00007FFDA33DFE90: GetOverlappedResult.KERNEL32(00000000,?,00000000,?,00007FFDA339DAD4,?,00000000,?,00007FFDA33DFB7A), ref: 00007FFDA33DFED1
                                                                          • CloseHandle.KERNEL32(?,00000000,?,00007FFDA33DFB7A), ref: 00007FFDA339DAD8
                                                                          • CloseHandle.KERNEL32(?,00000000,?,00007FFDA33DFB7A), ref: 00007FFDA339DAE1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366806003.00007FFDA3381000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA3380000, based on PE: true
                                                                          • Associated: 00000009.00000002.3366768903.00007FFDA3380000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366884052.00007FFDA3435000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366920816.00007FFDA3436000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3366982519.00007FFDA34D7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367011040.00007FFDA34D8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367039825.00007FFDA34D9000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367066190.00007FFDA34DA000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                          • Associated: 00000009.00000002.3367097471.00007FFDA34DD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffda3380000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID: CloseHandle$OverlappedResult
                                                                          • String ID:
                                                                          • API String ID: 953004297-0
                                                                          • Opcode ID: 1adeb1c753193930ca63ec45b27ee3b36d352086f62141c03ebabb4f064deb36
                                                                          • Instruction ID: 7f56b1680b44f7853017a4f90d9c2475f3be2fea4d015819f89aefd04ce7348c
                                                                          • Opcode Fuzzy Hash: 1adeb1c753193930ca63ec45b27ee3b36d352086f62141c03ebabb4f064deb36
                                                                          • Instruction Fuzzy Hash: BFE08643B0994586F630B662F4612BE6321AF88790F044032DFDD57BD38D2EE4828B14
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3361045403.0000000002D80000.00000040.00000020.00020000.00000000.sdmp, Offset: 02D80000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_2d80000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: 8b5c64e0111f0c9f7a75e77ea5bdc65aabc36e30693f977857ec78a3b3b05715
                                                                          • Instruction ID: 37700f26f4df3e15636b8822ed95574bb785218398e694b7707f6ea3383149b4
                                                                          • Opcode Fuzzy Hash: 8b5c64e0111f0c9f7a75e77ea5bdc65aabc36e30693f977857ec78a3b3b05715
                                                                          • Instruction Fuzzy Hash: C562C260B6CE458BCB2C552C44E4339A291FF85B0AF64592EF49BC7B61E721DC85CB82
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: M_L
                                                                          • API String ID: 0-290739141
                                                                          • Opcode ID: 046866ca210f635b2a3cef4191d6250a0271ed2e687d06cc130952f84d535099
                                                                          • Instruction ID: 22cc10df6b1450a8331f3f176829212ad7c3cc44e273a8e4fd58f5062195d88d
                                                                          • Opcode Fuzzy Hash: 046866ca210f635b2a3cef4191d6250a0271ed2e687d06cc130952f84d535099
                                                                          • Instruction Fuzzy Hash: 078160317189098FDB98EB1CD499A6977E2FF99311B1502BAE04EC73A2DE34FC418B41
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: 29b1fc90c429a173b86025089f34f945c8e87aa0bf71dde0aba75fde6a71555e
                                                                          • Instruction ID: 0d3252a208382820dfd8c70efc27de484aeae4fa712c6bbeb9f1513cf7e37a84
                                                                          • Opcode Fuzzy Hash: 29b1fc90c429a173b86025089f34f945c8e87aa0bf71dde0aba75fde6a71555e
                                                                          • Instruction Fuzzy Hash: A5310222B4C98D0FEB55FB2898A51B9BBE0EF86210F4441F6D54DC3292ED3C79428742
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: 1dcdbdc74c117dbac193df6ed402918a591b264a4463b61e3b2e145a1556abac
                                                                          • Instruction ID: bba5b84fdd2202558f40e4cd7b722776d714ca2c7b4111f19dd8944fa64ed32d
                                                                          • Opcode Fuzzy Hash: 1dcdbdc74c117dbac193df6ed402918a591b264a4463b61e3b2e145a1556abac
                                                                          • Instruction Fuzzy Hash: 81318E6275DAC60FE790A65CA8E83B5B7D4EB96331F4401BBE94CC3192D92ED485C342
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: 648ff0ee088856e5c8165d1283ea6cf183a65806b1a5cd2e35362ff8c3f0051b
                                                                          • Instruction ID: ad77d46ffa2c94eba6ab9e7fb46da7e82261da4f54b1f738cb1a8a26594575fa
                                                                          • Opcode Fuzzy Hash: 648ff0ee088856e5c8165d1283ea6cf183a65806b1a5cd2e35362ff8c3f0051b
                                                                          • Instruction Fuzzy Hash: 30214E12B5DD5B0BFA68F65C68E55B577D1EB8627074403BAD18DC3383DC2DBC029281
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: edada9f6d4654e752820f21293303735a61fd8c2e1987e7cff7ef8efdc00ffaa
                                                                          • Instruction ID: 85fd09cb61fc3da5b36ccd4510de6ae840c4fdaa42aae7f1cae8c38c8b7ed3a2
                                                                          • Opcode Fuzzy Hash: edada9f6d4654e752820f21293303735a61fd8c2e1987e7cff7ef8efdc00ffaa
                                                                          • Instruction Fuzzy Hash: 9B310921B4DF8C0FE755A66C58A91B5BFE0EBAB215B0402FBD448C32A2DD2978498342
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: f57c0f9dcc272246f6a325e1c784e7e70bff472bf2e42d2ec36e3dcdae917477
                                                                          • Instruction ID: f71bc45637fac10caaeb2a0340d0b29f35d8b80e92f83d1a7defb1640f152d0c
                                                                          • Opcode Fuzzy Hash: f57c0f9dcc272246f6a325e1c784e7e70bff472bf2e42d2ec36e3dcdae917477
                                                                          • Instruction Fuzzy Hash: 68210A22B5DD5B0BFAA8F65CA8E65B573D1EF8A270754027AD18DC3387DC2D7C029281
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: _L_L
                                                                          • API String ID: 0-2313418860
                                                                          • Opcode ID: 136c88e60e2e1eb558c19a9ce744270b7f4a4c6d87c74ff67eb3d50966ab258a
                                                                          • Instruction ID: 788aab844646dbfda4164ae9d3df1d7fd8993d79d624ad8b261b393af895be48
                                                                          • Opcode Fuzzy Hash: 136c88e60e2e1eb558c19a9ce744270b7f4a4c6d87c74ff67eb3d50966ab258a
                                                                          • Instruction Fuzzy Hash: 7E210B12B5D94A0BF668F25E6CE51B537C2EB9627074402BAD14DC3293DC2D7C429251
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: 15bbe8e764c2f4d90413eccfb69c5313c7feb3acf58ee54810c6b838623879d5
                                                                          • Instruction ID: 94561a03b720f29368ad2bb07e1e0e501852ac0e79a076fbade453c75c07d50d
                                                                          • Opcode Fuzzy Hash: 15bbe8e764c2f4d90413eccfb69c5313c7feb3acf58ee54810c6b838623879d5
                                                                          • Instruction Fuzzy Hash: 24213031F1890D4FDB95EB5C94A56FD77E1EB99310F04027AD14ED3291DE28A8429781
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: X'E4
                                                                          • API String ID: 0-3192252353
                                                                          • Opcode ID: f04469509d3942f541be389e474b3f81b50ab8c6f8910f6c8c95f177c1d5f5a3
                                                                          • Instruction ID: 1cc0ebd2ddc64a7d1fd6c2dc212d64e78ccc0feebbcf694300c93ca7d26bf40a
                                                                          • Opcode Fuzzy Hash: f04469509d3942f541be389e474b3f81b50ab8c6f8910f6c8c95f177c1d5f5a3
                                                                          • Instruction Fuzzy Hash: 3E21E122A0E5891FEB55F77894E61EA7BE0EF03214B4805FAD088CB183ED3D79458742
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: 205a6e09d388bd29fd13d83ba47a350ccd9ef7c2a50e30bca2413561529887a9
                                                                          • Instruction ID: ec523814767a1653b3f67cd8a4262fa7f2cefd51c9331d947dbc9a14d629e33a
                                                                          • Opcode Fuzzy Hash: 205a6e09d388bd29fd13d83ba47a350ccd9ef7c2a50e30bca2413561529887a9
                                                                          • Instruction Fuzzy Hash: 4E213D72E0D58E5AEBA5DF78D8AA0F97BE0FF52360F04017AE54AD3587ED1CA901C241
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: 398a054182afb7b5d9acca77b77070e5b04d2c9e7dfea0f996f479d5844a87ec
                                                                          • Instruction ID: cf58b0ab61102a8685cc8b04fc65f42206a7cc2b4c66ec05dcab1527a17275c6
                                                                          • Opcode Fuzzy Hash: 398a054182afb7b5d9acca77b77070e5b04d2c9e7dfea0f996f479d5844a87ec
                                                                          • Instruction Fuzzy Hash: AF110612B4C9870BEA65B75CA8F25FA6B90EF9723170441B7D1CDC3287DC1D68469381
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: 42b6b207fcbe6a6203588ef22bf587118d36d5a050066385015a873145166cb4
                                                                          • Instruction ID: ca52b19f02d318ba3c43f4c537656fe6281c6fca1cb073d24bd49b7d64897100
                                                                          • Opcode Fuzzy Hash: 42b6b207fcbe6a6203588ef22bf587118d36d5a050066385015a873145166cb4
                                                                          • Instruction Fuzzy Hash: 64012612B5E9970FEB49F76D48F517467D2EB9A22470401BBD18CC3292DC2CAC05A342
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: a8cba77fcf1018117156a443bf633ea3f6428bd3e7c87f66ce744c1c73f6b296
                                                                          • Instruction ID: d9dfc924d2b6a8d0ce96a2bdbadb65ee8b8db01f23ad5e83ab9fa9e9f35a160c
                                                                          • Opcode Fuzzy Hash: a8cba77fcf1018117156a443bf633ea3f6428bd3e7c87f66ce744c1c73f6b296
                                                                          • Instruction Fuzzy Hash: 4501DB21B28D4A0BEBADF7AD94E55B6B2D5EFD5220740067AE04EC3386DC6DE8458341
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: 1c5a8f031b21979e427a82ee7acf3e0ad635483a47c53461b680e89eaa0410dd
                                                                          • Instruction ID: 4b05b776a5f434bd97141f424cd60a5e6f7211a083466a8b477d2e80140f7a48
                                                                          • Opcode Fuzzy Hash: 1c5a8f031b21979e427a82ee7acf3e0ad635483a47c53461b680e89eaa0410dd
                                                                          • Instruction Fuzzy Hash: 52F0C851B4DB8D0FE745A6BC6C652717BD0EB9A225B0802FFE44CC32A3DC6D68494396
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: e7d661b4b23a249f6b4b5df2a7bc1461497d8871c13a1b85c4c2739dfab8c47e
                                                                          • Instruction ID: bed0b6047c9ae4d6d0ce1d3f100795ee9a03428f04b8810c63d966d6b5ea37f7
                                                                          • Opcode Fuzzy Hash: e7d661b4b23a249f6b4b5df2a7bc1461497d8871c13a1b85c4c2739dfab8c47e
                                                                          • Instruction Fuzzy Hash: 9501F122A0DBC60FE756E7288C715997FB0AF93220B0A40F7C089C7193E92C68458342
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: 179a7f86023fa343bf657a2aa1afaca28d2c732f51ca6a2d2525e408193172ab
                                                                          • Instruction ID: b200ae7baa300b489e1adebb363b5a2401b7b4bb185d6124e1b8fc2c332266d9
                                                                          • Opcode Fuzzy Hash: 179a7f86023fa343bf657a2aa1afaca28d2c732f51ca6a2d2525e408193172ab
                                                                          • Instruction Fuzzy Hash: FDF0C811B0EBC90FE78A966C5865174BF90DB9B11070906FBD489C71A3DC5C98454352
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: c20a6ca56a6340e4e3e692ab224fb25146d73099380b1d83d785d418f61aecd6
                                                                          • Instruction ID: 76f13e75b64f705f3696e700e71bd32b4ba0ab22ea7416895b3b292e80a63ac8
                                                                          • Opcode Fuzzy Hash: c20a6ca56a6340e4e3e692ab224fb25146d73099380b1d83d785d418f61aecd6
                                                                          • Instruction Fuzzy Hash: DCF0F61170DBC50FE34A626C5C652617FE0DBAB130B0902FBE44CD72E7C85C0C458362
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: 338ce253f3a4a1a142d268f2c098e57a6209d23d6bd1043a0b92a350b188b18d
                                                                          • Instruction ID: 6f9e72242c39045c2995a58a5063515e31636472189c0048176ffb27016b23a9
                                                                          • Opcode Fuzzy Hash: 338ce253f3a4a1a142d268f2c098e57a6209d23d6bd1043a0b92a350b188b18d
                                                                          • Instruction Fuzzy Hash: 6FF02E12A6CBC60BE758677C18622A477C4EB8B634F440177D589C31C2DD9C6C414357
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: P<A4
                                                                          • API String ID: 0-267273915
                                                                          • Opcode ID: 4a967e244c960ccdefb301caabdab9a4fb2dde63cc0640d5644f5386c6032e3e
                                                                          • Instruction ID: c031e42d0573cd7df0d3cd6d29f67d3aea75356f6e0be1022f6c040b5f3101a7
                                                                          • Opcode Fuzzy Hash: 4a967e244c960ccdefb301caabdab9a4fb2dde63cc0640d5644f5386c6032e3e
                                                                          • Instruction Fuzzy Hash: 51F02773A8C58D4FFB90AA5C94D60E97BD0FF52210F4040F7C508C7042ED3865974A80
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: 8bf1b2336ea0e1b9a6642a477b172c18494fe4960af808712b954c1430cfecac
                                                                          • Instruction ID: d6af44d511038b5abb64e3c40471ef33c8ef85e5368a453ba0bcd61719ab6454
                                                                          • Opcode Fuzzy Hash: 8bf1b2336ea0e1b9a6642a477b172c18494fe4960af808712b954c1430cfecac
                                                                          • Instruction Fuzzy Hash: BCF02E2175CC4E0FEDE8F35D88A19B5A3D0DFDA2107440176E50DC3385DC2EE8854385
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: 1edfab3be52229e799ba19248503bbe6fa6574c9baeedee0345a289245fad737
                                                                          • Instruction ID: 3bfe336fe0ea1f82db0f80104b33fd02bf5bc1675b6cd570881fb357be485320
                                                                          • Opcode Fuzzy Hash: 1edfab3be52229e799ba19248503bbe6fa6574c9baeedee0345a289245fad737
                                                                          • Instruction Fuzzy Hash: 5CF0E211A4D9890FE75CA66C58612A0B7C0EB8A234B0806BBD18CC32C2DD2C68824396
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @3A4
                                                                          • API String ID: 0-1420514841
                                                                          • Opcode ID: c5bcfb435ac4e16852b0ddc8424069ac0049310a308b9d55bcde74373ca6b8e7
                                                                          • Instruction ID: 3d846f8cff5580f79e232bde0faca54db069e4fa991f81e1127e351486403121
                                                                          • Opcode Fuzzy Hash: c5bcfb435ac4e16852b0ddc8424069ac0049310a308b9d55bcde74373ca6b8e7
                                                                          • Instruction Fuzzy Hash: 74E02B21B6D9954AE71C765DAC657A976C4E7CE710F44023BF48CC32C2DC5C688152DB
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c46e58f73c5de578b66349d143c0eadc56d7f0b788aea881ec56ddf67afb4254
                                                                          • Instruction ID: 878ffe6c223da4fa0b090d85520ac8aad3fdd4205b8b6c16bedf5705a01a4011
                                                                          • Opcode Fuzzy Hash: c46e58f73c5de578b66349d143c0eadc56d7f0b788aea881ec56ddf67afb4254
                                                                          • Instruction Fuzzy Hash: B2F1D331A18A498FDB99DF18C4A4BB977E1FF5A315F1401BAD54EC7292CA39F842CB40
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 64f61cea94a2042ec862f636c341d569d96e25c0801f53c84e200ec1aff53508
                                                                          • Instruction ID: c8fa722846f686e3e86be5b5a5633a6ab7b56580365086b3fa2c6f12db731c84
                                                                          • Opcode Fuzzy Hash: 64f61cea94a2042ec862f636c341d569d96e25c0801f53c84e200ec1aff53508
                                                                          • Instruction Fuzzy Hash: 8BB1B430B489099FEB94FB58C495AB977E6FF99314F1042B9D01EC3292DE39B8428781
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 405ee3ecc997caaaf884aa387e8626c1d24e13042075186c7a8ebbbf531ed727
                                                                          • Instruction ID: 2dbcdbd0bf17d92ed45caa1a715a85354a6b0fd11e8e0bf299f373bab8aaa212
                                                                          • Opcode Fuzzy Hash: 405ee3ecc997caaaf884aa387e8626c1d24e13042075186c7a8ebbbf531ed727
                                                                          • Instruction Fuzzy Hash: EAA19210F19E9A0BE786A76948F237A66D6EF9A700F4440BAD24DC73D3CE2CEC015781
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4beafcd5192e5c5cd2c1cdc596c7fe9e6b7a9654f980def66c34286043f2db7c
                                                                          • Instruction ID: 684bb694622d60d6419008d6adb09a984bef1174af8a2111305025bac292609c
                                                                          • Opcode Fuzzy Hash: 4beafcd5192e5c5cd2c1cdc596c7fe9e6b7a9654f980def66c34286043f2db7c
                                                                          • Instruction Fuzzy Hash: F6710731F489099FEB94FB5CC4A9AA877E2FF99310F1501B5E10DD72A1DE39AC819B40
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1e710bb33361c200813f57d1c4c366f9a65e2d454aab13a061f7731dfa66ce63
                                                                          • Instruction ID: 30ccc80b5029e6701388fe9b99379bb18d9df9a9fd76d8da534595588b12728d
                                                                          • Opcode Fuzzy Hash: 1e710bb33361c200813f57d1c4c366f9a65e2d454aab13a061f7731dfa66ce63
                                                                          • Instruction Fuzzy Hash: 6F713F30B589099FEB94FB5CC095A6877E2FF99314F1142B9D11EC7692DB39F8418B80
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7f4276955827211926b17261cca1e03d162b2764f94dff4e6aa8529125d64abc
                                                                          • Instruction ID: 795373b09d182fe29c176dfa10de35cae5fbbd4091328c988ac516d57bd298d5
                                                                          • Opcode Fuzzy Hash: 7f4276955827211926b17261cca1e03d162b2764f94dff4e6aa8529125d64abc
                                                                          • Instruction Fuzzy Hash: 9951C621B1CA8A0FE7A6E72C44A42796BD1FFDA244F1504BED18DC7292DE2CF802D301
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 43b619d06121ab52399225e1e6c449b47302714ad4efbb56bc069343690a2fd6
                                                                          • Instruction ID: 7e3892ace5f00779d69a31d6d88a48424965e5cd2c50fb8eb5738a93b22f3fa9
                                                                          • Opcode Fuzzy Hash: 43b619d06121ab52399225e1e6c449b47302714ad4efbb56bc069343690a2fd6
                                                                          • Instruction Fuzzy Hash: 0251C361B1CE4A0FE7A6EB2C44A467967D1FF9A310F5500BED14DC7292EE2CE801D341
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 83082119537a54ae16b60635acf1a24d1a4f17bb30963626ebc9d56fe0f8ee2e
                                                                          • Instruction ID: afea77ad1473677d045fd1637273161876834c57db607df34388053b80d80595
                                                                          • Opcode Fuzzy Hash: 83082119537a54ae16b60635acf1a24d1a4f17bb30963626ebc9d56fe0f8ee2e
                                                                          • Instruction Fuzzy Hash: C041A321B1CA8A4FE796EB2C44A567977D1FF9A210B1500BED14DC7296EE2CEC42D341
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 27188239863711898b71bf76962358451c52235155e4425578651cecfb7800f6
                                                                          • Instruction ID: 627faa1f5dd7031b088960eabdd304738acfeb45f84f5f89bd4c6116169d50be
                                                                          • Opcode Fuzzy Hash: 27188239863711898b71bf76962358451c52235155e4425578651cecfb7800f6
                                                                          • Instruction Fuzzy Hash: CD41A261F1CE4A0FE796EB2C44A427AA7D2FF9A244B55407AD18DC3296DD3CE8019301
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 13085597a01fe5e2ad62605bf64e9373f8c1d69c78ce283cb64119838d770a1a
                                                                          • Instruction ID: 8f64c95d25067680e3b0efbcf87037bc9f4909f5eb8b8b9a10a9d62854d3160c
                                                                          • Opcode Fuzzy Hash: 13085597a01fe5e2ad62605bf64e9373f8c1d69c78ce283cb64119838d770a1a
                                                                          • Instruction Fuzzy Hash: D241B122B1DD4A0FEBD6EB2C44A427D67C2FFDA644B94417AD24DD3296DE2CE8029341
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a7a6d5a2994aed2bc6b70586ea8b131b923c9cc4430895bb22cb1b7bdb086f03
                                                                          • Instruction ID: 0ca63cbd21feba51042bbcdbca8ff9ed49be6c4bc4788d151508cd9ff0d20615
                                                                          • Opcode Fuzzy Hash: a7a6d5a2994aed2bc6b70586ea8b131b923c9cc4430895bb22cb1b7bdb086f03
                                                                          • Instruction Fuzzy Hash: 75416F30A0CA098FEB65EA28C495BB573E1FF96314F1444B9D18EC3292CE79E882D741
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b16a85ba515807f08c0fdfd9fdb62460ed096693fadede3ffac27e18de3bed24
                                                                          • Instruction ID: 1a348d378565707a1b480b0fb35bb28786177af2095a65cdbd963ed68dafd806
                                                                          • Opcode Fuzzy Hash: b16a85ba515807f08c0fdfd9fdb62460ed096693fadede3ffac27e18de3bed24
                                                                          • Instruction Fuzzy Hash: 0441B122B1DD4A0FE6D6FB1C44A527DA7C2FFD9240B55417AE14DD3396DE2CE8029341
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 3bd41b80838e30a2b74c3a68c5b9a588b3ec894d9f58f961a424e367d7eca4f8
                                                                          • Instruction ID: 9e40f7806f88f6f2f9c903086f47ab2e64ac65e2697fd56155bd50de10686bae
                                                                          • Opcode Fuzzy Hash: 3bd41b80838e30a2b74c3a68c5b9a588b3ec894d9f58f961a424e367d7eca4f8
                                                                          • Instruction Fuzzy Hash: 4131BF21B1DE4A4FE7D6EA2C54A527963C2FFDA354F1444BAD14DC3296DE3CE8029341
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 01c46331feba90e0fe39943ab26e99a929e030a78d690bb74dcd751659f46483
                                                                          • Instruction ID: 06375584d4e569fc8a888b331d3a81108c936ef042dc733135910a2aedaa8440
                                                                          • Opcode Fuzzy Hash: 01c46331feba90e0fe39943ab26e99a929e030a78d690bb74dcd751659f46483
                                                                          • Instruction Fuzzy Hash: 5031C221B1CA4A1FE796EB2C54A427967D2FFDA250F14407BD14DC3286DD2CE8029341
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 14bb38b4774a6eba16cab1a99c160d8dfafde03e3ccc819d0f4850ae2e3653d0
                                                                          • Instruction ID: 486a0c3735b1760e176ef9f7da3b125566a6749f6b2369b9ae5cc3e57b1fb2b3
                                                                          • Opcode Fuzzy Hash: 14bb38b4774a6eba16cab1a99c160d8dfafde03e3ccc819d0f4850ae2e3653d0
                                                                          • Instruction Fuzzy Hash: 5C418031F4C9098FEB68FA08C8A55B877E1EF95311F0001B9D60EC3691DE3DB8469782
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9c6b33e8f3ce564cb029243a6bd0e466078b13e2822b70ca631aeba5a2b85edf
                                                                          • Instruction ID: aeeafeb6c30bfe85649f16370e1c41ecb0b9f4c1b66bfc6c400abc806bf768fe
                                                                          • Opcode Fuzzy Hash: 9c6b33e8f3ce564cb029243a6bd0e466078b13e2822b70ca631aeba5a2b85edf
                                                                          • Instruction Fuzzy Hash: 5C31EA7190D7888FDB59DB68C8596EDBFF0EF56320F0441AFD049C7553D628A809CB51
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b8315dd2ed9f583bcaab6d5ceeae29649f38e336c744227dfdcb0daf68da0001
                                                                          • Instruction ID: 5bacd52ac1801daf86204d5a16c29b69008414dd6ca9c02b76647c31a711a081
                                                                          • Opcode Fuzzy Hash: b8315dd2ed9f583bcaab6d5ceeae29649f38e336c744227dfdcb0daf68da0001
                                                                          • Instruction Fuzzy Hash: 24318E31A4994A0FF764BB2898999B677E4FF56310B5402BDD548C3192DA3CFC828380
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 991ee144b694071124c5bf6a43d2571ead7e94aa5e9ba468257c16ee2c458e5a
                                                                          • Instruction ID: 6e5e5d870057fe1e93948d4eefb2c6b25b67dd6822bbf1982c56dce0ed67b0f4
                                                                          • Opcode Fuzzy Hash: 991ee144b694071124c5bf6a43d2571ead7e94aa5e9ba468257c16ee2c458e5a
                                                                          • Instruction Fuzzy Hash: 9631FB61B1CA4A4FE796EB2C54A4679A7D2FFDA244F14007FD14DC7292DE2CF8419341
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7f741fbf645dc9a6b6222888210438798b6ffabc3fb4f2217950ca55b2c5f590
                                                                          • Instruction ID: 30cf5b804eb969b25df0e39e0627a42b382b33978bfee7da185444e1498d6cb7
                                                                          • Opcode Fuzzy Hash: 7f741fbf645dc9a6b6222888210438798b6ffabc3fb4f2217950ca55b2c5f590
                                                                          • Instruction Fuzzy Hash: A131C921B1DA8A4FE796EB2C44A527967D2FFD6244F54007BD18DC7292DE2CF842D342
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c7542c3f8fa4aeca7b2b04aa9f228e789d9f9514bd2e379b1006a4de6ab1e47d
                                                                          • Instruction ID: b397731670649d1f0ef9383d06002012e09c5ba20f921ec1915b90a41ceb6f42
                                                                          • Opcode Fuzzy Hash: c7542c3f8fa4aeca7b2b04aa9f228e789d9f9514bd2e379b1006a4de6ab1e47d
                                                                          • Instruction Fuzzy Hash: 5D31E421B1CA8A5FE796EB2C44A4279A7D1FFDA244F14007FD18DC7292DE2CE8029341
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 07c43ee5ee6bbb16d6c0f0fcaae2ec7d4e21d211abe3b35508a97633e336c627
                                                                          • Instruction ID: de392c7dd5c53a802ca817af0995c99f7c2c289b5689e0931d97750afab64ac9
                                                                          • Opcode Fuzzy Hash: 07c43ee5ee6bbb16d6c0f0fcaae2ec7d4e21d211abe3b35508a97633e336c627
                                                                          • Instruction Fuzzy Hash: 90111200F18E1A17F696A66D44F537A61C6EF99A00F4481B9D20DD33C6CE6CFC526781
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b155d6e72e33413979c51346b693a51c87b90cddb4f1e41ef925bdb67284057e
                                                                          • Instruction ID: 2fbebd081ceb42c722e3f78490e5cdf5f8fc2b26de8dfedcfc5af4d15616d510
                                                                          • Opcode Fuzzy Hash: b155d6e72e33413979c51346b693a51c87b90cddb4f1e41ef925bdb67284057e
                                                                          • Instruction Fuzzy Hash: 1A21B87071CB458BDB44EA4CC89592ABBE2FFEA740F10496DE18983250CA79F8419B82
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 79cf734ff4ec900a10e97aec2602bbe0c41b2ed1dbb5d114e9b47dd20f20f484
                                                                          • Instruction ID: 4527d89d5e2954ddca2ff798e8e376beb8c4872690418cd1854de663e7d7dd54
                                                                          • Opcode Fuzzy Hash: 79cf734ff4ec900a10e97aec2602bbe0c41b2ed1dbb5d114e9b47dd20f20f484
                                                                          • Instruction Fuzzy Hash: DE110631A0D7484FDB199A08DC556F93BE0EB4B321F0000BBE149D3252DA755C558782
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ebf020b7ed4a4264e45ee29c275e631061fbad44e036d1d01546f43db88779f7
                                                                          • Instruction ID: d41785fb6a7f33d7d0d7cb160692134b9f652945a7801c82cc2cc8b63b00260d
                                                                          • Opcode Fuzzy Hash: ebf020b7ed4a4264e45ee29c275e631061fbad44e036d1d01546f43db88779f7
                                                                          • Instruction Fuzzy Hash: 4E11A05158E7C20BE35363B499651D17FE5AE87220B0D01FBD5C4CF1A7C95D688BC352
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: fbbb555ea222a8606b1bdbb451ba88715461abcd0cd0af8bbab8291dad214495
                                                                          • Instruction ID: 7df8e0919105cbffb349da389c44e5ede03309b6be2577b29dc0417a5dc13082
                                                                          • Opcode Fuzzy Hash: fbbb555ea222a8606b1bdbb451ba88715461abcd0cd0af8bbab8291dad214495
                                                                          • Instruction Fuzzy Hash: A111C631B4C5088FE768EA58D8A25B877E0EF49321F0001BED24ED3A51DE397C429642
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c4d2c5d594cab60e12af8a68b86b32e90e03ccf57f76c7e0362faf205e8155f0
                                                                          • Instruction ID: 0c0c5b391440825a47375536862ebd28ebee8be86cde580e627d892a502c9a3f
                                                                          • Opcode Fuzzy Hash: c4d2c5d594cab60e12af8a68b86b32e90e03ccf57f76c7e0362faf205e8155f0
                                                                          • Instruction Fuzzy Hash: 8C11B231A1CA4A4FE292EB1894A4679A7D1FFC9350F54447AE18CC3241DE3CF541D742
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a7c91f11840daeec53680837e9b01891328ad7fa970aa4afd6beba01138c9a33
                                                                          • Instruction ID: 0650a743aada7a36ad198f742b560f7de4e6a17c0b01c4ae85bde7b747ce48c1
                                                                          • Opcode Fuzzy Hash: a7c91f11840daeec53680837e9b01891328ad7fa970aa4afd6beba01138c9a33
                                                                          • Instruction Fuzzy Hash: AA11BF31A1CA4A4FE292EB1894A4679A7D1FFC9350F54457AE18CC3281DE3CE5429342
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 05e7dbf641615f3af2e9047696f1a65ca7ce8d9b5efb08ac1eacc8815870525e
                                                                          • Instruction ID: 6d4075b632537f030d8eda754c51815b09449ff5488386c078a7b81c8ac76904
                                                                          • Opcode Fuzzy Hash: 05e7dbf641615f3af2e9047696f1a65ca7ce8d9b5efb08ac1eacc8815870525e
                                                                          • Instruction Fuzzy Hash: 8A11C122A4E6895FE792E72898A61EDBFA0EF93220B4501F7D548C7193DD2C38458342
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8b3fe98260d98b9983bd3c6dbb91efde794db41bb2a97853d05dd2981873e34e
                                                                          • Instruction ID: c47cbac20fb783abd35e4aceb393966cfa9c5e1df81101118601f934103ce125
                                                                          • Opcode Fuzzy Hash: 8b3fe98260d98b9983bd3c6dbb91efde794db41bb2a97853d05dd2981873e34e
                                                                          • Instruction Fuzzy Hash: 57112E317085088FDB58DF58E455AA9B3E1FB58311F1001AFD14ED3662CE31AD428B44
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1f06bafac61fdeeb27901154bd6f0a883122995ef4bf705e81e9553be21d8826
                                                                          • Instruction ID: be31442e819751abdc5fd18ca9c0624ba5f475e062e45b16528b1084a67e6dfa
                                                                          • Opcode Fuzzy Hash: 1f06bafac61fdeeb27901154bd6f0a883122995ef4bf705e81e9553be21d8826
                                                                          • Instruction Fuzzy Hash: 4511C461A4E7D41FDB52A7388875AA07FF0EF5721070A05EBE089CB1E3D92DAC45C752
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 5c8c0e419cdc8ef1139e8e3a20f67ef08ce5d5ac3f21c768e41be1ba6ce54457
                                                                          • Instruction ID: 9578f0b70621bb09972ad97af13a4ff35f62e00dcef3002c9fd27e4b125adc36
                                                                          • Opcode Fuzzy Hash: 5c8c0e419cdc8ef1139e8e3a20f67ef08ce5d5ac3f21c768e41be1ba6ce54457
                                                                          • Instruction Fuzzy Hash: A4014422B5AA8A0EDB58F73D94A25E577E5EF8322034841F7C14CCB293EC2CB8029341
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 75660cdb21e98bf760bedc9f2ca839acf255026be81bbb2020fd57fe7e0976ef
                                                                          • Instruction ID: 78f90998d37b822d3a8d0184e7887eb917a0757efc02bdcdeb07e2f499ce24b5
                                                                          • Opcode Fuzzy Hash: 75660cdb21e98bf760bedc9f2ca839acf255026be81bbb2020fd57fe7e0976ef
                                                                          • Instruction Fuzzy Hash: 9BF09042B0EB890FD396916D2CA51747FD5D79B12170902F7D589C7297D84C5C8683A2
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 59bd598f122f40dd26548757d84f7a86df7b7ece862112a613a28d2b2eca002a
                                                                          • Instruction ID: 6c6e1d0ceed0acd5d063f645eb6144b7eb17d5cd02cc91123a04850c96c2aa5a
                                                                          • Opcode Fuzzy Hash: 59bd598f122f40dd26548757d84f7a86df7b7ece862112a613a28d2b2eca002a
                                                                          • Instruction Fuzzy Hash: A2F0BE12B5DD490FEB98F1AD28EA2B563C5E7EE23130401B7D048C3296CC5CAC828382
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2fa310992f002ede3e8ca8695afc68c820750437cbc19f16b6215331e35067ff
                                                                          • Instruction ID: 7c31467e89d859064fddca27d05aa125c215eb0709d8a0ba0e96f1fd87e2b167
                                                                          • Opcode Fuzzy Hash: 2fa310992f002ede3e8ca8695afc68c820750437cbc19f16b6215331e35067ff
                                                                          • Instruction Fuzzy Hash: 87F0DC30A584495FEB85FB6894A92BDBBA0EB86200F4001F2E40CC3292DD3C29828742
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c69ff33f39853496a1da3b3eb321a8f742ea451f96417aec1973289c5e2fb94b
                                                                          • Instruction ID: f6edb7ac164da1e6cb64d26d7451116ada55aa03bb613b2ad2bba24ce5f460a2
                                                                          • Opcode Fuzzy Hash: c69ff33f39853496a1da3b3eb321a8f742ea451f96417aec1973289c5e2fb94b
                                                                          • Instruction Fuzzy Hash: 94F0A711B19C1D0FAAA4F59D68E967677C5E7EE67174001BBE00CC3295CC1DBC429385
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 5ab01487cfb4b1c7a7cc15e0510234e571bd7861dd972ec04630166df7ef9261
                                                                          • Instruction ID: a02696b97ad506eaafb917dbf505500c4ff13bfae9d190fa7e1d4d155266463e
                                                                          • Opcode Fuzzy Hash: 5ab01487cfb4b1c7a7cc15e0510234e571bd7861dd972ec04630166df7ef9261
                                                                          • Instruction Fuzzy Hash: 5E018131F488098FEBA5A60CD49467577D2EF96311B1002F6D029C7294DA7CBC419780
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6454ce20710eb00414c25718195980c49a448e91ef8059bfa6e2cc42f11784dd
                                                                          • Instruction ID: 80ea6de92520b86a6375f37fac031fb524b50064bd2acfd8c5c41a981e1a8ae0
                                                                          • Opcode Fuzzy Hash: 6454ce20710eb00414c25718195980c49a448e91ef8059bfa6e2cc42f11784dd
                                                                          • Instruction Fuzzy Hash: 7501BF7071CB448BD744EF4CC89552ABBE1FBE9B41F10456EF18583260DA75F8419B83
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: bd8d42974977e33c7f3c87f321dbe9f51b1ee97f47c77c7cdd6982baef5cd59b
                                                                          • Instruction ID: 7538a7932a6582ab64db0dfa8d72d19bb11f4a20e806a63266585af29011fbbd
                                                                          • Opcode Fuzzy Hash: bd8d42974977e33c7f3c87f321dbe9f51b1ee97f47c77c7cdd6982baef5cd59b
                                                                          • Instruction Fuzzy Hash: 71F0E927A4D2891BD726A768DCB21E63FA0EF13225B0C82F2D58D8E057ED19280986D1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: abeabe83e13f08fa1c628da2d3740e17197e628e6623712fb84e2cd04c11d004
                                                                          • Instruction ID: c5fccc022d846c461a657f8c092d3fcac53c9e48ec390d896e03e4b80a8bd6c0
                                                                          • Opcode Fuzzy Hash: abeabe83e13f08fa1c628da2d3740e17197e628e6623712fb84e2cd04c11d004
                                                                          • Instruction Fuzzy Hash: 03F0DFA298E7C80FE7135B2408A20947F70AE13100B4E46EBD1D8CB0A3D51EA9099352
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: aa6c31274e265ce1902d2e9aefffc584ea27695c69051998d8be4890ae683040
                                                                          • Instruction ID: 88dd9694f53c65975a69c3a91ac1b3831436ca1816bd9fcd2499b62556dfb278
                                                                          • Opcode Fuzzy Hash: aa6c31274e265ce1902d2e9aefffc584ea27695c69051998d8be4890ae683040
                                                                          • Instruction Fuzzy Hash: CEE0DF22F1880A0FE7A8A76C64203FD72E2FBC9750F440239914EC3787EE7E98025380
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ee91feb8bdbb097e8b8d5665525d5b2dc6129e382700142b47ef47c9f3f24a2a
                                                                          • Instruction ID: eb418bc7d5be54a5d6795b9532bcf2e92015f7fcff0c17e079e21f41f75443bc
                                                                          • Opcode Fuzzy Hash: ee91feb8bdbb097e8b8d5665525d5b2dc6129e382700142b47ef47c9f3f24a2a
                                                                          • Instruction Fuzzy Hash: 9AF03092A5EBC50FD792A33818B51943FA19F17210F8A02FBC189CB1E3D91E680A9312
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b67cdff1bb8e1b7a8edc9b0d333c2e0aee6d6ea5a05d841839afe3c7bf1f2776
                                                                          • Instruction ID: c97eb00396e6fe8b1931ce38d3ab5f479b67800f6524e180ea7f31b9d4e084e1
                                                                          • Opcode Fuzzy Hash: b67cdff1bb8e1b7a8edc9b0d333c2e0aee6d6ea5a05d841839afe3c7bf1f2776
                                                                          • Instruction Fuzzy Hash: A3F0AC34B499098FDB84FB6490A2ABC7262FF4A304F500078D50DD7282CF7EB8419B41
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 39bb5001ffd85686b5ed20c4320848def477f84ef312333598d18c76727127a7
                                                                          • Instruction ID: 12f691b72c25f838c5efdc24b55945b60941c365b4d4866e22aa40989e12fb17
                                                                          • Opcode Fuzzy Hash: 39bb5001ffd85686b5ed20c4320848def477f84ef312333598d18c76727127a7
                                                                          • Instruction Fuzzy Hash: 72E02B31B10B4C4B8F0DA53D88AA43073D5D7AB106388416A9406CB396EC55DC85C341
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366606539.00007FFD34550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34550000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34550000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 89b6d7defc16fc4e234c57c80fd1fb4109f102b455e3ce71451177dfab82d0e0
                                                                          • Instruction ID: ea8860d7675a787cd5ee9e514ffcdea6b0499d41dc80d1635cacea9bbe31dc8d
                                                                          • Opcode Fuzzy Hash: 89b6d7defc16fc4e234c57c80fd1fb4109f102b455e3ce71451177dfab82d0e0
                                                                          • Instruction Fuzzy Hash: 8CD05B34B60A4C474F0CA52D449943073D1D7AA5067D44179940BC7295DD59EC45C744
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3365650854.00007FFD34350000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34350000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34350000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 5ebb8a6d476ab85757cc61ffc06780719d6fe3705247a74cf04dfd519ec2c0f9
                                                                          • Instruction ID: 5838b2c583c336cb14c00f7f35af0b3969bb2f15c8e8fa5c705e6997d8fe6c45
                                                                          • Opcode Fuzzy Hash: 5ebb8a6d476ab85757cc61ffc06780719d6fe3705247a74cf04dfd519ec2c0f9
                                                                          • Instruction Fuzzy Hash: 41E09221E0E7D50FD763737458BA1A4BEB19F07210B4A04FAC148CB1D3E81E98808342
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.3366518100.00007FFD34520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34520000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_7ffd34520000_regsvr32.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8bb28691abd05ba7ecc1c483442dd8f723ba0fe8a0d915e5b00d4edfa211d65f
                                                                          • Instruction ID: 17a46ca2c56ec1ce24fd6a0062f9e84b5ea11e8dd5ffa327edd2179aec52b223
                                                                          • Opcode Fuzzy Hash: 8bb28691abd05ba7ecc1c483442dd8f723ba0fe8a0d915e5b00d4edfa211d65f
                                                                          • Instruction Fuzzy Hash: 5DD0C951BAA41207F644318CACE73B87686DB8AB14F60403BE64DC73C6C89E6C821282