Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
7dtpow.ps1

Overview

General Information

Sample name:7dtpow.ps1
Analysis ID:1586042
MD5:5c540d4108cce10839d48d7a8ba97c11
SHA1:cf410d7dfe50cbebec376464968a1a6035f778f1
SHA256:65808985955d6c5df16a4679a0fca5437ab7b2a07eb55c240de1b8d22ae3b8c3
Tags:ps1user-malrpt
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Allocates memory in foreign processes
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
PE file contains section with special chars
PE file has nameless sections
Powershell drops PE file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Suspicious execution chain found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Stores large binary data to the registry
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 6192 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\7dtpow.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 3628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • x.exe (PID: 1992 cmdline: "C:\Users\user\AppData\Local\Temp\x.exe" MD5: 10454890A3D7C7C0B7EC0BF7018141E4)
      • RegAsm.exe (PID: 1436 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • WMIADAP.exe (PID: 1992 cmdline: wmiadap.exe /F /T /R MD5: 1BFFABBD200C850E6346820E92B915DC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.antoniomayol.com:21", "Username": "johnson@antoniomayol.com", "Password": "cMhKDQUk1{;%"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.4515067403.000000000280F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.4512063104.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.4512063104.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000004.00000002.4515067403.00000000027E3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000004.00000002.4515067403.00000000027E3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            3.2.x.exe.4617600.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              3.2.x.exe.4617600.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                3.2.x.exe.4617600.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x32935:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x329a7:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x32a31:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x32ac3:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x32b2d:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x32b9f:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x32c35:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x32cc5:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                3.2.x.exe.4617600.1.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                • 0x2fb6b:$s2: GetPrivateProfileString
                • 0x2f218:$s3: get_OSFullName
                • 0x30906:$s5: remove_Key
                • 0x30ab3:$s5: remove_Key
                • 0x31995:$s6: FtpWebRequest
                • 0x32917:$s7: logins
                • 0x32e89:$s7: logins
                • 0x35b8e:$s7: logins
                • 0x35c4c:$s7: logins
                • 0x375a1:$s7: logins
                • 0x367e6:$s9: 1.85 (Hash, version 2, native byte-order)
                3.2.x.exe.45db7d8.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 27 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\7dtpow.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\7dtpow.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\7dtpow.ps1", ProcessId: 6192, ProcessName: powershell.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\7dtpow.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\7dtpow.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\7dtpow.ps1", ProcessId: 6192, ProcessName: powershell.exe
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\x.exeAvira: detection malicious, Label: TR/Dropper.Gen
                  Source: 3.2.x.exe.45db7d8.2.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.antoniomayol.com:21", "Username": "johnson@antoniomayol.com", "Password": "cMhKDQUk1{;%"}
                  Source: C:\Users\user\AppData\Local\Temp\x.exeReversingLabs: Detection: 65%
                  Source: 7dtpow.ps1ReversingLabs: Detection: 26%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Local\Temp\x.exeJoe Sandbox ML: detected
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior

                  Software Vulnerabilities

                  barindex
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

                  Networking

                  barindex
                  Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.4653420.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.4617600.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.45db7d8.2.raw.unpack, type: UNPACKEDPE
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: Joe Sandbox ViewIP Address: 162.241.62.63 162.241.62.63
                  Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: global trafficDNS traffic detected: DNS query: ftp.antoniomayol.com
                  Source: RegAsm.exe, 00000004.00000002.4515067403.000000000280F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://antoniomayol.com
                  Source: RegAsm.exe, 00000004.00000002.4515067403.000000000280F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.antoniomayol.com
                  Source: RegAsm.exe, 00000004.00000002.4515067403.00000000027B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: x.exe, 00000003.00000002.2092835508.00000000044AF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.4512063104.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.4515067403.00000000027B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: powershell.exe, 00000000.00000002.2070632529.0000024A92A72000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2101310896.0000024AA28BE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2070632529.0000024A93D6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: powershell.exe, 00000000.00000002.2070632529.0000024A93C21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2107437802.0000024AAA99A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: powershell.exe, 00000000.00000002.2070632529.0000024A92841000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.4515067403.00000000027B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 00000000.00000002.2070632529.0000024A9397E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: powershell.exe, 00000000.00000002.2070632529.0000024A93C21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2107437802.0000024AAA99A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: powershell.exe, 00000000.00000002.2108900254.0000024AAAC56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co?
                  Source: x.exe, 00000003.00000002.2092835508.00000000044AF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.4512063104.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: powershell.exe, 00000000.00000002.2070632529.0000024A92841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                  Source: powershell.exe, 00000000.00000002.2070632529.0000024A93D6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 00000000.00000002.2070632529.0000024A93D6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 00000000.00000002.2070632529.0000024A93D6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: powershell.exe, 00000000.00000002.2070632529.0000024A93C21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2107437802.0000024AAA99A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: powershell.exe, 00000000.00000002.2070632529.0000024A92A72000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2101310896.0000024AA28BE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2070632529.0000024A93D6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: powershell.exe, 00000000.00000002.2070632529.0000024A9397E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
                  Source: powershell.exe, 00000000.00000002.2070632529.0000024A9397E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 3.2.x.exe.45db7d8.2.raw.unpack, R1W.cs.Net Code: HAg81
                  Source: 3.2.x.exe.4617600.1.raw.unpack, R1W.cs.Net Code: HAg81
                  Source: 3.2.x.exe.4653420.0.raw.unpack, R1W.cs.Net Code: HAg81

                  System Summary

                  barindex
                  Source: 3.2.x.exe.4617600.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 3.2.x.exe.4617600.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 3.2.x.exe.45db7d8.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 3.2.x.exe.45db7d8.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 3.2.x.exe.4653420.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 3.2.x.exe.4653420.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 3.2.x.exe.4653420.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 3.2.x.exe.4653420.0.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 3.2.x.exe.4617600.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 3.2.x.exe.4617600.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 3.2.x.exe.45db7d8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 3.2.x.exe.45db7d8.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: Process Memory Space: powershell.exe PID: 6192, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                  Source: x.exe.0.drStatic PE information: section name: PRSq<
                  Source: x.exe.0.drStatic PE information: section name:
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                  Source: C:\Windows\System32\wbem\WMIADAP.exeFile created: C:\Windows\system32\wbem\Performance\WmiApRpl_new.hJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeFile created: C:\Windows\system32\wbem\Performance\WmiApRpl_new.iniJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeFile created: C:\Windows\inf\WmiApRpl\Jump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeFile created: C:\Windows\inf\WmiApRpl\WmiApRpl.hJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeFile created: C:\Windows\inf\WmiApRpl\WmiApRpl.iniJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeFile created: C:\Windows\inf\WmiApRpl\0009\Jump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeFile created: C:\Windows\system32\PerfStringBackup.TMPJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeFile deleted: C:\Windows\System32\wbem\Performance\WmiApRpl.hJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_02BC28D03_2_02BC28D0
                  Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_02BC08483_2_02BC0848
                  Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_02BC11E03_2_02BC11E0
                  Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_02BC28C13_2_02BC28C1
                  Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 3_2_02BC08393_2_02BC0839
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00C74A884_2_00C74A88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00C7ECD84_2_00C7ECD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00C7AD884_2_00C7AD88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00C73E704_2_00C73E70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00C741B84_2_00C741B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_053AAEE84_2_053AAEE8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_053AE4104_2_053AE410
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_053AC6004_2_053AC600
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_053AAD784_2_053AAD78
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_053AB0914_2_053AB091
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_060952704_2_06095270
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0609C2704_2_0609C270
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0609B30A4_2_0609B30A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_060931384_2_06093138
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_06097E504_2_06097E50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_060977704_2_06097770
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0609E4784_2_0609E478
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_060900074_2_06090007
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_060900404_2_06090040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_060959AB4_2_060959AB
                  Source: 3.2.x.exe.4617600.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 3.2.x.exe.4617600.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 3.2.x.exe.45db7d8.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 3.2.x.exe.45db7d8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 3.2.x.exe.4653420.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 3.2.x.exe.4653420.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 3.2.x.exe.4653420.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 3.2.x.exe.4653420.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 3.2.x.exe.4617600.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 3.2.x.exe.4617600.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 3.2.x.exe.45db7d8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 3.2.x.exe.45db7d8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: Process Memory Space: powershell.exe PID: 6192, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                  Source: x.exe.0.drStatic PE information: Section: PRSq< ZLIB complexity 1.0003312993096647
                  Source: 3.2.x.exe.45db7d8.2.raw.unpack, KLhJmaON.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 3.2.x.exe.45db7d8.2.raw.unpack, KLhJmaON.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 3.2.x.exe.45db7d8.2.raw.unpack, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 3.2.x.exe.45db7d8.2.raw.unpack, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 3.2.x.exe.45db7d8.2.raw.unpack, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 3.2.x.exe.45db7d8.2.raw.unpack, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 3.2.x.exe.45db7d8.2.raw.unpack, 9HIFdl.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 3.2.x.exe.45db7d8.2.raw.unpack, 9HIFdl.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winPS1@7/17@2/2
                  Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\x.exe.logJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3628:120:WilError_03
                  Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\RefreshRA_Mutex
                  Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\RefreshRA_Mutex_Flag
                  Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\ADAP_WMI_ENTRY
                  Source: C:\Windows\System32\wbem\WMIADAP.exeMutant created: \BaseNamedObjects\Global\RefreshRA_Mutex_Lib
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e3sxd0er.opv.ps1Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                  Source: 7dtpow.ps1ReversingLabs: Detection: 26%
                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\7dtpow.ps1"
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe"
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WMIADAP.exe wmiadap.exe /F /T /R
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: loadperf.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeFile written: C:\Windows\System32\wbem\Performance\WmiApRpl_new.iniJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior

                  Data Obfuscation

                  barindex
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEFAE
                  Source: x.exe.0.drStatic PE information: 0xB8E5284B [Thu Apr 19 01:50:03 2068 UTC]
                  Source: x.exe.0.drStatic PE information: section name: PRSq<
                  Source: x.exe.0.drStatic PE information: section name:
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF848D809B8 push E95ABCD0h; ret 0_2_00007FF848D809C9
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF848D800BD pushad ; iretd 0_2_00007FF848D800C1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_053A42F8 push ebp; retf 4_2_053A4365
                  Source: x.exe.0.drStatic PE information: section name: PRSq< entropy: 7.999313087046451
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                  Source: C:\Windows\System32\wbem\WMIADAP.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WmiApRpl\PerformanceJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\PROVIDERS\Performance Performance DataJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: x.exe, 00000003.00000002.2092835508.00000000044AF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.4515067403.00000000027E3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.4512063104.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2A70000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2C30000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 4C30000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 5290000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 6290000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 63C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 73C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: C70000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 27B0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 47B0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599672Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599544Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599433Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599312Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599203Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599093Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598983Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598874Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598765Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598654Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598547Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598215Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598094Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597979Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597859Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597750Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597616Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597500Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597390Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597275Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597170Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597047Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596935Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596812Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596593Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596484Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596257Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596140Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596031Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595921Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595812Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595544Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595422Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595311Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595137Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594999Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594889Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594765Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594546Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594218Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594109Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3362Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3065Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 3510Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 6331Jump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeWindow / User API: threadDelayed 1589Jump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeWindow / User API: threadDelayed 1117Jump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeWindow / User API: threadDelayed 669Jump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeWindow / User API: threadDelayed 1622Jump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exeWindow / User API: threadDelayed 916Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 940Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6332Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exe TID: 4984Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep count: 35 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -32281802128991695s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2360Thread sleep count: 3510 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -599672s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2360Thread sleep count: 6331 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -599544s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -599433s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -599312s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -599203s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -599093s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -598983s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -598874s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -598765s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -598654s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -598547s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -598437s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -598328s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -598215s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -598094s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -597979s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -597859s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -597750s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -597616s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -597500s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -597390s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -597275s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -597170s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -597047s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -596935s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -596812s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -596703s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -596593s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -596484s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -596375s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -596257s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -596140s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -596031s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -595921s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -595812s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -595703s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -595544s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -595422s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -595311s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -595137s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -594999s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -594889s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -594765s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -594656s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -594546s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -594437s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -594328s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -594218s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -594109s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -594000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exe TID: 3200Thread sleep count: 1589 > 30Jump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exe TID: 3200Thread sleep count: 1117 > 30Jump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exe TID: 3200Thread sleep count: 669 > 30Jump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exe TID: 3200Thread sleep count: 1622 > 30Jump to behavior
                  Source: C:\Windows\System32\wbem\WMIADAP.exe TID: 3200Thread sleep count: 916 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599672Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599544Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599433Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599312Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599203Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599093Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598983Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598874Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598765Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598654Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598547Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598215Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598094Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597979Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597859Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597750Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597616Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597500Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597390Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597275Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597170Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597047Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596935Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596812Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596593Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596484Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596257Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596140Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596031Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595921Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595812Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595544Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595422Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595311Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595137Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594999Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594889Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594765Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594546Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594218Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594109Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                  Source: RegAsm.exe, 00000004.00000002.4515067403.00000000027E3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: RegAsm.exe, 00000004.00000002.4512063104.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: x.exe, 00000003.00000002.2092835508.00000000044AF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.4512063104.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: hgfsZrw6
                  Source: RegAsm.exe, 00000004.00000002.4512063104.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                  Source: RegAsm.exe, 00000004.00000002.4524421843.0000000005A9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll)
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00C77070 CheckRemoteDebuggerPresent,4_2_00C77070
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43E000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 440000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 78B008Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeQueries volume information: C:\Users\user\AppData\Local\Temp\x.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 3.2.x.exe.4617600.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.45db7d8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.4653420.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.4653420.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.4617600.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.45db7d8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4515067403.000000000280F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4512063104.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4515067403.00000000027E3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.2092835508.00000000044AF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 1992, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1436, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Yara matchFile source: 3.2.x.exe.4617600.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.45db7d8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.4653420.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.4653420.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.4617600.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.45db7d8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4512063104.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4515067403.00000000027E3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.2092835508.00000000044AF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 1992, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1436, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 3.2.x.exe.4617600.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.45db7d8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.4653420.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.4653420.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.4617600.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.x.exe.45db7d8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4515067403.000000000280F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4512063104.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4515067403.00000000027E3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.2092835508.00000000044AF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 1992, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1436, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  3
                  File and Directory Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Exploitation for Client Execution
                  1
                  Windows Service
                  1
                  Windows Service
                  1
                  Deobfuscate/Decode Files or Information
                  1
                  Input Capture
                  34
                  System Information Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts1
                  PowerShell
                  Logon Script (Windows)311
                  Process Injection
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  631
                  Security Software Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                  Software Packing
                  NTDS1
                  Process Discovery
                  Distributed Component Object Model1
                  Input Capture
                  2
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Timestomp
                  LSA Secrets261
                  Virtualization/Sandbox Evasion
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials1
                  Application Window Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  File Deletion
                  DCSync1
                  System Network Configuration Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                  Masquerading
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  Modify Registry
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron261
                  Virtualization/Sandbox Evasion
                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd311
                  Process Injection
                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1586042 Sample: 7dtpow.ps1 Startdate: 08/01/2025 Architecture: WINDOWS Score: 100 25 ftp.antoniomayol.com 2->25 27 antoniomayol.com 2->27 29 ip-api.com 2->29 35 Found malware configuration 2->35 37 Malicious sample detected (through community Yara rule) 2->37 39 Multi AV Scanner detection for submitted file 2->39 41 7 other signatures 2->41 8 powershell.exe 16 2->8         started        signatures3 process4 file5 23 C:\Users\user\AppData\Local\Temp\x.exe, PE32 8->23 dropped 51 Suspicious execution chain found 8->51 53 Found suspicious powershell code related to unpacking or dynamic code loading 8->53 55 Powershell drops PE file 8->55 12 x.exe 3 8->12         started        15 WMIADAP.exe 18 10 8->15         started        17 conhost.exe 8->17         started        signatures6 process7 signatures8 57 Antivirus detection for dropped file 12->57 59 Multi AV Scanner detection for dropped file 12->59 61 Machine Learning detection for dropped file 12->61 63 4 other signatures 12->63 19 RegAsm.exe 15 2 12->19         started        process9 dnsIp10 31 antoniomayol.com 162.241.62.63, 21, 49705 UNIFIEDLAYER-AS-1US United States 19->31 33 ip-api.com 208.95.112.1, 49704, 80 TUT-ASUS United States 19->33 43 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->43 45 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 19->45 47 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 19->47 49 4 other signatures 19->49 signatures11

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  7dtpow.ps126%ReversingLabsScript-PowerShell.Spyware.Negasteal
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\x.exe100%AviraTR/Dropper.Gen
                  C:\Users\user\AppData\Local\Temp\x.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\x.exe66%ReversingLabsWin32.Trojan.InfostealerTesla
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://www.microsoft.co?0%Avira URL Cloudsafe
                  http://antoniomayol.com0%Avira URL Cloudsafe
                  http://ftp.antoniomayol.com0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  antoniomayol.com
                  162.241.62.63
                  truetrue
                    unknown
                    ip-api.com
                    208.95.112.1
                    truefalse
                      high
                      ftp.antoniomayol.com
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://ip-api.com/line/?fields=hostingfalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.2070632529.0000024A92A72000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2101310896.0000024AA28BE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2070632529.0000024A93D6C000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000000.00000002.2070632529.0000024A9397E000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://antoniomayol.comRegAsm.exe, 00000004.00000002.4515067403.000000000280F000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://account.dyn.com/x.exe, 00000003.00000002.2092835508.00000000044AF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.4512063104.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                high
                                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.2070632529.0000024A93C21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2107437802.0000024AAA99A000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.2070632529.0000024A93C21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2107437802.0000024AAA99A000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://contoso.com/powershell.exe, 00000000.00000002.2070632529.0000024A93D6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.2070632529.0000024A92A72000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2101310896.0000024AA28BE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2070632529.0000024A93D6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://contoso.com/Licensepowershell.exe, 00000000.00000002.2070632529.0000024A93D6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://ip-api.comRegAsm.exe, 00000004.00000002.4515067403.00000000027B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://contoso.com/Iconpowershell.exe, 00000000.00000002.2070632529.0000024A93D6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://oneget.orgXpowershell.exe, 00000000.00000002.2070632529.0000024A9397E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://aka.ms/pscore68powershell.exe, 00000000.00000002.2070632529.0000024A92841000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://ftp.antoniomayol.comRegAsm.exe, 00000004.00000002.4515067403.000000000280F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.2070632529.0000024A92841000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.4515067403.00000000027B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.microsoft.co?powershell.exe, 00000000.00000002.2108900254.0000024AAAC56000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.2070632529.0000024A93C21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2107437802.0000024AAA99A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://oneget.orgpowershell.exe, 00000000.00000002.2070632529.0000024A9397E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        208.95.112.1
                                                        ip-api.comUnited States
                                                        53334TUT-ASUSfalse
                                                        162.241.62.63
                                                        antoniomayol.comUnited States
                                                        46606UNIFIEDLAYER-AS-1UStrue
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1586042
                                                        Start date and time:2025-01-08 16:52:06 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 7m 47s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:7
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:7dtpow.ps1
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.expl.evad.winPS1@7/17@2/2
                                                        EGA Information:
                                                        • Successful, ratio: 66.7%
                                                        HCA Information:
                                                        • Successful, ratio: 99%
                                                        • Number of executed functions: 81
                                                        • Number of non-executed functions: 8
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .ps1
                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                        • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
                                                        • Excluded IPs from analysis (whitelisted): 13.107.253.45, 4.175.87.197
                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                        • Execution Graph export aborted for target powershell.exe, PID 6192 because it is empty
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                        • VT rate limit hit for: 7dtpow.ps1
                                                        TimeTypeDescription
                                                        10:53:00API Interceptor4x Sleep call for process: powershell.exe modified
                                                        10:53:02API Interceptor11182086x Sleep call for process: RegAsm.exe modified
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        208.95.112.1TR98760H.exeGet hashmaliciousAgentTeslaBrowse
                                                        • ip-api.com/line/?fields=hosting
                                                        47SXvEQ.exeGet hashmaliciousBlank Grabber, XmrigBrowse
                                                        • ip-api.com/json/?fields=225545
                                                        test.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                        • ip-api.com/json/
                                                        HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                                        • ip-api.com/line/?fields=hosting
                                                        1.exeGet hashmaliciousUnknownBrowse
                                                        • ip-api.com/json/?fields=hosting,query
                                                        1.exeGet hashmaliciousUnknownBrowse
                                                        • ip-api.com/json/?fields=hosting,query
                                                        YPzNsfg4nR.exeGet hashmaliciousXWormBrowse
                                                        • ip-api.com/line/?fields=hosting
                                                        SAL987656700.exeGet hashmaliciousAgentTeslaBrowse
                                                        • ip-api.com/line/?fields=hosting
                                                        Resource.exeGet hashmaliciousBlank GrabberBrowse
                                                        • ip-api.com/json/?fields=225545
                                                        P3A946MOFP.exeGet hashmaliciousXWormBrowse
                                                        • ip-api.com/line/?fields=hosting
                                                        162.241.62.63Order 122001-220 guanzo.exeGet hashmaliciousFormBookBrowse
                                                        • www.pasteleriaruth.com/meub/?6lt4=M6ATVT20FLj&ktI=BrZDxrt78R4OSP6X83RJQ8I8yi0a/QJgiEays5do7SITSAPpSF1hBU/JW21XLBQwE3Ox
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        ip-api.comTR98760H.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 208.95.112.1
                                                        47SXvEQ.exeGet hashmaliciousBlank Grabber, XmrigBrowse
                                                        • 208.95.112.1
                                                        test.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                        • 208.95.112.1
                                                        HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                                        • 208.95.112.1
                                                        1.exeGet hashmaliciousUnknownBrowse
                                                        • 208.95.112.1
                                                        1.exeGet hashmaliciousUnknownBrowse
                                                        • 208.95.112.1
                                                        YPzNsfg4nR.exeGet hashmaliciousXWormBrowse
                                                        • 208.95.112.1
                                                        SAL987656700.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 208.95.112.1
                                                        Resource.exeGet hashmaliciousBlank GrabberBrowse
                                                        • 208.95.112.1
                                                        P3A946MOFP.exeGet hashmaliciousXWormBrowse
                                                        • 208.95.112.1
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        UNIFIEDLAYER-AS-1UShttps://AAYUSHRELOCATEPACKERSANDMOVERS.COMGet hashmaliciousUnknownBrowse
                                                        • 162.241.148.33
                                                        EZZGTmJj4O.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 192.254.186.165
                                                        https://e.trustifi.com/#/fff2a0/670719/6dc158/ef68bf/5e1243/19ce62/f4cd99/c6b84a/e8666a/ef542d/85972d/627493/9a11d6/1f4096/1d247f/d78873/cd64d0/869af2/e9ab57/7015c1/91dda7/f34c0a/f30b47/688cba/a1d645/18dc79/33d9f9/9ee0a0/c61099/8f2456/8e1864/996369/790047/a93a09/347b17/38082d/363d49/f88c07/81bae2/57a7bb/6027c6/942952/b2de1b/e98aef/6a05c2/91297b/c70871/7f29c3/0a450d/ad0cac/967c2a/e7cb67/6e1193/8c4088/13aef1/e1d296/5056d4/51a97e/89a35b/c13e69/fa274a/5b7c2e/a8c901/02856f/1e0211/03ca84/d7b573/7e0de3/e2bdbb/7cab47/4dd465/addb41/2076e1/85559c/dbcb2d/514505/a6a54e/41e864/abb5a5/e59e4b/8c2df6/7e5cf3/b648da/8fbd98/4c7d8a/08e6a3/72f66f/a49cc6/18211b/1e6a5c/0d4fdeGet hashmaliciousHTMLPhisherBrowse
                                                        • 162.241.149.91
                                                        https://jmak-service.com/3225640388Get hashmaliciousHTMLPhisherBrowse
                                                        • 162.241.149.91
                                                        TR98760H.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 162.241.62.63
                                                        https://pozaweclip.upnana.com/Get hashmaliciousUnknownBrowse
                                                        • 162.241.149.91
                                                        https://us01-i-prod-estimating-storage.s3.amazonaws.com/598134325679181/562949954787293/Documents/1706942/Hoosier%20Crane%20Service%20Company.pdfGet hashmaliciousHTMLPhisherBrowse
                                                        • 162.241.149.91
                                                        miori.m68k.elfGet hashmaliciousUnknownBrowse
                                                        • 142.7.137.184
                                                        https://universidad-unidem.edu.mx/mah/i/amFjb2JAc3RlaW5ib3JuLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                        • 162.214.205.216
                                                        https://g248jqtc.r.ap-south-1.awstrack.me/L0/https://fub.direct/1/wpcpz2KV6CJLjr9Ku5V9crqS4vRSbleRYVQVlbRDO0VhTlcqWS8eK4WwWGYEcIFo0NTTfcu_ywSiT_-hMwRGjBfgg1rcvHOcCbgDl1KQiWE/https/westcommerce.com.br/e63o/1750871326/Ara/%23%3Fnl=amRpYkBhcmEuY29t/1/0109019433d34740-32de3bb4-8eb6-4b18-a944-d8e7ee993673-000000/ImcP_D-hsLxxvDJopI2vRjkqrI4=188Get hashmaliciousUnknownBrowse
                                                        • 50.116.112.103
                                                        TUT-ASUSTR98760H.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 208.95.112.1
                                                        47SXvEQ.exeGet hashmaliciousBlank Grabber, XmrigBrowse
                                                        • 208.95.112.1
                                                        test.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                        • 208.95.112.1
                                                        HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                                        • 208.95.112.1
                                                        1.exeGet hashmaliciousUnknownBrowse
                                                        • 208.95.112.1
                                                        1.exeGet hashmaliciousUnknownBrowse
                                                        • 208.95.112.1
                                                        YPzNsfg4nR.exeGet hashmaliciousXWormBrowse
                                                        • 208.95.112.1
                                                        SAL987656700.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 208.95.112.1
                                                        Resource.exeGet hashmaliciousBlank GrabberBrowse
                                                        • 208.95.112.1
                                                        P3A946MOFP.exeGet hashmaliciousXWormBrowse
                                                        • 208.95.112.1
                                                        No context
                                                        No context
                                                        Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                        File Type:CSV text
                                                        Category:dropped
                                                        Size (bytes):226
                                                        Entropy (8bit):5.360398796477698
                                                        Encrypted:false
                                                        SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
                                                        MD5:3A8957C6382192B71471BD14359D0B12
                                                        SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
                                                        SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
                                                        SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):64
                                                        Entropy (8bit):1.1628158735648508
                                                        Encrypted:false
                                                        SSDEEP:3:Nlllulhhf/z:NllU
                                                        MD5:B283C769D040651AA26FFE7F1296E297
                                                        SHA1:F4B1D91D58C72B439EA4CA55A3E75F5F53A117E5
                                                        SHA-256:97677EADF7A2FB6F27A32BAA73C5471A5BA31702A36509AB9FEB478448B2D837
                                                        SHA-512:9114535C2EA58850D30DFA7552F420FBAB32FBFD999B0CAC0B8CB050F27EF65FE5BC3749E78B35A2C489561571B5452182197A51DC2B82ADC6DD70D94BEA03D7
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview:@...e................................................@..........
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):294912
                                                        Entropy (8bit):7.890578871500804
                                                        Encrypted:false
                                                        SSDEEP:6144:DT9nXr8bxYfMPcy4OmBag1+pF0lsmxRQQc+gpvEUkxNl:XNQb2fMPSOCwpCFRj0p8UkxNl
                                                        MD5:10454890A3D7C7C0B7EC0BF7018141E4
                                                        SHA1:167AB9A5A9E0C56689F73D894A397B9C176701DF
                                                        SHA-256:91FEE98B5957D145F144B61107EA0283FC3E02EB7E19B432E868EE45FFDC528E
                                                        SHA-512:20518FD44AFF080FDDAC3A508BCC3B29336EA87C868BD0FAF639726B36479DE4562EC639E425DBE06234BA5B4629DA84B37228B199F8497A7777D36638F77E04
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 66%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...K(..........."...0..~............... ... ....@.. ....................................`..................................%..W.................................................................................................... ..H...........PR...Sq<..... ......................@....text....{... ...|.................. ..`.rsrc................v..............@..@.....................|.............. ..`.reloc...............~..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):6222
                                                        Entropy (8bit):3.7132353076471962
                                                        Encrypted:false
                                                        SSDEEP:96:IGIbCrokfkvhkvCCtqEw/F3HJEw/F2XHy:IR8hDqEwjEw/
                                                        MD5:5C33A0C6BB0FDA8F7D94D42C5A8191C8
                                                        SHA1:D5D039DC6DF85F5CA6E5321FA1092AD178F3048E
                                                        SHA-256:40BCC8E6DBEF0178A0D028CFAB13960356B3F0E169D96A70EB0879369FB3E5B7
                                                        SHA-512:22DFEB4799C57D23BB5B808F1ECD808353145F97B0F158A73DD0F10D2F74439DA365102B90F8931FD156322188A37A6E8D342CBD1FD22E460AA13AF40DB9AE34
                                                        Malicious:false
                                                        Preview:...................................FL..................F.".. ...d........c.a..z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.....N}.^.a....)c.a......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl(Z.~....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....(Z.~..Roaming.@......DWSl(Z.~....C.........................R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl(Z.~....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSl(Z.~....E.....................a_..W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl(Z.~....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl(Z.~....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSl(Z.~....q...........
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):6222
                                                        Entropy (8bit):3.7132353076471962
                                                        Encrypted:false
                                                        SSDEEP:96:IGIbCrokfkvhkvCCtqEw/F3HJEw/F2XHy:IR8hDqEwjEw/
                                                        MD5:5C33A0C6BB0FDA8F7D94D42C5A8191C8
                                                        SHA1:D5D039DC6DF85F5CA6E5321FA1092AD178F3048E
                                                        SHA-256:40BCC8E6DBEF0178A0D028CFAB13960356B3F0E169D96A70EB0879369FB3E5B7
                                                        SHA-512:22DFEB4799C57D23BB5B808F1ECD808353145F97B0F158A73DD0F10D2F74439DA365102B90F8931FD156322188A37A6E8D342CBD1FD22E460AA13AF40DB9AE34
                                                        Malicious:false
                                                        Preview:...................................FL..................F.".. ...d........c.a..z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.....N}.^.a....)c.a......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl(Z.~....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....(Z.~..Roaming.@......DWSl(Z.~....C.........................R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl(Z.~....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSl(Z.~....E.....................a_..W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl(Z.~....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl(Z.~....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSl(Z.~....q...........
                                                        Process:C:\Windows\System32\wbem\WMIADAP.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):3444
                                                        Entropy (8bit):5.011954215267298
                                                        Encrypted:false
                                                        SSDEEP:48:ADPo+gDMIuK54DeHNg9dqbEzCJGGgGDU3XgLBgaGKFijiVJtVAAF/XRgW:ADw+gDMhK54qHC7aBvGKFijiV7XRgW
                                                        MD5:B133A676D139032A27DE3D9619E70091
                                                        SHA1:1248AA89938A13640252A79113930EDE2F26F1FA
                                                        SHA-256:AE2B6236D3EEB4822835714AE9444E5DCD21BC60F7A909F2962C43BC743C7B15
                                                        SHA-512:C6B99E13D854CE7A6874497473614EE4BD81C490802783DB1349AB851CD80D1DC06DF8C1F6E434ABA873A5BBF6125CC64104709064E19A9DC1C66DCDE3F898F5
                                                        Malicious:false
                                                        Preview://////////////////////////////////////////////////////////////////////////////////////////////..//..// Copyright (C) 2000 Microsoft Corporation..//..// Module Name:..// WmiApRpl..//..// Abstract:..//..// Include file for object and counters definitions...//..//////////////////////////////////////////////////////////////////////////////////////////////......#define.WMI_Objects.0..#define.HiPerf_Classes.2..#define.HiPerf_Validity.4....#define.MSiSCSI_ConnectionStatistics_00000.6....#define.BytesReceived_00000.8..#define.BytesSent_00000.10..#define.PDUCommandsSent_00000.12..#define.PDUResponsesReceived_00000.14....#define.MSiSCSI_InitiatorInstanceStatistics_00001.16....#define.SessionConnectionTimeoutErrorCount_00001.18..#define.SessionDigestErrorCount_00001.20..#define.SessionFailureCount_00001.22..#define.SessionFormatErrorCount_00001.24....#define.MSiSCSI_InitiatorLoginStatistics_00002.26....#define.LoginAcceptRsps_00002.28..#define.LoginAuthenticateFails_00002.30..#define.LoginAuthFai
                                                        Process:C:\Windows\System32\wbem\WMIADAP.exe
                                                        File Type:Unicode text, UTF-16, little-endian text, with very long lines (405), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):48786
                                                        Entropy (8bit):3.5854495362228453
                                                        Encrypted:false
                                                        SSDEEP:384:esozoNc1+12zG1+b61ubSGMLVrj4+PtC81ZBg4Lg4ung4og4uo91K91zI91K91z2:esozozBg4Lg4ung4og4uWG4MG4o1
                                                        MD5:DF877BEC5C9E3382E94FEA48FEE049AC
                                                        SHA1:1D61436C8A1C057C1B1089EB794D90EE4B0D8FE9
                                                        SHA-256:7F0F3FA64E41A30BACA377B6399F8F7087BC54DA9FCA876BFDC2C2EEECA8454B
                                                        SHA-512:433CB16EBE2292CB60CB8CE71207EBB752295FB73E6D13E215E771EC5FC433EE29577AF28641255810C18078B95F04A9D37734B6F49CB6A6302821E365672205
                                                        Malicious:false
                                                        Preview:.././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././....././....././. .C.o.p.y.r.i.g.h.t. .(.C.). .2.0.0.0. .M.i.c.r.o.s.o.f.t. .C.o.r.p.o.r.a.t.i.o.n....././....././. .M.o.d.u.l.e. .N.a.m.e.:....././. .W.m.i.A.p.R.p.l....././....././. .A.b.s.t.r.a.c.t.:....././....././. .D.e.s.c.r.i.b.e.s. .a.l.l. .t.h.e. .c.o.u.n.t.e.r.s. .s.u.p.p.o.r.t.e.d. .v.i.a. .W.M.I. .H.i.-.P.e.r.f.o.r.m.a.n.c.e. .p.r.o.v.i.d.e.r.s....././....././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././.............[.i.n.f.o.].....d.r.i.v.e.r.n.a.m.e.=.W.m.i.A.p.R.p.l.....s.y.m.b.o.l.f.i.l.e.=.W.m.i.A.p.R.p.l...h.........[.l.a.n.g.u.a.g.e.s.].....0.0.9.=.E.n.g.l.i.s.h.....0.0.9.=.E.n.g.l.i.s.h.........[.o.b.j.e.c.t.s.].....W.M.I._.O.b.j.e.c.t.s._.0.0.
                                                        Process:C:\Windows\System32\wbem\WMIADAP.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):840878
                                                        Entropy (8bit):3.4224066455051885
                                                        Encrypted:false
                                                        SSDEEP:3072:xJQGb/6IPolY/OhyIGmZkzTMWcnqgspmTbQiIJEDc3dv+eBrq2Bw+1wQ5xcEkc7+:01nqgsp2gOKih3
                                                        MD5:D3ED23A3E63ACA8CF656C585568DA6D7
                                                        SHA1:1A499D7E9A030D53B2A4DBD36F6F14B6531A6094
                                                        SHA-256:AE5A6E258A41298BE6CF2B3DA812E992E1D6A3C7FBC7DD4AA8B413DA850E8B65
                                                        SHA-512:21E2953B0819567865DA9C80A7D07021D7ED48F4BA3CD843C42D13D18E0E8FB27FA2F7C4EC86D4A1F4D887146F0F7E9E05B6A53D85398EA43240C2E180D52E00
                                                        Malicious:false
                                                        Preview:........[.P.e.r.f.l.i.b.].....B.a.s.e. .I.n.d.e.x.=.1.8.4.7.....L.a.s.t. .C.o.u.n.t.e.r.=.1.0.1.2.2.....L.a.s.t. .H.e.l.p.=.1.0.1.2.3.........[.P.E.R.F._...N.E.T. .C.L.R. .D.a.t.a.].....F.i.r.s.t. .C.o.u.n.t.e.r.=.6.8.4.0.....F.i.r.s.t. .H.e.l.p.=.6.8.4.1.....L.a.s.t. .C.o.u.n.t.e.r.=.6.8.5.2.....L.a.s.t. .H.e.l.p.=.6.8.5.3.........[.P.E.R.F._...N.E.T. .C.L.R. .N.e.t.w.o.r.k.i.n.g.].....F.i.r.s.t. .C.o.u.n.t.e.r.=.6.8.2.8.....F.i.r.s.t. .H.e.l.p.=.6.8.2.9.....L.a.s.t. .C.o.u.n.t.e.r.=.6.8.3.8.....L.a.s.t. .H.e.l.p.=.6.8.3.9.........[.P.E.R.F._...N.E.T. .C.L.R. .N.e.t.w.o.r.k.i.n.g. .4...0...0...0.].....F.i.r.s.t. .C.o.u.n.t.e.r.=.6.9.0.0.....F.i.r.s.t. .H.e.l.p.=.6.9.0.1.....L.a.s.t. .C.o.u.n.t.e.r.=.6.9.2.6.....L.a.s.t. .H.e.l.p.=.6.9.2.7.........[.P.E.R.F._...N.E.T. .D.a.t.a. .P.r.o.v.i.d.e.r. .f.o.r. .O.r.a.c.l.e.].....F.i.r.s.t. .C.o.u.n.t.e.r.=.8.9.1.6.....F.i.r.s.t. .H.e.l.p.=.8.9.1.7.....L.a.s.t. .C.o.u.n.t.e.r.=.8.9.4.4.....L.a.s.t. .H.e.l.p.=.8.9.4.5.........[.P.E.R.F._...N.E.
                                                        Process:C:\Windows\System32\wbem\WMIADAP.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):840878
                                                        Entropy (8bit):3.4224066455051885
                                                        Encrypted:false
                                                        SSDEEP:3072:xJQGb/6IPolY/OhyIGmZkzTMWcnqgspmTbQiIJEDc3dv+eBrq2Bw+1wQ5xcEkc7+:01nqgsp2gOKih3
                                                        MD5:D3ED23A3E63ACA8CF656C585568DA6D7
                                                        SHA1:1A499D7E9A030D53B2A4DBD36F6F14B6531A6094
                                                        SHA-256:AE5A6E258A41298BE6CF2B3DA812E992E1D6A3C7FBC7DD4AA8B413DA850E8B65
                                                        SHA-512:21E2953B0819567865DA9C80A7D07021D7ED48F4BA3CD843C42D13D18E0E8FB27FA2F7C4EC86D4A1F4D887146F0F7E9E05B6A53D85398EA43240C2E180D52E00
                                                        Malicious:false
                                                        Preview:........[.P.e.r.f.l.i.b.].....B.a.s.e. .I.n.d.e.x.=.1.8.4.7.....L.a.s.t. .C.o.u.n.t.e.r.=.1.0.1.2.2.....L.a.s.t. .H.e.l.p.=.1.0.1.2.3.........[.P.E.R.F._...N.E.T. .C.L.R. .D.a.t.a.].....F.i.r.s.t. .C.o.u.n.t.e.r.=.6.8.4.0.....F.i.r.s.t. .H.e.l.p.=.6.8.4.1.....L.a.s.t. .C.o.u.n.t.e.r.=.6.8.5.2.....L.a.s.t. .H.e.l.p.=.6.8.5.3.........[.P.E.R.F._...N.E.T. .C.L.R. .N.e.t.w.o.r.k.i.n.g.].....F.i.r.s.t. .C.o.u.n.t.e.r.=.6.8.2.8.....F.i.r.s.t. .H.e.l.p.=.6.8.2.9.....L.a.s.t. .C.o.u.n.t.e.r.=.6.8.3.8.....L.a.s.t. .H.e.l.p.=.6.8.3.9.........[.P.E.R.F._...N.E.T. .C.L.R. .N.e.t.w.o.r.k.i.n.g. .4...0...0...0.].....F.i.r.s.t. .C.o.u.n.t.e.r.=.6.9.0.0.....F.i.r.s.t. .H.e.l.p.=.6.9.0.1.....L.a.s.t. .C.o.u.n.t.e.r.=.6.9.2.6.....L.a.s.t. .H.e.l.p.=.6.9.2.7.........[.P.E.R.F._...N.E.T. .D.a.t.a. .P.r.o.v.i.d.e.r. .f.o.r. .O.r.a.c.l.e.].....F.i.r.s.t. .C.o.u.n.t.e.r.=.8.9.1.6.....F.i.r.s.t. .H.e.l.p.=.8.9.1.7.....L.a.s.t. .C.o.u.n.t.e.r.=.8.9.4.4.....L.a.s.t. .H.e.l.p.=.8.9.4.5.........[.P.E.R.F._...N.E.
                                                        Process:C:\Windows\System32\wbem\WMIADAP.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):137550
                                                        Entropy (8bit):3.409189992022338
                                                        Encrypted:false
                                                        SSDEEP:1536:X1i4nfw8ld9+mRDaUR28oV7TYfXLi7NwrgSwNu56FRtg:XBnfw8ld9+mRDaUR28oV7TY+7S0ba
                                                        MD5:084B771A167854C5B38E25D4E199B637
                                                        SHA1:AE6D36D4EC5A9E515E8735525BD80C96AC0F8122
                                                        SHA-256:B3CF0050FAF325C36535D665C24411F3877E3667904DFE9D8A1C802ED4BCD56D
                                                        SHA-512:426C15923F54EC93F22D9523B5CB6D326F727A34F5FF2BDE63D1CB3AD97CAB7E5B2ABABBC6ED5082B5E3140E9342A4E6F354359357A3F9AEF285278CB38A5835
                                                        Malicious:false
                                                        Preview:1...1.8.4.7...2...S.y.s.t.e.m...4...M.e.m.o.r.y...6...%. .P.r.o.c.e.s.s.o.r. .T.i.m.e...1.0...F.i.l.e. .R.e.a.d. .O.p.e.r.a.t.i.o.n.s./.s.e.c...1.2...F.i.l.e. .W.r.i.t.e. .O.p.e.r.a.t.i.o.n.s./.s.e.c...1.4...F.i.l.e. .C.o.n.t.r.o.l. .O.p.e.r.a.t.i.o.n.s./.s.e.c...1.6...F.i.l.e. .R.e.a.d. .B.y.t.e.s./.s.e.c...1.8...F.i.l.e. .W.r.i.t.e. .B.y.t.e.s./.s.e.c...2.0...F.i.l.e. .C.o.n.t.r.o.l. .B.y.t.e.s./.s.e.c...2.4...A.v.a.i.l.a.b.l.e. .B.y.t.e.s...2.6...C.o.m.m.i.t.t.e.d. .B.y.t.e.s...2.8...P.a.g.e. .F.a.u.l.t.s./.s.e.c...3.0...C.o.m.m.i.t. .L.i.m.i.t...3.2...W.r.i.t.e. .C.o.p.i.e.s./.s.e.c...3.4...T.r.a.n.s.i.t.i.o.n. .F.a.u.l.t.s./.s.e.c...3.6...C.a.c.h.e. .F.a.u.l.t.s./.s.e.c...3.8...D.e.m.a.n.d. .Z.e.r.o. .F.a.u.l.t.s./.s.e.c...4.0...P.a.g.e.s./.s.e.c...4.2...P.a.g.e. .R.e.a.d.s./.s.e.c...4.4...P.r.o.c.e.s.s.o.r. .Q.u.e.u.e. .L.e.n.g.t.h...4.6...T.h.r.e.a.d. .S.t.a.t.e...4.8...P.a.g.e.s. .O.u.t.p.u.t./.s.e.c...5.0...P.a.g.e. .W.r.i.t.e.s./.s.e.c...5.2...B.r.o.w.s.e.r...5.4...A.n.n.o.u.
                                                        Process:C:\Windows\System32\wbem\WMIADAP.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):715050
                                                        Entropy (8bit):3.278818886805871
                                                        Encrypted:false
                                                        SSDEEP:3072:NUdGNuowE4j0PrRZnpETMDZ8M6d0PHHx643/A5BK9YXdhPHlVziwC4ALWI1dnmRh:78M6d0w+WB6I
                                                        MD5:342BC94F85E143BE85B5B997163A0BB3
                                                        SHA1:8780CD88D169AE88C843E19239D9A32625F6A73E
                                                        SHA-256:F7D40B4FADA44B2A5231780F99C3CE784BCF33866B59D5EB767EEA8E532AD2C4
                                                        SHA-512:0A4ED9104CAFCE95E204B5505181816E7AA7941DED2694FF75EFABAAB821BF0F0FE5B32261ED213C710250B7845255F4E317D86A3A6D4C2C21F866207233C57E
                                                        Malicious:false
                                                        Preview:3...T.h.e. .S.y.s.t.e.m. .p.e.r.f.o.r.m.a.n.c.e. .o.b.j.e.c.t. .c.o.n.s.i.s.t.s. .o.f. .c.o.u.n.t.e.r.s. .t.h.a.t. .a.p.p.l.y. .t.o. .m.o.r.e. .t.h.a.n. .o.n.e. .i.n.s.t.a.n.c.e. .o.f. .a. .c.o.m.p.o.n.e.n.t. .p.r.o.c.e.s.s.o.r.s. .o.n. .t.h.e. .c.o.m.p.u.t.e.r.....5...T.h.e. .M.e.m.o.r.y. .p.e.r.f.o.r.m.a.n.c.e. .o.b.j.e.c.t. . .c.o.n.s.i.s.t.s. .o.f. .c.o.u.n.t.e.r.s. .t.h.a.t. .d.e.s.c.r.i.b.e. .t.h.e. .b.e.h.a.v.i.o.r. .o.f. .p.h.y.s.i.c.a.l. .a.n.d. .v.i.r.t.u.a.l. .m.e.m.o.r.y. .o.n. .t.h.e. .c.o.m.p.u.t.e.r... . .P.h.y.s.i.c.a.l. .m.e.m.o.r.y. .i.s. .t.h.e. .a.m.o.u.n.t. .o.f. .r.a.n.d.o.m. .a.c.c.e.s.s. .m.e.m.o.r.y. .o.n. .t.h.e. .c.o.m.p.u.t.e.r... . .V.i.r.t.u.a.l. .m.e.m.o.r.y. .c.o.n.s.i.s.t.s. .o.f. .t.h.e. .s.p.a.c.e. .i.n. .p.h.y.s.i.c.a.l. .m.e.m.o.r.y. .a.n.d. .o.n. .d.i.s.k... . .M.a.n.y. .o.f. .t.h.e. .m.e.m.o.r.y. .c.o.u.n.t.e.r.s. .m.o.n.i.t.o.r. .p.a.g.i.n.g.,. .w.h.i.c.h. .i.s. .t.h.e. .m.o.v.e.m.e.n.t. .o.f. .p.a.g.e.s. .o.f. .c.o.d.e. .a.n.d. .d.a.t.a. .b.e.t.
                                                        Process:C:\Windows\System32\wbem\WMIADAP.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):3444
                                                        Entropy (8bit):5.011954215267298
                                                        Encrypted:false
                                                        SSDEEP:48:ADPo+gDMIuK54DeHNg9dqbEzCJGGgGDU3XgLBgaGKFijiVJtVAAF/XRgW:ADw+gDMhK54qHC7aBvGKFijiV7XRgW
                                                        MD5:B133A676D139032A27DE3D9619E70091
                                                        SHA1:1248AA89938A13640252A79113930EDE2F26F1FA
                                                        SHA-256:AE2B6236D3EEB4822835714AE9444E5DCD21BC60F7A909F2962C43BC743C7B15
                                                        SHA-512:C6B99E13D854CE7A6874497473614EE4BD81C490802783DB1349AB851CD80D1DC06DF8C1F6E434ABA873A5BBF6125CC64104709064E19A9DC1C66DCDE3F898F5
                                                        Malicious:false
                                                        Preview://////////////////////////////////////////////////////////////////////////////////////////////..//..// Copyright (C) 2000 Microsoft Corporation..//..// Module Name:..// WmiApRpl..//..// Abstract:..//..// Include file for object and counters definitions...//..//////////////////////////////////////////////////////////////////////////////////////////////......#define.WMI_Objects.0..#define.HiPerf_Classes.2..#define.HiPerf_Validity.4....#define.MSiSCSI_ConnectionStatistics_00000.6....#define.BytesReceived_00000.8..#define.BytesSent_00000.10..#define.PDUCommandsSent_00000.12..#define.PDUResponsesReceived_00000.14....#define.MSiSCSI_InitiatorInstanceStatistics_00001.16....#define.SessionConnectionTimeoutErrorCount_00001.18..#define.SessionDigestErrorCount_00001.20..#define.SessionFailureCount_00001.22..#define.SessionFormatErrorCount_00001.24....#define.MSiSCSI_InitiatorLoginStatistics_00002.26....#define.LoginAcceptRsps_00002.28..#define.LoginAuthenticateFails_00002.30..#define.LoginAuthFai
                                                        Process:C:\Windows\System32\wbem\WMIADAP.exe
                                                        File Type:Unicode text, UTF-16, little-endian text, with very long lines (405), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):48786
                                                        Entropy (8bit):3.5854495362228453
                                                        Encrypted:false
                                                        SSDEEP:384:esozoNc1+12zG1+b61ubSGMLVrj4+PtC81ZBg4Lg4ung4og4uo91K91zI91K91z2:esozozBg4Lg4ung4og4uWG4MG4o1
                                                        MD5:DF877BEC5C9E3382E94FEA48FEE049AC
                                                        SHA1:1D61436C8A1C057C1B1089EB794D90EE4B0D8FE9
                                                        SHA-256:7F0F3FA64E41A30BACA377B6399F8F7087BC54DA9FCA876BFDC2C2EEECA8454B
                                                        SHA-512:433CB16EBE2292CB60CB8CE71207EBB752295FB73E6D13E215E771EC5FC433EE29577AF28641255810C18078B95F04A9D37734B6F49CB6A6302821E365672205
                                                        Malicious:false
                                                        Preview:.././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././....././....././. .C.o.p.y.r.i.g.h.t. .(.C.). .2.0.0.0. .M.i.c.r.o.s.o.f.t. .C.o.r.p.o.r.a.t.i.o.n....././....././. .M.o.d.u.l.e. .N.a.m.e.:....././. .W.m.i.A.p.R.p.l....././....././. .A.b.s.t.r.a.c.t.:....././....././. .D.e.s.c.r.i.b.e.s. .a.l.l. .t.h.e. .c.o.u.n.t.e.r.s. .s.u.p.p.o.r.t.e.d. .v.i.a. .W.M.I. .H.i.-.P.e.r.f.o.r.m.a.n.c.e. .p.r.o.v.i.d.e.r.s....././....././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././.............[.i.n.f.o.].....d.r.i.v.e.r.n.a.m.e.=.W.m.i.A.p.R.p.l.....s.y.m.b.o.l.f.i.l.e.=.W.m.i.A.p.R.p.l...h.........[.l.a.n.g.u.a.g.e.s.].....0.0.9.=.E.n.g.l.i.s.h.....0.0.9.=.E.n.g.l.i.s.h.........[.o.b.j.e.c.t.s.].....W.M.I._.O.b.j.e.c.t.s._.0.0.
                                                        Process:C:\Windows\System32\wbem\WMIADAP.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):3444
                                                        Entropy (8bit):5.011954215267298
                                                        Encrypted:false
                                                        SSDEEP:48:ADPo+gDMIuK54DeHNg9dqbEzCJGGgGDU3XgLBgaGKFijiVJtVAAF/XRgW:ADw+gDMhK54qHC7aBvGKFijiV7XRgW
                                                        MD5:B133A676D139032A27DE3D9619E70091
                                                        SHA1:1248AA89938A13640252A79113930EDE2F26F1FA
                                                        SHA-256:AE2B6236D3EEB4822835714AE9444E5DCD21BC60F7A909F2962C43BC743C7B15
                                                        SHA-512:C6B99E13D854CE7A6874497473614EE4BD81C490802783DB1349AB851CD80D1DC06DF8C1F6E434ABA873A5BBF6125CC64104709064E19A9DC1C66DCDE3F898F5
                                                        Malicious:false
                                                        Preview://////////////////////////////////////////////////////////////////////////////////////////////..//..// Copyright (C) 2000 Microsoft Corporation..//..// Module Name:..// WmiApRpl..//..// Abstract:..//..// Include file for object and counters definitions...//..//////////////////////////////////////////////////////////////////////////////////////////////......#define.WMI_Objects.0..#define.HiPerf_Classes.2..#define.HiPerf_Validity.4....#define.MSiSCSI_ConnectionStatistics_00000.6....#define.BytesReceived_00000.8..#define.BytesSent_00000.10..#define.PDUCommandsSent_00000.12..#define.PDUResponsesReceived_00000.14....#define.MSiSCSI_InitiatorInstanceStatistics_00001.16....#define.SessionConnectionTimeoutErrorCount_00001.18..#define.SessionDigestErrorCount_00001.20..#define.SessionFailureCount_00001.22..#define.SessionFormatErrorCount_00001.24....#define.MSiSCSI_InitiatorLoginStatistics_00002.26....#define.LoginAcceptRsps_00002.28..#define.LoginAuthenticateFails_00002.30..#define.LoginAuthFai
                                                        Process:C:\Windows\System32\wbem\WMIADAP.exe
                                                        File Type:Unicode text, UTF-16, little-endian text, with very long lines (405), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):48786
                                                        Entropy (8bit):3.5854495362228453
                                                        Encrypted:false
                                                        SSDEEP:384:esozoNc1+12zG1+b61ubSGMLVrj4+PtC81ZBg4Lg4ung4og4uo91K91zI91K91z2:esozozBg4Lg4ung4og4uWG4MG4o1
                                                        MD5:DF877BEC5C9E3382E94FEA48FEE049AC
                                                        SHA1:1D61436C8A1C057C1B1089EB794D90EE4B0D8FE9
                                                        SHA-256:7F0F3FA64E41A30BACA377B6399F8F7087BC54DA9FCA876BFDC2C2EEECA8454B
                                                        SHA-512:433CB16EBE2292CB60CB8CE71207EBB752295FB73E6D13E215E771EC5FC433EE29577AF28641255810C18078B95F04A9D37734B6F49CB6A6302821E365672205
                                                        Malicious:false
                                                        Preview:.././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././....././....././. .C.o.p.y.r.i.g.h.t. .(.C.). .2.0.0.0. .M.i.c.r.o.s.o.f.t. .C.o.r.p.o.r.a.t.i.o.n....././....././. .M.o.d.u.l.e. .N.a.m.e.:....././. .W.m.i.A.p.R.p.l....././....././. .A.b.s.t.r.a.c.t.:....././....././. .D.e.s.c.r.i.b.e.s. .a.l.l. .t.h.e. .c.o.u.n.t.e.r.s. .s.u.p.p.o.r.t.e.d. .v.i.a. .W.M.I. .H.i.-.P.e.r.f.o.r.m.a.n.c.e. .p.r.o.v.i.d.e.r.s....././....././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././.............[.i.n.f.o.].....d.r.i.v.e.r.n.a.m.e.=.W.m.i.A.p.R.p.l.....s.y.m.b.o.l.f.i.l.e.=.W.m.i.A.p.R.p.l...h.........[.l.a.n.g.u.a.g.e.s.].....0.0.9.=.E.n.g.l.i.s.h.....0.0.9.=.E.n.g.l.i.s.h.........[.o.b.j.e.c.t.s.].....W.M.I._.O.b.j.e.c.t.s._.0.0.
                                                        File type:ASCII text, with very long lines (65494), with CRLF line terminators
                                                        Entropy (8bit):5.979094057562067
                                                        TrID:
                                                          File name:7dtpow.ps1
                                                          File size:393'336 bytes
                                                          MD5:5c540d4108cce10839d48d7a8ba97c11
                                                          SHA1:cf410d7dfe50cbebec376464968a1a6035f778f1
                                                          SHA256:65808985955d6c5df16a4679a0fca5437ab7b2a07eb55c240de1b8d22ae3b8c3
                                                          SHA512:7098674e66ab8761e37f2aa4382e0bdb363605bfea0712b8ef8767809d1baae03ff97023f07e17555a9da09162260261294b8a63049ac48bc76448f6844b5e0b
                                                          SSDEEP:6144:iz/Q0tevGcnK8XXHRSR0aiZd1kHY9LrNi76Dl6WiCAqeHbqg/dz71:A4yApnlXx40rr10sLrQ7W6ZCALqgVP1
                                                          TLSH:EA84DF318908B42FCEEF1F4379251FD73CB9213BCEA45028A14F59B99E24229587BF64
                                                          File Content Preview:$p=[IO.Path]::Combine($env:TEMP,"x.exe")..[IO.File]::WriteAllBytes($p,[Convert]::FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUu
                                                          Icon Hash:3270d6baae77db44
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 8, 2025 16:53:02.275281906 CET4970480192.168.2.5208.95.112.1
                                                          Jan 8, 2025 16:53:02.280142069 CET8049704208.95.112.1192.168.2.5
                                                          Jan 8, 2025 16:53:02.280869961 CET4970480192.168.2.5208.95.112.1
                                                          Jan 8, 2025 16:53:02.281725883 CET4970480192.168.2.5208.95.112.1
                                                          Jan 8, 2025 16:53:02.286467075 CET8049704208.95.112.1192.168.2.5
                                                          Jan 8, 2025 16:53:02.757196903 CET8049704208.95.112.1192.168.2.5
                                                          Jan 8, 2025 16:53:02.817322016 CET4970480192.168.2.5208.95.112.1
                                                          Jan 8, 2025 16:53:03.995510101 CET4970521192.168.2.5162.241.62.63
                                                          Jan 8, 2025 16:53:04.000557899 CET2149705162.241.62.63192.168.2.5
                                                          Jan 8, 2025 16:53:04.000638008 CET4970521192.168.2.5162.241.62.63
                                                          Jan 8, 2025 16:53:04.008128881 CET4970521192.168.2.5162.241.62.63
                                                          Jan 8, 2025 16:53:04.012908936 CET2149705162.241.62.63192.168.2.5
                                                          Jan 8, 2025 16:53:04.012989044 CET4970521192.168.2.5162.241.62.63
                                                          Jan 8, 2025 16:53:53.677505970 CET4970480192.168.2.5208.95.112.1
                                                          Jan 8, 2025 16:53:53.682468891 CET8049704208.95.112.1192.168.2.5
                                                          Jan 8, 2025 16:53:53.682539940 CET4970480192.168.2.5208.95.112.1
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 8, 2025 16:53:02.239588976 CET5375853192.168.2.51.1.1.1
                                                          Jan 8, 2025 16:53:02.246149063 CET53537581.1.1.1192.168.2.5
                                                          Jan 8, 2025 16:53:03.678634882 CET5683053192.168.2.51.1.1.1
                                                          Jan 8, 2025 16:53:03.993742943 CET53568301.1.1.1192.168.2.5
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Jan 8, 2025 16:53:02.239588976 CET192.168.2.51.1.1.10xb2a1Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                          Jan 8, 2025 16:53:03.678634882 CET192.168.2.51.1.1.10xbc9bStandard query (0)ftp.antoniomayol.comA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Jan 8, 2025 16:53:02.246149063 CET1.1.1.1192.168.2.50xb2a1No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                          Jan 8, 2025 16:53:03.993742943 CET1.1.1.1192.168.2.50xbc9bNo error (0)ftp.antoniomayol.comantoniomayol.comCNAME (Canonical name)IN (0x0001)false
                                                          Jan 8, 2025 16:53:03.993742943 CET1.1.1.1192.168.2.50xbc9bNo error (0)antoniomayol.com162.241.62.63A (IP address)IN (0x0001)false
                                                          • ip-api.com
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.549704208.95.112.1801436C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 8, 2025 16:53:02.281725883 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                                          Host: ip-api.com
                                                          Connection: Keep-Alive
                                                          Jan 8, 2025 16:53:02.757196903 CET175INHTTP/1.1 200 OK
                                                          Date: Wed, 08 Jan 2025 15:53:02 GMT
                                                          Content-Type: text/plain; charset=utf-8
                                                          Content-Length: 6
                                                          Access-Control-Allow-Origin: *
                                                          X-Ttl: 58
                                                          X-Rl: 43
                                                          Data Raw: 66 61 6c 73 65 0a
                                                          Data Ascii: false


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:10:52:57
                                                          Start date:08/01/2025
                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\7dtpow.ps1"
                                                          Imagebase:0x7ff7be880000
                                                          File size:452'608 bytes
                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:1
                                                          Start time:10:52:57
                                                          Start date:08/01/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6d64d0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:3
                                                          Start time:10:53:00
                                                          Start date:08/01/2025
                                                          Path:C:\Users\user\AppData\Local\Temp\x.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Local\Temp\x.exe"
                                                          Imagebase:0x910000
                                                          File size:294'912 bytes
                                                          MD5 hash:10454890A3D7C7C0B7EC0BF7018141E4
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2092835508.00000000044AF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2092835508.00000000044AF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Antivirus matches:
                                                          • Detection: 100%, Avira
                                                          • Detection: 100%, Joe Sandbox ML
                                                          • Detection: 66%, ReversingLabs
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:4
                                                          Start time:10:53:00
                                                          Start date:08/01/2025
                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                          Imagebase:0x450000
                                                          File size:65'440 bytes
                                                          MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4515067403.000000000280F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4512063104.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4512063104.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4515067403.00000000027E3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4515067403.00000000027E3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:6
                                                          Start time:10:53:41
                                                          Start date:08/01/2025
                                                          Path:C:\Windows\System32\wbem\WMIADAP.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:wmiadap.exe /F /T /R
                                                          Imagebase:0x7ff6cc130000
                                                          File size:182'272 bytes
                                                          MD5 hash:1BFFABBD200C850E6346820E92B915DC
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:true

                                                          Reset < >
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2110494637.00007FF848E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ff848e50000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 357edb2ca5f4714df53738087389a44f11a4e715afff88a7ecfb203d17235702
                                                            • Instruction ID: 008e695b53bed399ccd8cd3593f0f004ce24f96931a5f27c68025fe3c0ab5e61
                                                            • Opcode Fuzzy Hash: 357edb2ca5f4714df53738087389a44f11a4e715afff88a7ecfb203d17235702
                                                            • Instruction Fuzzy Hash: 32915672E0CE894FE799BA6C985A6B5B7D1FF95750F0801BAE40DC3193DB24AC01C786
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2110494637.00007FF848E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ff848e50000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f7c60676948732ec5066708ba7fd4c104fb42b8c0e824152aacee0f65a0a167e
                                                            • Instruction ID: e3e25cb49ba2862771fdd5aba64182f9513bb57eb7233b47b8d6b56d58580598
                                                            • Opcode Fuzzy Hash: f7c60676948732ec5066708ba7fd4c104fb42b8c0e824152aacee0f65a0a167e
                                                            • Instruction Fuzzy Hash: DC110A72E1D9068FF6ACBA5C65555B9A2C1FF843A0F580179F80DC31C6DF286C4142CA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2110140771.00007FF848D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ff848d80000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                            • Instruction ID: b95460bf11eb50dcd5d824fd60c4a58be9991c15ce2cb47472478d2f9a14ecaf
                                                            • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                            • Instruction Fuzzy Hash: 0C01447111CB094FDB48EF0CE451AA6B7E0FB95364F10056DE58AC3695D726E882CB45

                                                            Execution Graph

                                                            Execution Coverage:29.4%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:132
                                                            Total number of Limit Nodes:0
                                                            execution_graph 2828 2bc55f8 2830 2bc561c 2828->2830 2829 2bc56f1 2830->2829 2833 2bc6139 2830->2833 2853 2bc5e78 2830->2853 2834 2bc5f02 2833->2834 2840 2bc6134 2834->2840 2873 2bc6269 2834->2873 2877 2bc6278 2834->2877 2835 2bc5f14 2881 2bc6860 2835->2881 2885 2bc6851 2835->2885 2836 2bc5fa6 2889 2bc6ab8 2836->2889 2893 2bc6aa9 2836->2893 2837 2bc60f5 2905 2bc6e50 2837->2905 2911 2bc6e40 2837->2911 2838 2bc610d 2917 2bc7230 2838->2917 2925 2bc7221 2838->2925 2839 2bc5ff0 2897 2bc6c58 2839->2897 2901 2bc6c4b 2839->2901 2840->2829 2854 2bc5eb5 2853->2854 2860 2bc6134 2854->2860 2871 2bc6278 CreateProcessA 2854->2871 2872 2bc6269 CreateProcessA 2854->2872 2855 2bc5f14 2865 2bc6860 Wow64SetThreadContext 2855->2865 2866 2bc6851 Wow64SetThreadContext 2855->2866 2856 2bc5fa6 2863 2bc6ab8 ReadProcessMemory 2856->2863 2864 2bc6aa9 ReadProcessMemory 2856->2864 2857 2bc60f5 2861 2bc6e50 WriteProcessMemory 2857->2861 2862 2bc6e40 WriteProcessMemory 2857->2862 2858 2bc610d 2869 2bc7230 3 API calls 2858->2869 2870 2bc7221 3 API calls 2858->2870 2859 2bc5ff0 2867 2bc6c58 VirtualAllocEx 2859->2867 2868 2bc6c4b VirtualAllocEx 2859->2868 2860->2829 2861->2858 2862->2858 2863->2859 2864->2859 2865->2856 2866->2856 2867->2857 2868->2857 2869->2860 2870->2860 2871->2855 2872->2855 2874 2bc6278 2873->2874 2933 2bc57cc 2874->2933 2878 2bc629c 2877->2878 2879 2bc57cc CreateProcessA 2878->2879 2880 2bc6316 2879->2880 2880->2835 2882 2bc687c 2881->2882 2884 2bc68f8 2882->2884 2937 2bc57e4 2882->2937 2884->2836 2886 2bc6860 2885->2886 2887 2bc57e4 Wow64SetThreadContext 2886->2887 2888 2bc68f8 2886->2888 2887->2888 2888->2836 2890 2bc6ad5 2889->2890 2941 2bc580c 2890->2941 2894 2bc6ab2 2893->2894 2895 2bc580c ReadProcessMemory 2894->2895 2896 2bc6afb 2895->2896 2896->2839 2898 2bc6c7b 2897->2898 2945 2bc5824 2898->2945 2900 2bc6cc3 2900->2837 2902 2bc6c58 2901->2902 2903 2bc5824 VirtualAllocEx 2902->2903 2904 2bc6cc3 2903->2904 2904->2837 2906 2bc6e7a 2905->2906 2907 2bc7023 2906->2907 2949 2bc583c 2906->2949 2908 2bc583c WriteProcessMemory 2907->2908 2909 2bc705b 2908->2909 2909->2838 2916 2bc6e50 2911->2916 2912 2bc7023 2913 2bc583c WriteProcessMemory 2912->2913 2914 2bc705b 2913->2914 2914->2838 2915 2bc583c WriteProcessMemory 2915->2916 2916->2912 2916->2915 2918 2bc7257 2917->2918 2919 2bc583c WriteProcessMemory 2918->2919 2920 2bc72c3 2919->2920 2924 2bc7377 2920->2924 2953 2bc5854 2920->2953 2957 2bc586c 2924->2957 2926 2bc7230 2925->2926 2927 2bc583c WriteProcessMemory 2926->2927 2928 2bc72c3 2927->2928 2929 2bc5854 Wow64SetThreadContext 2928->2929 2931 2bc7377 2928->2931 2929->2931 2930 2bc586c ResumeThread 2932 2bc7408 2930->2932 2931->2930 2932->2840 2934 2bc6380 CreateProcessA 2933->2934 2936 2bc66b8 2934->2936 2938 2bc6998 Wow64SetThreadContext 2937->2938 2940 2bc6a5b 2938->2940 2940->2884 2942 2bc6b28 ReadProcessMemory 2941->2942 2944 2bc6afb 2942->2944 2944->2839 2946 2bc6d30 VirtualAllocEx 2945->2946 2948 2bc6dee 2946->2948 2948->2900 2950 2bc70d8 WriteProcessMemory 2949->2950 2952 2bc71bf 2950->2952 2952->2906 2954 2bc6998 Wow64SetThreadContext 2953->2954 2956 2bc6a5b 2954->2956 2956->2924 2958 2bc7478 ResumeThread 2957->2958 2960 2bc7408 2958->2960 2960->2840 2961 2bc1bd8 2962 2bc1c25 VirtualProtect 2961->2962 2963 2bc1c91 2962->2963 2975 2bc55e8 2977 2bc561c 2975->2977 2976 2bc56f1 2977->2976 2978 2bc5e78 7 API calls 2977->2978 2979 2bc6139 7 API calls 2977->2979 2978->2976 2979->2976 2983 2bc6d28 2984 2bc6d2f VirtualAllocEx 2983->2984 2986 2bc6dee 2984->2986 2991 2bc6374 2992 2bc6411 CreateProcessA 2991->2992 2994 2bc66b8 2992->2994 2994->2994 2964 2bc70d0 2965 2bc70d7 WriteProcessMemory 2964->2965 2967 2bc71bf 2965->2967 2968 2bc7470 2969 2bc74bd ResumeThread 2968->2969 2970 2bc7507 2969->2970 2971 2bc6990 2972 2bc6998 Wow64SetThreadContext 2971->2972 2974 2bc6a5b 2972->2974 2987 2bc6b20 2988 2bc6b9c ReadProcessMemory 2987->2988 2989 2bc6b26 2987->2989 2990 2bc6bee 2988->2990 2989->2988 2980 2bc1bd1 2981 2bc1c25 VirtualProtect 2980->2981 2982 2bc1c91 2981->2982
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: <$@
                                                            • API String ID: 0-1426351568
                                                            • Opcode ID: 3e98f42adb4d4a96bb536253e4d52e27827bc3f81ee849cd04066ff3775832c4
                                                            • Instruction ID: ae08362566bc86b86c40b9bade29ce106c89a8531072d2c677ff79077f031ab8
                                                            • Opcode Fuzzy Hash: 3e98f42adb4d4a96bb536253e4d52e27827bc3f81ee849cd04066ff3775832c4
                                                            • Instruction Fuzzy Hash: 74627DB4E11219CFDB64CF69C980A9DBBF2FF49311F65D1A9D408AB216D730AA81CF50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$[F
                                                            • API String ID: 0-3578821254
                                                            • Opcode ID: 5b479fd68584a7b7cd1b033294c20ccbb1a8bc9695b301354889c8052426775b
                                                            • Instruction ID: b31d5558d8fa9f03ec23a6c27b7301adc1f762fdf4ab13631fb8a19acc5de8c6
                                                            • Opcode Fuzzy Hash: 5b479fd68584a7b7cd1b033294c20ccbb1a8bc9695b301354889c8052426775b
                                                            • Instruction Fuzzy Hash: 7552B074A01259CFDB64DF69C980A8EFBB2FF49311F65C5E9D408AB212D730AA81CF51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$[F
                                                            • API String ID: 0-3578821254
                                                            • Opcode ID: 082b3778ab9f6dd5a7219a99ec368b6f9090e95635f3d2219d1636964ed452fc
                                                            • Instruction ID: 525a2616a8cfc59200e23265e139650a07a4b295479eb45016407e248590e3af
                                                            • Opcode Fuzzy Hash: 082b3778ab9f6dd5a7219a99ec368b6f9090e95635f3d2219d1636964ed452fc
                                                            • Instruction Fuzzy Hash: 85B1C074E012298FDB68DF6AC840BDABBB2BF89300F10C4EAD54DA7254DB745A85CF51
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: af96de59141d2f39f3262481035deda203ec36cac6dfda09eeefee3e681a2990
                                                            • Instruction ID: 81daaa2b811291765c08465486a8772098d79fe00ede71884c734bec34976390
                                                            • Opcode Fuzzy Hash: af96de59141d2f39f3262481035deda203ec36cac6dfda09eeefee3e681a2990
                                                            • Instruction Fuzzy Hash: 36428074E01219CFDB24DF69C984B9DBBF2BF48311F6081A9E809A7355D735AA81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5c4e2e4ea179beb246a883d3ef299d6b6394e65c6049ba3cb64ac879c7cf5b99
                                                            • Instruction ID: 39ded73e6ff72a589423318cbb56cf8015b019f75d720a5e191789491ea2c5a0
                                                            • Opcode Fuzzy Hash: 5c4e2e4ea179beb246a883d3ef299d6b6394e65c6049ba3cb64ac879c7cf5b99
                                                            • Instruction Fuzzy Hash: B161B375E01218CFDB28CFAAC994BDDBBF2BF88310F6481A9D809A7254D7759941CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 524 2bc6374-2bc6423 526 2bc6485-2bc64b0 524->526 527 2bc6425-2bc6455 524->527 530 2bc6512-2bc656b 526->530 531 2bc64b2-2bc64e2 526->531 527->526 533 2bc6457-2bc645c 527->533 538 2bc656d-2bc659a 530->538 539 2bc65ca-2bc66b6 CreateProcessA 530->539 531->530 543 2bc64e4-2bc64e9 531->543 536 2bc645e-2bc6468 533->536 537 2bc647f-2bc6482 533->537 541 2bc646c-2bc647b 536->541 542 2bc646a 536->542 537->526 538->539 554 2bc659c-2bc65a1 538->554 562 2bc66bf-2bc6799 539->562 563 2bc66b8-2bc66be 539->563 541->541 544 2bc647d 541->544 542->541 547 2bc650c-2bc650f 543->547 548 2bc64eb-2bc64f5 543->548 544->537 547->530 549 2bc64f9-2bc6508 548->549 550 2bc64f7 548->550 549->549 553 2bc650a 549->553 550->549 553->547 555 2bc65c4-2bc65c7 554->555 556 2bc65a3-2bc65ad 554->556 555->539 558 2bc65af 556->558 559 2bc65b1-2bc65c0 556->559 558->559 559->559 560 2bc65c2 559->560 560->555 574 2bc67a9-2bc67ad 562->574 575 2bc679b-2bc679f 562->575 563->562 577 2bc67bd-2bc67c1 574->577 578 2bc67af-2bc67b3 574->578 575->574 576 2bc67a1 575->576 576->574 580 2bc67d1-2bc67d5 577->580 581 2bc67c3-2bc67c7 577->581 578->577 579 2bc67b5 578->579 579->577 583 2bc680b-2bc6816 580->583 584 2bc67d7-2bc6800 580->584 581->580 582 2bc67c9 581->582 582->580 588 2bc6817 583->588 584->583 588->588
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,03C3358C,03C33590,02BC6316,?,?,?,?,?), ref: 02BC66A3
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 372ea18eac5047f929b1b5e47903df0fd2ed1e7b63ffc8aa7ee29b0b4b4024ec
                                                            • Instruction ID: eac61d2b25d5e016815a43220bd3ef8cb13e290c4505bc36188aef4f68538daf
                                                            • Opcode Fuzzy Hash: 372ea18eac5047f929b1b5e47903df0fd2ed1e7b63ffc8aa7ee29b0b4b4024ec
                                                            • Instruction Fuzzy Hash: 90D12570D002298FDB24CFA8C880BEDBBB5FF49304F1095AAD949B7254DB749A85CF95

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 589 2bc57cc-2bc6423 592 2bc6485-2bc64b0 589->592 593 2bc6425-2bc6455 589->593 596 2bc6512-2bc656b 592->596 597 2bc64b2-2bc64e2 592->597 593->592 599 2bc6457-2bc645c 593->599 604 2bc656d-2bc659a 596->604 605 2bc65ca-2bc66b6 CreateProcessA 596->605 597->596 609 2bc64e4-2bc64e9 597->609 602 2bc645e-2bc6468 599->602 603 2bc647f-2bc6482 599->603 607 2bc646c-2bc647b 602->607 608 2bc646a 602->608 603->592 604->605 620 2bc659c-2bc65a1 604->620 628 2bc66bf-2bc6799 605->628 629 2bc66b8-2bc66be 605->629 607->607 610 2bc647d 607->610 608->607 613 2bc650c-2bc650f 609->613 614 2bc64eb-2bc64f5 609->614 610->603 613->596 615 2bc64f9-2bc6508 614->615 616 2bc64f7 614->616 615->615 619 2bc650a 615->619 616->615 619->613 621 2bc65c4-2bc65c7 620->621 622 2bc65a3-2bc65ad 620->622 621->605 624 2bc65af 622->624 625 2bc65b1-2bc65c0 622->625 624->625 625->625 626 2bc65c2 625->626 626->621 640 2bc67a9-2bc67ad 628->640 641 2bc679b-2bc679f 628->641 629->628 643 2bc67bd-2bc67c1 640->643 644 2bc67af-2bc67b3 640->644 641->640 642 2bc67a1 641->642 642->640 646 2bc67d1-2bc67d5 643->646 647 2bc67c3-2bc67c7 643->647 644->643 645 2bc67b5 644->645 645->643 649 2bc680b-2bc6816 646->649 650 2bc67d7-2bc6800 646->650 647->646 648 2bc67c9 647->648 648->646 654 2bc6817 649->654 650->649 654->654
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,03C3358C,03C33590,02BC6316,?,?,?,?,?), ref: 02BC66A3
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: f6088d51f67005ec86c7ef1756d4b17f6c3afbf43f2e902b193bd25d5cb11bee
                                                            • Instruction ID: 9a6c751633e68bcbaf3841eabd914d671fe28127e6ab6d5b9509f3aad372ce2a
                                                            • Opcode Fuzzy Hash: f6088d51f67005ec86c7ef1756d4b17f6c3afbf43f2e902b193bd25d5cb11bee
                                                            • Instruction Fuzzy Hash: F4D12570D002298FDB24DFA8C880BEDBBB5FF49304F1091AAD949B7254DB749A85CF95

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 655 2bc70d0-2bc70d5 656 2bc70d9-2bc7147 655->656 657 2bc70d7 655->657 659 2bc715e-2bc71bd WriteProcessMemory 656->659 660 2bc7149-2bc715b 656->660 657->656 661 2bc71bf-2bc71c5 659->661 662 2bc71c6-2bc7210 659->662 660->659 661->662
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 02BC71AD
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: d42c7b1aa27996ff39d5aaec83fa9f51ec5507cfc80d6f510022a0277a28af23
                                                            • Instruction ID: 4942e22dc30b8bb63209927fb51831af533962c14384b92529c76fe0755e547e
                                                            • Opcode Fuzzy Hash: d42c7b1aa27996ff39d5aaec83fa9f51ec5507cfc80d6f510022a0277a28af23
                                                            • Instruction Fuzzy Hash: 0C4197B4D002589FCB10CFA9D984AEEFBF5BB09310F24906AE818B7210D374A985CF64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 666 2bc583c-2bc7147 670 2bc715e-2bc71bd WriteProcessMemory 666->670 671 2bc7149-2bc715b 666->671 672 2bc71bf-2bc71c5 670->672 673 2bc71c6-2bc7210 670->673 671->670 672->673
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 02BC71AD
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: a2982eacd33a4961c539c37bca9c8638a7b619dc12876c4e7a58f35f17a2fdf2
                                                            • Instruction ID: 2af1656f45b7119d20406d9d658b0ad894b1fe4e6c8ac564cce5c912a1e90a68
                                                            • Opcode Fuzzy Hash: a2982eacd33a4961c539c37bca9c8638a7b619dc12876c4e7a58f35f17a2fdf2
                                                            • Instruction Fuzzy Hash: B44178B5D002589FCB10CFA9D984AAEFBF5BB09310F24906AE818B7314D775A985CF64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 677 2bc580c-2bc6bec ReadProcessMemory 681 2bc6bee-2bc6bf4 677->681 682 2bc6bf5-2bc6c3f 677->682 681->682
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(00000004,?,02BC6AFB,?,?), ref: 02BC6BDC
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: 5dabfb76eda724ff68660d970cd8e395aa97e6551f15270c5b6de7213fcaec4c
                                                            • Instruction ID: 154a2d7a43a054c3c76f70efb8b4db4c13ae52a3d519cf49a2bca459978f0e63
                                                            • Opcode Fuzzy Hash: 5dabfb76eda724ff68660d970cd8e395aa97e6551f15270c5b6de7213fcaec4c
                                                            • Instruction Fuzzy Hash: 5C4198B9D002589FCB10CFA9D984ADEFBF5FB19310F20906AE818B7210D335A941CF64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 686 2bc6b20-2bc6b24 687 2bc6b9c-2bc6bec ReadProcessMemory 686->687 688 2bc6b26-2bc6b99 686->688 689 2bc6bee-2bc6bf4 687->689 690 2bc6bf5-2bc6c3f 687->690 688->687 689->690
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(00000004,?,02BC6AFB,?,?), ref: 02BC6BDC
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: 5c1feb9c3c5acdd709e8e94678009a8d8eb93168c1657eb3db015b9451d3f35a
                                                            • Instruction ID: 205258060013b1d4326577a90b2c29ca7676ec89e5a3d9a26473dfedb8280f03
                                                            • Opcode Fuzzy Hash: 5c1feb9c3c5acdd709e8e94678009a8d8eb93168c1657eb3db015b9451d3f35a
                                                            • Instruction Fuzzy Hash: 794198B9D002589FCF10CFA9D984ADEFBB5FB5A310F20906AE818B7210D335A945CF64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 696 2bc5824-2bc6dec VirtualAllocEx 700 2bc6dee-2bc6df4 696->700 701 2bc6df5-2bc6e37 696->701 700->701
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02BC6DDC
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: b950a797fb11554d8dca4065a72025f5027d1aa271b929b7542e8f20e8d9ec98
                                                            • Instruction ID: 0f990e5225798173696a91e494be637d1bab4483b1e9dcb650444b7efa88341d
                                                            • Opcode Fuzzy Hash: b950a797fb11554d8dca4065a72025f5027d1aa271b929b7542e8f20e8d9ec98
                                                            • Instruction Fuzzy Hash: E94165B9D002589FCF10CFA9D984A9EFBB5FB59310F20906AE818BB210D735A941CB64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 705 2bc6d28-2bc6d2d 706 2bc6d2f 705->706 707 2bc6d31-2bc6d70 705->707 706->707 708 2bc6d78-2bc6dec VirtualAllocEx 707->708 709 2bc6dee-2bc6df4 708->709 710 2bc6df5-2bc6e37 708->710 709->710
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02BC6DDC
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: bfe2d71ad7cec193e0e7a4f33d2bc8763150dad3e7557984c42459561316470e
                                                            • Instruction ID: 84a0bce9d2903fa37ca2bb860f3435dc7c73f00cdb7e35e9ff1a05ec830b4c20
                                                            • Opcode Fuzzy Hash: bfe2d71ad7cec193e0e7a4f33d2bc8763150dad3e7557984c42459561316470e
                                                            • Instruction Fuzzy Hash: B44166B9D002589FCB10CFA9D984A9EFBB5FB59310F24906AE818B7210D775A942CF64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 730 2bc5854-2bc69fc 733 2bc69fe-2bc6a10 730->733 734 2bc6a13-2bc6a59 Wow64SetThreadContext 730->734 733->734 735 2bc6a5b-2bc6a61 734->735 736 2bc6a62-2bc6aa6 734->736 735->736
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,?), ref: 02BC6A49
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: 51ace4199fad8ae93d7837dad8a815682395702854642a0c852d2f37b74c4175
                                                            • Instruction ID: 3b39ef4d7f01c82e7406c5b53305e49933d7f00d75b8a64ed9b48c8693ac392a
                                                            • Opcode Fuzzy Hash: 51ace4199fad8ae93d7837dad8a815682395702854642a0c852d2f37b74c4175
                                                            • Instruction Fuzzy Hash: CC419BB4D012589FCB10CFAAD984AEEFBF5FB49314F20906AE418B7210D778A945CF54

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 740 2bc6990-2bc69fc 743 2bc69fe-2bc6a10 740->743 744 2bc6a13-2bc6a59 Wow64SetThreadContext 740->744 743->744 745 2bc6a5b-2bc6a61 744->745 746 2bc6a62-2bc6aa6 744->746 745->746
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,?), ref: 02BC6A49
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: 43abb6d07d41c38e5d952ddb93ab2c6a62b0536e386e4a9d0c86cb78c2e874d1
                                                            • Instruction ID: b1f003e0bb43849832c78b4e479d2b29d780b19f9d9d64843ccd39ac67fc6d00
                                                            • Opcode Fuzzy Hash: 43abb6d07d41c38e5d952ddb93ab2c6a62b0536e386e4a9d0c86cb78c2e874d1
                                                            • Instruction Fuzzy Hash: 5C4199B5D012589FCB10CFAAD984AEEFBF4FB49314F24806AE418B7250D778A945CF64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 720 2bc57e4-2bc69fc 723 2bc69fe-2bc6a10 720->723 724 2bc6a13-2bc6a59 Wow64SetThreadContext 720->724 723->724 725 2bc6a5b-2bc6a61 724->725 726 2bc6a62-2bc6aa6 724->726 725->726
                                                            APIs
                                                            • Wow64SetThreadContext.KERNEL32(?,?), ref: 02BC6A49
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID: ContextThreadWow64
                                                            • String ID:
                                                            • API String ID: 983334009-0
                                                            • Opcode ID: a2a3496d1534b4f6653eec181ba00d9b5aca9712b985d626adb1125b1c682949
                                                            • Instruction ID: ac646bf9d4cd7859f42d50ab49109d35184181d19ec2fad5f9a74aea52372eb1
                                                            • Opcode Fuzzy Hash: a2a3496d1534b4f6653eec181ba00d9b5aca9712b985d626adb1125b1c682949
                                                            • Instruction Fuzzy Hash: AA419BB5D052589FCB10CFAAD984AEEFBF4FB49314F20906AE418B7210D778A945CF54

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 714 2bc1bd1-2bc1c8f VirtualProtect 716 2bc1c98-2bc1cd4 714->716 717 2bc1c91-2bc1c97 714->717 717->716
                                                            APIs
                                                            • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02BC1C7F
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: 9a47976435c9d37058ddeb62f85ef11f66ad9848e92d2978ed51e9afddce4225
                                                            • Instruction ID: 001c71dcac1d6a758a934728e490c64c2c81e6524564e3fb4fa74b94a472d302
                                                            • Opcode Fuzzy Hash: 9a47976435c9d37058ddeb62f85ef11f66ad9848e92d2978ed51e9afddce4225
                                                            • Instruction Fuzzy Hash: C73198B9D002589FCB10CFA9D584AEEFBF1BF19310F24906AE818B7210D335A945CF64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 750 2bc1bd8-2bc1c8f VirtualProtect 752 2bc1c98-2bc1cd4 750->752 753 2bc1c91-2bc1c97 750->753 753->752
                                                            APIs
                                                            • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02BC1C7F
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: ef25228c7cf391bc55fd7a3845b893958816323263862afacb9a29772c7cb764
                                                            • Instruction ID: 45557c64976ef622fe00dd1e0365c9077bcf936ece09c7f986c41c6ae40da875
                                                            • Opcode Fuzzy Hash: ef25228c7cf391bc55fd7a3845b893958816323263862afacb9a29772c7cb764
                                                            • Instruction Fuzzy Hash: 973197B9D002589FCB10CFA9D584AEEFBF1BB19310F24906AE818B7210D335A945CFA4
                                                            APIs
                                                            • ResumeThread.KERNELBASE(00000000), ref: 02BC74F5
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 43681e949027c33b0dee51f856162b3b2397af7756d005e49c1a698e17dfefd4
                                                            • Instruction ID: 44ddd40706741d251b8607fed3a437aa9b7c570ba4bd5f371c5469cdcd7faa44
                                                            • Opcode Fuzzy Hash: 43681e949027c33b0dee51f856162b3b2397af7756d005e49c1a698e17dfefd4
                                                            • Instruction Fuzzy Hash: 5E317BB4D012589FCB10CFA9D584A9EFBF4EF49314F24906AE815B7311D735A941CF54

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 756 2bc586c-2bc7505 ResumeThread 759 2bc750e-2bc7548 756->759 760 2bc7507-2bc750d 756->760 760->759
                                                            APIs
                                                            • ResumeThread.KERNELBASE(00000000), ref: 02BC74F5
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.2091989553.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2bc0000_x.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 355baf8382b821e5f1d9e04bedda0022cd4a92ab1edecb00896dd169eb557cbf
                                                            • Instruction ID: 6b56856d3899e74fa37dc5f084cf5cc63970d49706b70e18b86c1c4371e119ed
                                                            • Opcode Fuzzy Hash: 355baf8382b821e5f1d9e04bedda0022cd4a92ab1edecb00896dd169eb557cbf
                                                            • Instruction Fuzzy Hash: AD31ABB4D012589FCB10DFA9D584A9EFBF4FB09310F24906AE818B7310D735A941CFA4

                                                            Execution Graph

                                                            Execution Coverage:11.3%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:10.3%
                                                            Total number of Nodes:29
                                                            Total number of Limit Nodes:4
                                                            execution_graph 40011 c77070 40012 c770b4 CheckRemoteDebuggerPresent 40011->40012 40013 c770f6 40012->40013 39979 53ae110 39980 53ae178 CreateWindowExW 39979->39980 39982 53ae234 39980->39982 39983 c70848 39985 c7084e 39983->39985 39984 c7091b 39985->39984 39988 c71348 39985->39988 39993 c71478 39985->39993 39989 c71317 39988->39989 39990 c71319 39989->39990 39991 c71478 2 API calls 39989->39991 39998 c78229 39989->39998 39990->39985 39991->39989 39994 c71356 39993->39994 39995 c7146e 39994->39995 39996 c78229 2 API calls 39994->39996 39997 c71478 2 API calls 39994->39997 39995->39985 39996->39994 39997->39994 39999 c78233 39998->39999 40002 c782e9 39999->40002 40003 609f630 39999->40003 40007 609f622 39999->40007 40002->39989 40004 609f645 40003->40004 40005 609f85a 40004->40005 40006 609fc78 GlobalMemoryStatusEx GlobalMemoryStatusEx 40004->40006 40005->40002 40006->40004 40008 609f62a 40007->40008 40009 609f85a 40008->40009 40010 609fc78 GlobalMemoryStatusEx GlobalMemoryStatusEx 40008->40010 40009->40002 40010->40008

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 654 6093138-6093159 655 609315b-609315e 654->655 656 60938ff-6093902 655->656 657 6093164-6093183 655->657 658 6093928-609392a 656->658 659 6093904-6093923 656->659 666 609319c-60931a6 657->666 667 6093185-6093188 657->667 660 609392c 658->660 661 6093931-6093934 658->661 659->658 660->661 661->655 663 609393a-6093943 661->663 671 60931ac-60931bb 666->671 667->666 669 609318a-609319a 667->669 669->671 780 60931bd call 6093958 671->780 781 60931bd call 6093950 671->781 673 60931c2-60931c7 674 60931c9-60931cf 673->674 675 60931d4-60934b1 673->675 674->663 696 60938f1-60938fe 675->696 697 60934b7-6093566 675->697 706 6093568-609358d 697->706 707 609358f 697->707 709 6093598-60935ab 706->709 707->709 711 60938d8-60938e4 709->711 712 60935b1-60935d3 709->712 711->697 713 60938ea 711->713 712->711 715 60935d9-60935e3 712->715 713->696 715->711 716 60935e9-60935f4 715->716 716->711 717 60935fa-60936d0 716->717 729 60936de-609370e 717->729 730 60936d2-60936d4 717->730 734 609371c-6093728 729->734 735 6093710-6093712 729->735 730->729 736 6093788-609378c 734->736 737 609372a-609372e 734->737 735->734 738 60938c9-60938d2 736->738 739 6093792-60937ce 736->739 737->736 740 6093730-609375a 737->740 738->711 738->717 750 60937dc-60937ea 739->750 751 60937d0-60937d2 739->751 747 6093768-6093785 740->747 748 609375c-609375e 740->748 747->736 748->747 754 60937ec-60937f7 750->754 755 6093801-609380c 750->755 751->750 754->755 760 60937f9 754->760 758 609380e-6093814 755->758 759 6093824-6093835 755->759 761 6093818-609381a 758->761 762 6093816 758->762 764 609384d-6093859 759->764 765 6093837-609383d 759->765 760->755 761->759 762->759 769 609385b-6093861 764->769 770 6093871-60938c2 764->770 766 609383f 765->766 767 6093841-6093843 765->767 766->764 767->764 771 6093863 769->771 772 6093865-6093867 769->772 770->738 771->770 772->770 780->673 781->673
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-3723351465
                                                            • Opcode ID: fc05fa4428f37644f2f3411c7777b2c0a2ed322ab4ae7cbfcf670ebd9ef37700
                                                            • Instruction ID: b129c5b5bcc7c85dd2e6b2857e16b02fdbb1f06af97e6383b77343b1df7a9882
                                                            • Opcode Fuzzy Hash: fc05fa4428f37644f2f3411c7777b2c0a2ed322ab4ae7cbfcf670ebd9ef37700
                                                            • Instruction Fuzzy Hash: CA323F31E1071A8FCB59EF74C89459DF7B6BF89300F60C6A9D409A7264EB70A985CF90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1326 6097e50-6097e6e 1327 6097e70-6097e73 1326->1327 1328 6097e8a-6097e8d 1327->1328 1329 6097e75-6097e83 1327->1329 1330 6097e8f-6097eab 1328->1330 1331 6097eb0-6097eb3 1328->1331 1335 6097e85 1329->1335 1336 6097ef6-6097f0c 1329->1336 1330->1331 1333 6097ec0-6097ec3 1331->1333 1334 6097eb5-6097ebf 1331->1334 1338 6097ec5-6097edf 1333->1338 1339 6097ee4-6097ee6 1333->1339 1335->1328 1345 6097f12-6097f1b 1336->1345 1346 6098127-6098131 1336->1346 1338->1339 1340 6097ee8 1339->1340 1341 6097eed-6097ef0 1339->1341 1340->1341 1341->1327 1341->1336 1348 6097f21-6097f3e 1345->1348 1349 6098132-6098167 1345->1349 1358 6098114-6098121 1348->1358 1359 6097f44-6097f6c 1348->1359 1352 6098169-609816c 1349->1352 1353 609818f-6098192 1352->1353 1354 609816e-609818a 1352->1354 1356 6098198-60981a4 1353->1356 1357 609823f-6098242 1353->1357 1354->1353 1364 60981af-60981b1 1356->1364 1361 6098248-6098257 1357->1361 1362 6098477-6098479 1357->1362 1358->1345 1358->1346 1359->1358 1380 6097f72-6097f7b 1359->1380 1374 6098259-6098274 1361->1374 1375 6098276-60982ba 1361->1375 1365 609847b 1362->1365 1366 6098480-6098483 1362->1366 1369 60981c9-60981cd 1364->1369 1370 60981b3-60981b9 1364->1370 1365->1366 1366->1352 1371 6098489-6098492 1366->1371 1372 60981db 1369->1372 1373 60981cf-60981d9 1369->1373 1377 60981bb 1370->1377 1378 60981bd-60981bf 1370->1378 1379 60981e0-60981e2 1372->1379 1373->1379 1374->1375 1386 609844b-6098461 1375->1386 1387 60982c0-60982d1 1375->1387 1377->1369 1378->1369 1381 60981f9-6098232 1379->1381 1382 60981e4-60981e7 1379->1382 1380->1349 1384 6097f81-6097f9d 1380->1384 1381->1361 1407 6098234-609823e 1381->1407 1382->1371 1392 6097fa3-6097fcd 1384->1392 1393 6098102-609810e 1384->1393 1386->1362 1397 60982d7-60982f4 1387->1397 1398 6098436-6098445 1387->1398 1409 60980f8-60980fd 1392->1409 1410 6097fd3-6097ffb 1392->1410 1393->1358 1393->1380 1397->1398 1406 60982fa-60983f0 call 6096670 1397->1406 1398->1386 1398->1387 1459 60983fe 1406->1459 1460 60983f2-60983fc 1406->1460 1409->1393 1410->1409 1416 6098001-609802f 1410->1416 1416->1409 1422 6098035-609803e 1416->1422 1422->1409 1423 6098044-6098076 1422->1423 1431 6098078-609807c 1423->1431 1432 6098081-609809d 1423->1432 1431->1409 1433 609807e 1431->1433 1432->1393 1434 609809f-60980f6 call 6096670 1432->1434 1433->1432 1434->1393 1461 6098403-6098405 1459->1461 1460->1461 1461->1398 1462 6098407-609840c 1461->1462 1463 609841a 1462->1463 1464 609840e-6098418 1462->1464 1465 609841f-6098421 1463->1465 1464->1465 1465->1398 1466 6098423-609842f 1465->1466 1466->1398
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q
                                                            • API String ID: 0-127220927
                                                            • Opcode ID: 6127e9fa1f10aad78d697ab05236d5dd6e1b8a214f6750bf436d377cacb77438
                                                            • Instruction ID: 826a8730c759f7819fe1c0c9a39cd04119b83b0d751914f4c5bfe4d6ceb6dcc6
                                                            • Opcode Fuzzy Hash: 6127e9fa1f10aad78d697ab05236d5dd6e1b8a214f6750bf436d377cacb77438
                                                            • Instruction Fuzzy Hash: 95029A30B002058FDF98DB68D990AAEBBE7EF85304F14C929D8159B395DB35EC42CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2208 6095270-609528d 2209 609528f-6095292 2208->2209 2210 6095294-60952a1 2209->2210 2211 60952a6-60952a9 2209->2211 2210->2211 2212 60953c9-60953cf 2211->2212 2213 60952af-60952b2 2211->2213 2215 609530a-6095310 2212->2215 2216 60953d5 2212->2216 2217 60952c3-60952c6 2213->2217 2218 60952b4-60952b8 2213->2218 2219 609544c-6095460 2215->2219 2220 6095316-609531e 2215->2220 2221 60953da-60953dd 2216->2221 2224 60952c8-60952dd 2217->2224 2225 60952e2-60952e5 2217->2225 2222 609543e-609544b 2218->2222 2223 60952be 2218->2223 2244 609548a-609549b 2219->2244 2245 6095462-609547b 2219->2245 2220->2219 2228 6095324-6095331 2220->2228 2229 60953eb-60953ee 2221->2229 2230 60953df-60953e6 2221->2230 2223->2217 2224->2225 2226 60952f8-60952fb 2225->2226 2227 60952e7-60952ed 2225->2227 2233 60952fd-6095300 2226->2233 2234 6095305-6095308 2226->2234 2231 60952f3 2227->2231 2232 6095386-6095389 2227->2232 2228->2219 2235 6095337-609533b 2228->2235 2237 6095408-609540b 2229->2237 2238 60953f0-60953fa 2229->2238 2230->2229 2231->2226 2242 609538e-6095391 2232->2242 2233->2234 2234->2215 2243 6095340-6095343 2234->2243 2235->2243 2240 609540d-609541c 2237->2240 2241 6095421-6095424 2237->2241 2252 6095401-6095403 2238->2252 2240->2241 2246 609542c-609542e 2241->2246 2247 6095426-6095427 2241->2247 2248 6095393-60953b0 2242->2248 2249 60953b5-60953b8 2242->2249 2250 6095345-6095348 2243->2250 2251 6095374-609537a 2243->2251 2263 60954a0-60954a3 2244->2263 2262 6095485-6095488 2245->2262 2256 6095430 2246->2256 2257 6095435-6095438 2246->2257 2247->2246 2248->2249 2260 60953ba-60953c3 2249->2260 2261 60953c4-60953c7 2249->2261 2258 609534a-609534c 2250->2258 2259 609534f-6095352 2250->2259 2251->2238 2254 609537c 2251->2254 2252->2237 2264 6095381-6095384 2254->2264 2256->2257 2257->2209 2257->2222 2258->2259 2266 609536f-6095372 2259->2266 2267 6095354-609536a 2259->2267 2261->2212 2261->2221 2262->2244 2262->2263 2268 60954ad-60954b0 2263->2268 2269 60954a5-60954ac 2263->2269 2264->2232 2264->2242 2266->2251 2266->2264 2267->2266 2270 60954b2-60954b9 2268->2270 2271 60954c4-60954c7 2268->2271 2274 60954bf 2270->2274 2275 6095566-609556d 2270->2275 2276 60954e9-60954ec 2271->2276 2277 60954c9-60954cd 2271->2277 2274->2271 2280 60954fd-6095500 2276->2280 2281 60954ee-60954f8 2276->2281 2278 609556e-60955ac 2277->2278 2279 60954d3-60954db 2277->2279 2290 60955ae-60955b1 2278->2290 2279->2278 2284 60954e1-60954e4 2279->2284 2282 609551a-609551d 2280->2282 2283 6095502-6095506 2280->2283 2281->2280 2287 609551f-6095523 2282->2287 2288 6095537-609553a 2282->2288 2283->2278 2286 6095508-6095510 2283->2286 2284->2276 2286->2278 2291 6095512-6095515 2286->2291 2287->2278 2292 6095525-609552d 2287->2292 2293 609553c-6095540 2288->2293 2294 6095554-6095556 2288->2294 2295 609589a-609589d 2290->2295 2296 60955b7-609574b 2290->2296 2291->2282 2292->2278 2297 609552f-6095532 2292->2297 2293->2278 2298 6095542-609554a 2293->2298 2299 6095558 2294->2299 2300 609555d-6095560 2294->2300 2301 609589f-60958b2 2295->2301 2302 60958b5-60958b8 2295->2302 2358 6095751-6095758 2296->2358 2359 6095884-6095897 2296->2359 2297->2288 2298->2278 2303 609554c-609554f 2298->2303 2299->2300 2300->2262 2300->2275 2304 60958ba-60958bf 2302->2304 2305 60958c2-60958c5 2302->2305 2303->2294 2304->2305 2308 60958df-60958e2 2305->2308 2309 60958c7-60958d8 2305->2309 2311 60958fc-60958ff 2308->2311 2312 60958e4-60958f5 2308->2312 2318 60958da 2309->2318 2319 609592f-6095940 2309->2319 2313 6095919-609591c 2311->2313 2314 6095901-6095912 2311->2314 2317 609591e-6095925 2312->2317 2324 60958f7 2312->2324 2316 609592a-609592d 2313->2316 2313->2317 2314->2301 2325 6095914 2314->2325 2316->2319 2323 6095947-609594a 2316->2323 2317->2316 2318->2308 2319->2317 2332 6095942 2319->2332 2328 609594c-609595d 2323->2328 2329 6095964-6095967 2323->2329 2324->2311 2325->2313 2328->2317 2336 609595f 2328->2336 2330 6095969-6095970 2329->2330 2331 6095975-6095978 2329->2331 2330->2331 2331->2296 2333 609597e-6095981 2331->2333 2332->2323 2333->2296 2337 6095987-6095989 2333->2337 2336->2329 2339 609598b 2337->2339 2340 6095990-6095993 2337->2340 2339->2340 2340->2290 2341 6095999-60959a2 2340->2341 2360 609580c-6095813 2358->2360 2361 609575e-6095781 2358->2361 2360->2359 2362 6095815-6095848 2360->2362 2370 6095789-6095791 2361->2370 2374 609584a 2362->2374 2375 609584d-609587a 2362->2375 2372 6095793 2370->2372 2373 6095796-60957d7 2370->2373 2372->2373 2383 60957d9-60957ea 2373->2383 2384 60957ef-6095800 2373->2384 2374->2375 2375->2341 2383->2341 2384->2341
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $
                                                            • API String ID: 0-3993045852
                                                            • Opcode ID: cce7329942e912ae354fee7e00b5d12893f02c7ee9929f4f187bab29c6bf8b5a
                                                            • Instruction ID: 37a92d187587e72a619e08358f0695f05a6ed313680eac6443f5399fafeab2f1
                                                            • Opcode Fuzzy Hash: cce7329942e912ae354fee7e00b5d12893f02c7ee9929f4f187bab29c6bf8b5a
                                                            • Instruction Fuzzy Hash: 0022D131E002059FDFA6DFA5C8906AEBBF3EF84314F108469D41AAB355DA35DD42CBA1
                                                            APIs
                                                            • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 00C770E7
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4514338000.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_c70000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID: CheckDebuggerPresentRemote
                                                            • String ID:
                                                            • API String ID: 3662101638-0
                                                            • Opcode ID: e93c98e2e372f30bc0a2de6ad558986ce9f1a72cd8eb12668fcaabf52dfa9457
                                                            • Instruction ID: ef739549b5eb17ad4097a85e2dc3219a5f647fad1957b29d87e5e7dc7238ac5d
                                                            • Opcode Fuzzy Hash: e93c98e2e372f30bc0a2de6ad558986ce9f1a72cd8eb12668fcaabf52dfa9457
                                                            • Instruction Fuzzy Hash: 9F2137B1800259CFCB10CF9AD984BEEFBF4EF49320F14845AE459A3250D778A944CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9755b3880b5ac345036de142b5a22b05832bfdcb4791a32a9765c6cd5a40627d
                                                            • Instruction ID: 42889c9447f8cc6d4a6a331ae2f964e099f9840712d856dc5438248f06613893
                                                            • Opcode Fuzzy Hash: 9755b3880b5ac345036de142b5a22b05832bfdcb4791a32a9765c6cd5a40627d
                                                            • Instruction Fuzzy Hash: E5329D30E402098FEF94DB68D990BADBBB6EB89310F108529D505D7395DB38EC42DBA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2b2a11dbb4a3865a6f893c8a833f9335442273867b4c56b4a4875c7a78d4f3a1
                                                            • Instruction ID: c3ef36706750346ca3493ed25f4a41044520e4dd0124e2fe13bf4756ef512d64
                                                            • Opcode Fuzzy Hash: 2b2a11dbb4a3865a6f893c8a833f9335442273867b4c56b4a4875c7a78d4f3a1
                                                            • Instruction Fuzzy Hash: 8B226270E402098FDFA4DA68E5807AFBBF6EB89320F208925E405D7395DB35DC85DB61

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 526 609adb0-609adce 527 609add0-609add3 526->527 528 609add5-609ade2 527->528 529 609ade7-609adea 527->529 528->529 530 609ae0d-609ae10 529->530 531 609adec-609ae08 529->531 532 609ae20-609ae23 530->532 533 609ae12-609ae1b 530->533 531->530 536 609ae3d-609ae40 532->536 537 609ae25-609ae38 532->537 533->532 538 609ae5a-609ae5d 536->538 539 609ae42-609ae4b 536->539 537->536 544 609afcd-609afd6 538->544 545 609ae63-609ae66 538->545 542 609ae51-609ae55 539->542 543 609afe7-609aff1 539->543 542->538 555 609aff3-609aff5 543->555 556 609aff7-609aff9 543->556 544->539 546 609afdc-609afe6 544->546 547 609ae68-609ae6d 545->547 548 609ae70-609ae73 545->548 547->548 549 609ae75-609ae79 548->549 550 609ae84-609ae86 548->550 549->546 552 609ae7f 549->552 553 609ae88 550->553 554 609ae8d-609ae90 550->554 552->550 553->554 554->527 559 609ae96-609aeba 554->559 555->556 557 609affb-609affc 555->557 556->557 558 609afff-609b01e 556->558 557->558 560 609b020-609b023 558->560 572 609afca 559->572 573 609aec0-609aecf 559->573 561 609b030-609b033 560->561 562 609b025-609b02f 560->562 564 609b040-609b043 561->564 565 609b035-609b039 561->565 566 609b049-609b084 564->566 568 609b2ac-609b2af 564->568 565->566 567 609b03b 565->567 580 609b08a-609b096 566->580 581 609b277-609b28a 566->581 567->564 570 609b2be-609b2c1 568->570 571 609b2b1 call 609b30a 568->571 574 609b2c3-609b2df 570->574 575 609b2e4-609b2e6 570->575 577 609b2b7-609b2b9 571->577 572->544 585 609aed1-609aed7 573->585 586 609aee7-609af22 call 6096670 573->586 574->575 578 609b2e8 575->578 579 609b2ed-609b2f0 575->579 577->570 578->579 579->560 584 609b2f6-609b300 579->584 593 609b098-609b0b1 580->593 594 609b0b6-609b0fa 580->594 587 609b28c 581->587 589 609aed9 585->589 590 609aedb-609aedd 585->590 604 609af3a-609af51 586->604 605 609af24-609af2a 586->605 587->568 589->586 590->586 593->587 609 609b0fc-609b10e 594->609 610 609b116-609b155 594->610 615 609af69-609af7a 604->615 616 609af53-609af59 604->616 607 609af2c 605->607 608 609af2e-609af30 605->608 607->604 608->604 609->610 617 609b15b-609b236 call 6096670 610->617 618 609b23c-609b251 610->618 625 609af7c-609af82 615->625 626 609af92-609afc3 615->626 619 609af5b 616->619 620 609af5d-609af5f 616->620 617->618 618->581 619->615 620->615 628 609af84 625->628 629 609af86-609af88 625->629 626->572 628->626 629->626
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-1273862796
                                                            • Opcode ID: b6ad5030d5b0a92fc9f88f63dad4b7591213d43e679a3b71195dc0c654880be8
                                                            • Instruction ID: d206a0b185d6ac9d6bdaaf3d01d7a4da2a4be91d58a5feaf07f01b80d5df4490
                                                            • Opcode Fuzzy Hash: b6ad5030d5b0a92fc9f88f63dad4b7591213d43e679a3b71195dc0c654880be8
                                                            • Instruction Fuzzy Hash: 8FE15C30F402098FDFA8DBA8D5906AEBBF6EF85314F208529D4099B355EB35DC46CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 782 609b730-609b752 783 609b754-609b757 782->783 784 609b759-609b75d 783->784 785 609b77e-609b781 783->785 786 609bad3-609bb0e 784->786 787 609b763-609b773 784->787 788 609b783-609b79f 785->788 789 609b7a4-609b7a7 785->789 798 609bb10-609bb13 786->798 802 609b779 787->802 803 609b9cd-609b9d1 787->803 788->789 790 609b7a9-609b7ad 789->790 791 609b7be-609b7c1 789->791 790->786 794 609b7b3-609b7b9 790->794 795 609b8b3-609b8b4 791->795 796 609b7c7-609b7ca 791->796 794->791 801 609b8b9-609b8bc 795->801 799 609b7ec-609b7ef 796->799 800 609b7cc-609b7e7 796->800 805 609bb19-609bb41 798->805 806 609bd7f-609bd82 798->806 809 609b80c-609b80f 799->809 810 609b7f1-609b7fa 799->810 800->799 807 609b8c9-609b8cc 801->807 808 609b8be-609b8c4 801->808 802->785 803->786 811 609b9d7-609b9e7 803->811 871 609bb4b-609bb8f 805->871 872 609bb43-609bb46 805->872 815 609bda5-609bda7 806->815 816 609bd84-609bda0 806->816 818 609b90a-609b90d 807->818 819 609b8ce-609b8e3 807->819 808->807 813 609b81f-609b822 809->813 814 609b811-609b81a 809->814 810->786 812 609b800-609b807 810->812 829 609b9e9 811->829 830 609b9a3-609b9a7 811->830 812->809 821 609b824-609b881 call 6096670 813->821 822 609b886-609b889 813->822 814->813 826 609bda9 815->826 827 609bdae-609bdb1 815->827 816->815 823 609b90f-609b914 818->823 824 609b917-609b91a 818->824 819->786 838 609b8e9-609b905 819->838 821->822 831 609b88b-609b894 822->831 832 609b89f-609b8a2 822->832 823->824 834 609b959-609b95c 824->834 835 609b91c-609b931 824->835 826->827 827->798 836 609bdb7-609bdc0 827->836 839 609b9ee-609b9f1 829->839 830->786 844 609b9ad-609b9bd 830->844 831->810 840 609b89a 831->840 842 609b8a9-609b8ac 832->842 843 609b8a4-609b8a6 832->843 846 609b95e-609b961 834->846 847 609b966-609b969 834->847 835->786 862 609b937-609b954 835->862 838->818 850 609ba01-609ba04 839->850 851 609b9f3-609b9fc 839->851 840->832 842->795 854 609b8ae-609b8b1 842->854 843->842 844->795 870 609b9c3 844->870 846->847 848 609b97b-609b97e 847->848 849 609b96b 847->849 857 609ba19-609ba1c 848->857 858 609b984-609b987 848->858 865 609b973-609b976 849->865 859 609ba14-609ba17 850->859 860 609ba06-609ba0f 850->860 851->850 854->795 854->801 866 609b989-609b98c 857->866 869 609ba22 857->869 858->866 867 609b99e-609b9a1 858->867 859->857 868 609ba27-609ba2a 859->868 860->859 862->834 865->848 866->786 873 609b992-609b999 866->873 867->830 874 609b9c8-609b9cb 867->874 868->795 876 609ba30-609ba33 868->876 869->868 870->874 895 609bb95-609bb9e 871->895 896 609bd74-609bd7e 871->896 872->836 873->867 874->803 874->839 878 609ba35-609ba41 876->878 879 609ba46-609ba49 876->879 878->879 881 609ba4b-609ba4f 879->881 882 609ba60-609ba63 879->882 881->786 884 609ba55-609ba5b 881->884 886 609ba73-609ba76 882->886 887 609ba65-609ba6e 882->887 884->882 889 609ba78-609ba7b 886->889 890 609ba80-609ba83 886->890 887->886 889->890 890->831 893 609ba89-609ba8c 890->893 897 609ba9f-609baa2 893->897 898 609ba8e-609ba92 893->898 899 609bd6a-609bd6f 895->899 900 609bba4-609bc10 call 6096670 895->900 902 609baa4-609baab 897->902 903 609bab6-609bab8 897->903 898->786 901 609ba94-609ba9a 898->901 899->896 916 609bd0a-609bd1f 900->916 917 609bc16-609bc1b 900->917 901->897 902->814 905 609bab1 902->905 906 609baba 903->906 907 609babf-609bac2 903->907 905->903 906->907 907->783 908 609bac8-609bad2 907->908 916->899 918 609bc1d-609bc23 917->918 919 609bc37 917->919 921 609bc29-609bc2b 918->921 922 609bc25-609bc27 918->922 923 609bc39-609bc3f 919->923 924 609bc35 921->924 922->924 925 609bc41-609bc47 923->925 926 609bc54-609bc61 923->926 924->923 927 609bc4d 925->927 928 609bcf5-609bd04 925->928 933 609bc79-609bc86 926->933 934 609bc63-609bc69 926->934 927->926 929 609bc88-609bc95 927->929 930 609bcbc-609bcc9 927->930 928->916 928->917 942 609bcad-609bcba 929->942 943 609bc97-609bc9d 929->943 939 609bccb-609bcd1 930->939 940 609bce1-609bcee 930->940 933->928 937 609bc6b 934->937 938 609bc6d-609bc6f 934->938 937->933 938->933 944 609bcd3 939->944 945 609bcd5-609bcd7 939->945 940->928 942->928 946 609bc9f 943->946 947 609bca1-609bca3 943->947 944->940 945->940 946->942 947->942
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-3723351465
                                                            • Opcode ID: fca3e560cc52143d3c832304aab52294acce8f49c8c73410a0ad57295b97735c
                                                            • Instruction ID: 4d8081838a6bc2fda0ee896e0d5c01c8aa02b9ee805386dfdd36d2f4f972de63
                                                            • Opcode Fuzzy Hash: fca3e560cc52143d3c832304aab52294acce8f49c8c73410a0ad57295b97735c
                                                            • Instruction Fuzzy Hash: E9027E30E402098FDFA4CB68E5907AEBBF6EB85320F10892AD415DB355DB74EC45DBA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 950 6099220-6099245 951 6099247-609924a 950->951 952 609924c-609926b 951->952 953 6099270-6099273 951->953 952->953 954 6099279-609928e 953->954 955 6099b33-6099b35 953->955 961 6099290-6099296 954->961 962 60992a6-60992bc 954->962 957 6099b3c-6099b3f 955->957 958 6099b37 955->958 957->951 960 6099b45-6099b4f 957->960 958->957 964 6099298 961->964 965 609929a-609929c 961->965 967 60992c7-60992c9 962->967 964->962 965->962 968 60992cb-60992d1 967->968 969 60992e1-6099352 967->969 970 60992d3 968->970 971 60992d5-60992d7 968->971 980 609937e-609939a 969->980 981 6099354-6099377 969->981 970->969 971->969 986 609939c-60993bf 980->986 987 60993c6-60993e1 980->987 981->980 986->987 992 609940c-6099427 987->992 993 60993e3-6099405 987->993 998 6099429-609944b 992->998 999 6099452-609945c 992->999 993->992 998->999 1000 609946c-60994e6 999->1000 1001 609945e-6099467 999->1001 1007 60994e8-6099506 1000->1007 1008 6099533-6099548 1000->1008 1001->960 1012 6099508-6099517 1007->1012 1013 6099522-6099531 1007->1013 1008->955 1012->1013 1013->1007 1013->1008
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q
                                                            • API String ID: 0-858218434
                                                            • Opcode ID: c80b897900301286587ce0d0493c4679fd3994e9b27bb3a475333b70aec2941e
                                                            • Instruction ID: 8727fc717866eb3715fe3a1e66c7cea3e239f3f80a6444c90e2c17e809c7ca16
                                                            • Opcode Fuzzy Hash: c80b897900301286587ce0d0493c4679fd3994e9b27bb3a475333b70aec2941e
                                                            • Instruction Fuzzy Hash: 8A916030B4060A8FDF99DF65D850BAEB7F7BF84204F148569C809EB344EA349D469B92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1016 609d018-609d033 1018 609d035-609d038 1016->1018 1019 609d03a-609d07c 1018->1019 1020 609d081-609d084 1018->1020 1019->1020 1021 609d0cd-609d0d0 1020->1021 1022 609d086-609d0c8 1020->1022 1024 609d0da-609d0dd 1021->1024 1025 609d0d2-609d0d7 1021->1025 1022->1021 1027 609d0df-609d0fb 1024->1027 1028 609d100-609d103 1024->1028 1025->1024 1027->1028 1029 609d14c-609d14f 1028->1029 1030 609d105-609d147 1028->1030 1033 609d198-609d19b 1029->1033 1034 609d151-609d193 1029->1034 1030->1029 1038 609d1aa-609d1ad 1033->1038 1039 609d19d-609d19f 1033->1039 1034->1033 1045 609d1af-609d1f1 1038->1045 1046 609d1f6-609d1f9 1038->1046 1043 609d3bf-609d3c8 1039->1043 1044 609d1a5 1039->1044 1051 609d3ca-609d3cf 1043->1051 1052 609d3d7-609d3e3 1043->1052 1044->1038 1045->1046 1048 609d208-609d20b 1046->1048 1049 609d1fb-609d1fd 1046->1049 1057 609d20d-609d24f 1048->1057 1058 609d254-609d257 1048->1058 1055 609d501 1049->1055 1056 609d203 1049->1056 1051->1052 1059 609d3e9-609d3fd 1052->1059 1060 609d4f4-609d4f9 1052->1060 1062 609d504-609d510 1055->1062 1056->1048 1057->1058 1064 609d259-609d268 1058->1064 1065 609d2a0-609d2a3 1058->1065 1059->1055 1078 609d403-609d415 1059->1078 1060->1055 1068 609d2a5-609d2b4 1062->1068 1071 609d516-609d803 1062->1071 1074 609d26a-609d26f 1064->1074 1075 609d277-609d283 1064->1075 1067 609d2ec-609d2ef 1065->1067 1065->1068 1067->1062 1081 609d2f5-609d2f8 1067->1081 1079 609d2c3-609d2cf 1068->1079 1080 609d2b6-609d2bb 1068->1080 1231 609d809-609d80f 1071->1231 1232 609da2a-609da34 1071->1232 1074->1075 1083 609d289-609d29b 1075->1083 1084 609da35-609da4c 1075->1084 1099 609d439-609d43b 1078->1099 1100 609d417-609d41d 1078->1100 1079->1084 1089 609d2d5-609d2e7 1079->1089 1080->1079 1090 609d2fa-609d33c 1081->1090 1091 609d341-609d344 1081->1091 1083->1065 1106 609da4e 1084->1106 1107 609da51-609da6e 1084->1107 1089->1067 1090->1091 1094 609d38d-609d390 1091->1094 1095 609d346-609d388 1091->1095 1103 609d3ad-609d3af 1094->1103 1104 609d392-609d3a8 1094->1104 1095->1094 1116 609d445-609d451 1099->1116 1110 609d41f 1100->1110 1111 609d421-609d42d 1100->1111 1113 609d3b1 1103->1113 1114 609d3b6-609d3b9 1103->1114 1104->1103 1106->1107 1115 609da70-609da73 1107->1115 1118 609d42f-609d437 1110->1118 1111->1118 1113->1114 1114->1018 1114->1043 1122 609da75-609da91 1115->1122 1123 609da96-609da99 1115->1123 1134 609d45f 1116->1134 1135 609d453-609d45d 1116->1135 1118->1116 1122->1123 1128 609daa8-609daab 1123->1128 1129 609da9b call 609db8d 1123->1129 1130 609daad-609dad9 1128->1130 1131 609dade-609dae0 1128->1131 1140 609daa1-609daa3 1129->1140 1130->1131 1141 609dae2 1131->1141 1142 609dae7-609daea 1131->1142 1144 609d464-609d466 1134->1144 1135->1144 1140->1128 1141->1142 1142->1115 1146 609daec-609dafb 1142->1146 1144->1055 1147 609d46c-609d488 call 6096670 1144->1147 1155 609dafd-609db60 call 6096670 1146->1155 1156 609db62-609db77 1146->1156 1163 609d48a-609d48f 1147->1163 1164 609d497-609d4a3 1147->1164 1155->1156 1163->1164 1164->1060 1167 609d4a5-609d4f2 1164->1167 1167->1055 1233 609d81e-609d827 1231->1233 1234 609d811-609d816 1231->1234 1233->1084 1235 609d82d-609d840 1233->1235 1234->1233 1237 609da1a-609da24 1235->1237 1238 609d846-609d84c 1235->1238 1237->1231 1237->1232 1239 609d85b-609d864 1238->1239 1240 609d84e-609d853 1238->1240 1239->1084 1241 609d86a-609d88b 1239->1241 1240->1239 1244 609d89a-609d8a3 1241->1244 1245 609d88d-609d892 1241->1245 1244->1084 1246 609d8a9-609d8c6 1244->1246 1245->1244 1246->1237 1249 609d8cc-609d8d2 1246->1249 1249->1084 1250 609d8d8-609d8f1 1249->1250 1252 609da0d-609da14 1250->1252 1253 609d8f7-609d91e 1250->1253 1252->1237 1252->1249 1253->1084 1256 609d924-609d92e 1253->1256 1256->1084 1257 609d934-609d94b 1256->1257 1259 609d95a-609d975 1257->1259 1260 609d94d-609d958 1257->1260 1259->1252 1265 609d97b-609d994 call 6096670 1259->1265 1260->1259 1269 609d9a3-609d9ac 1265->1269 1270 609d996-609d99b 1265->1270 1269->1084 1271 609d9b2-609da06 1269->1271 1270->1269 1271->1252
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q
                                                            • API String ID: 0-182748909
                                                            • Opcode ID: 199fe2fde2502244955649c11c8c836762e62633472ef8abb87c5cbf3b000628
                                                            • Instruction ID: 927414f20368e1a0c7bcdba26a0e2db3743a9802cd26be08e289a06409cd8ee3
                                                            • Opcode Fuzzy Hash: 199fe2fde2502244955649c11c8c836762e62633472ef8abb87c5cbf3b000628
                                                            • Instruction Fuzzy Hash: F0625C30A406098FCB59EF68E590E5DB7F6FF85304B20CA28D0159B269EB75EC46CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1279 6094840-6094864 1280 6094866-6094869 1279->1280 1281 609486b-6094885 1280->1281 1282 609488a-609488d 1280->1282 1281->1282 1283 6094f6c-6094f6e 1282->1283 1284 6094893-609498b 1282->1284 1285 6094f70 1283->1285 1286 6094f75-6094f78 1283->1286 1302 6094a0e-6094a15 1284->1302 1303 6094991-60949de call 60950e8 1284->1303 1285->1286 1286->1280 1288 6094f7e-6094f8b 1286->1288 1304 6094a99-6094aa2 1302->1304 1305 6094a1b-6094a8b 1302->1305 1316 60949e4-6094a00 1303->1316 1304->1288 1322 6094a8d 1305->1322 1323 6094a96 1305->1323 1320 6094a0b-6094a0c 1316->1320 1321 6094a02 1316->1321 1320->1302 1321->1320 1322->1323 1323->1304
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: fbq$XPbq$\Obq
                                                            • API String ID: 0-4057264190
                                                            • Opcode ID: 15f4d066f6fa40e4cf859e777e3af99447752a89f95fe61748c1cf68825f0858
                                                            • Instruction ID: 4c64065b8b5563f795beacbd9b93e4649bd88fbe4b6d5dc730eb16042c414c5a
                                                            • Opcode Fuzzy Hash: 15f4d066f6fa40e4cf859e777e3af99447752a89f95fe61748c1cf68825f0858
                                                            • Instruction Fuzzy Hash: 96616030F402099FEF549FA5C854BAEBBF6FB88300F208529E505EB395DB758D429B91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2093 6099211-609921c 2094 609922d-6099245 2093->2094 2095 609921e-609922c 2093->2095 2096 6099247-609924a 2094->2096 2095->2094 2097 609924c-609926b 2096->2097 2098 6099270-6099273 2096->2098 2097->2098 2099 6099279-609928e 2098->2099 2100 6099b33-6099b35 2098->2100 2106 6099290-6099296 2099->2106 2107 60992a6-60992bc 2099->2107 2102 6099b3c-6099b3f 2100->2102 2103 6099b37 2100->2103 2102->2096 2105 6099b45-6099b4f 2102->2105 2103->2102 2109 6099298 2106->2109 2110 609929a-609929c 2106->2110 2112 60992c7-60992c9 2107->2112 2109->2107 2110->2107 2113 60992cb-60992d1 2112->2113 2114 60992e1-6099352 2112->2114 2115 60992d3 2113->2115 2116 60992d5-60992d7 2113->2116 2125 609937e-609939a 2114->2125 2126 6099354-6099377 2114->2126 2115->2114 2116->2114 2131 609939c-60993bf 2125->2131 2132 60993c6-60993e1 2125->2132 2126->2125 2131->2132 2137 609940c-6099427 2132->2137 2138 60993e3-6099405 2132->2138 2143 6099429-609944b 2137->2143 2144 6099452-609945c 2137->2144 2138->2137 2143->2144 2145 609946c-60994e6 2144->2145 2146 609945e-6099467 2144->2146 2152 60994e8-6099506 2145->2152 2153 6099533-6099548 2145->2153 2146->2105 2157 6099508-6099517 2152->2157 2158 6099522-6099531 2152->2158 2153->2100 2157->2158 2158->2152 2158->2153
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q
                                                            • API String ID: 0-127220927
                                                            • Opcode ID: 4a51a4ed6ac1e7f4a8c65d43b59046b1b392eb9b95b8686a7fa5c2347fe4883c
                                                            • Instruction ID: 0c81e3c3e53c6cf4c0e51bc280950c764621e4975b1ba5dc304492234fa26d67
                                                            • Opcode Fuzzy Hash: 4a51a4ed6ac1e7f4a8c65d43b59046b1b392eb9b95b8686a7fa5c2347fe4883c
                                                            • Instruction Fuzzy Hash: 6F518030B401068FDF99DB78D890B6E77F7BBC8204F148469C40ADB399EA359D469B92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2161 6094831-6094864 2162 6094866-6094869 2161->2162 2163 609486b-6094885 2162->2163 2164 609488a-609488d 2162->2164 2163->2164 2165 6094f6c-6094f6e 2164->2165 2166 6094893-609498b 2164->2166 2167 6094f70 2165->2167 2168 6094f75-6094f78 2165->2168 2184 6094a0e-6094a15 2166->2184 2185 6094991-60949de call 60950e8 2166->2185 2167->2168 2168->2162 2170 6094f7e-6094f8b 2168->2170 2186 6094a99-6094aa2 2184->2186 2187 6094a1b-6094a8b 2184->2187 2198 60949e4-6094a00 2185->2198 2186->2170 2204 6094a8d 2187->2204 2205 6094a96 2187->2205 2202 6094a0b-6094a0c 2198->2202 2203 6094a02 2198->2203 2202->2184 2203->2202 2204->2205 2205->2186
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: fbq$XPbq
                                                            • API String ID: 0-2292610095
                                                            • Opcode ID: 8c9884a031ba8bb7336390da9c9081b1df300ff3e60a11acf2431cea3996050a
                                                            • Instruction ID: 68c16897700e3db30371453b562caf30a197917712ccc2463bec8156e1815f6f
                                                            • Opcode Fuzzy Hash: 8c9884a031ba8bb7336390da9c9081b1df300ff3e60a11acf2431cea3996050a
                                                            • Instruction Fuzzy Hash: D4514E30F002099FEB589FB4C454BAEBBF6FF88700F208529D505AB395DA758D029B91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2604 53abf18-53abf37 2606 53abf39-53abf46 call 53aae8c 2604->2606 2607 53abf63-53abf67 2604->2607 2612 53abf48 2606->2612 2613 53abf5c 2606->2613 2608 53abf7b-53abfbc 2607->2608 2609 53abf69-53abf73 2607->2609 2616 53abfc9-53abfd7 2608->2616 2617 53abfbe-53abfc6 2608->2617 2609->2608 2660 53abf4e call 53ac1bf 2612->2660 2661 53abf4e call 53ac1c0 2612->2661 2613->2607 2619 53abffb-53abffd 2616->2619 2620 53abfd9-53abfde 2616->2620 2617->2616 2618 53abf54-53abf56 2618->2613 2621 53ac098-53ac158 2618->2621 2622 53ac000-53ac007 2619->2622 2623 53abfe9 2620->2623 2624 53abfe0-53abfe7 call 53aae98 2620->2624 2655 53ac15a-53ac15d 2621->2655 2656 53ac160-53ac18b GetModuleHandleW 2621->2656 2627 53ac009-53ac011 2622->2627 2628 53ac014-53ac01b 2622->2628 2626 53abfeb-53abff9 2623->2626 2624->2626 2626->2622 2627->2628 2630 53ac028-53ac031 call 53a456c 2628->2630 2631 53ac01d-53ac025 2628->2631 2636 53ac03e-53ac043 2630->2636 2637 53ac033-53ac03b 2630->2637 2631->2630 2638 53ac061-53ac06e 2636->2638 2639 53ac045-53ac04c 2636->2639 2637->2636 2646 53ac070-53ac08e 2638->2646 2647 53ac091-53ac097 2638->2647 2639->2638 2641 53ac04e-53ac05e call 53a8e04 call 53aaea8 2639->2641 2641->2638 2646->2647 2655->2656 2657 53ac18d-53ac193 2656->2657 2658 53ac194-53ac1a8 2656->2658 2657->2658 2660->2618 2661->2618
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 053AC17E
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4524311151.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_53a0000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 3b39dd28108a64298f78ac30eff9889d723197f3b4fe3ffd6b87d4025002c8a2
                                                            • Instruction ID: 2116653316f79fffc46b99322a6567fbb19aa618a92d4afe903ada1cea6bde7f
                                                            • Opcode Fuzzy Hash: 3b39dd28108a64298f78ac30eff9889d723197f3b4fe3ffd6b87d4025002c8a2
                                                            • Instruction Fuzzy Hash: 14812371A00B458FD724DF29D454B6ABBF2FF88304F048A2DE48AD7A50DB75E949CB90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4514338000.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_c70000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 176ec36bdf1202d0bcc0ded353d67ac3d0bb7536263fb3ae927f6a1e4a5851ec
                                                            • Instruction ID: 7f390275347321dba000d7464f2bbf2e80abd26fda64fd36ec1994278201cad0
                                                            • Opcode Fuzzy Hash: 176ec36bdf1202d0bcc0ded353d67ac3d0bb7536263fb3ae927f6a1e4a5851ec
                                                            • Instruction Fuzzy Hash: 5E412072E043868FCB14CFA9D4542AEBFB1EF89310F1585AAD458A7251DB389842CB90
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 053AE222
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4524311151.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_53a0000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: e48b8acf4a1312f4798c8a3fe926e09f3079d7e9ce2fe6ed5aeebe765fb1a311
                                                            • Instruction ID: e8cd6bd6b61e5218aef47c2c0b894df0bbc6f3c78ad8c041dfee32af754c75ae
                                                            • Opcode Fuzzy Hash: e48b8acf4a1312f4798c8a3fe926e09f3079d7e9ce2fe6ed5aeebe765fb1a311
                                                            • Instruction Fuzzy Hash: D551CFB1D003499FDB14CF99C884ADEBBB5FF48310F24852AE819AB210D775A885CF90
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 053AE222
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4524311151.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_53a0000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: 945a961bd4dea1d13b010ca0e3ab6e00ac2985b224e7a2f1c3afe52bfe2ac5cc
                                                            • Instruction ID: 63079b5cc188d6c892819edb9f06043f343977b6ff9208de202054bce217d4e9
                                                            • Opcode Fuzzy Hash: 945a961bd4dea1d13b010ca0e3ab6e00ac2985b224e7a2f1c3afe52bfe2ac5cc
                                                            • Instruction Fuzzy Hash: EF41B1B1D00349DFDB14CF99C884ADEBBB5FF48310F24852AE419AB210D775A845CF90
                                                            APIs
                                                            • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 00C770E7
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4514338000.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_c70000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID: CheckDebuggerPresentRemote
                                                            • String ID:
                                                            • API String ID: 3662101638-0
                                                            • Opcode ID: deffd358eae4ce41d77b461d15c8fdc4a615c37a2bca233a5d25b0b5158b1b3f
                                                            • Instruction ID: 818dfb57ec82be862a13ea91165a2c01871ee45b6980084675ca51c96d428b86
                                                            • Opcode Fuzzy Hash: deffd358eae4ce41d77b461d15c8fdc4a615c37a2bca233a5d25b0b5158b1b3f
                                                            • Instruction Fuzzy Hash: D92125B18052598FCB10CFAAD984BEEFBF4AF49310F14845AE459A3250C778A944CFA1
                                                            APIs
                                                            • GlobalMemoryStatusEx.KERNEL32 ref: 00C7F2AF
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4514338000.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_c70000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID: GlobalMemoryStatus
                                                            • String ID:
                                                            • API String ID: 1890195054-0
                                                            • Opcode ID: 74670c9b158141f5d37ec746d5638541b1804b2df0cde296867eef740db2029f
                                                            • Instruction ID: 1a758a0b238a7b666eeb5ae0346dd6f6fe5aad728446df3cfda1ce3a3cc343e6
                                                            • Opcode Fuzzy Hash: 74670c9b158141f5d37ec746d5638541b1804b2df0cde296867eef740db2029f
                                                            • Instruction Fuzzy Hash: 3711E2B5C0065A9BCB10DF9AC544BAEFBB4EF48720F15816AD818B7240D778A944CFE5
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 053AC17E
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4524311151.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_53a0000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 9cdd481582d32b548a1cac7977a3db32b7d85638becc9dbf10d7592f52c4343e
                                                            • Instruction ID: 380fc97e25df848f9d03deb7e2f8236a8cff09443aac2a05c03813194347467b
                                                            • Opcode Fuzzy Hash: 9cdd481582d32b548a1cac7977a3db32b7d85638becc9dbf10d7592f52c4343e
                                                            • Instruction Fuzzy Hash: 8311DFB6D046498FCB10CF9AD844A9EFBF4EB88624F14841AD419A7210C3B9A545CFA5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH]q
                                                            • API String ID: 0-3168235125
                                                            • Opcode ID: 0c4d42a67dda52961640cb7a85391945a25b29ff630808390a07ef699ac6e469
                                                            • Instruction ID: c336b8bdafb2fcdb36f6d52df503e8cc216ff3e978fef74e57aa4ab492c6ed8e
                                                            • Opcode Fuzzy Hash: 0c4d42a67dda52961640cb7a85391945a25b29ff630808390a07ef699ac6e469
                                                            • Instruction Fuzzy Hash: 8941C270E9460A9FDF549F64D89069EBFF3FF85300F104929D401DB280EBB49946DBA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH]q
                                                            • API String ID: 0-3168235125
                                                            • Opcode ID: 4f688e2aefef5c6d4025b4b8a0a6c0aae523f986873229565a2305062651131b
                                                            • Instruction ID: 0c073964c814b1db5d12cb4b0218889f3bc3860df80fec09938602089d1dfcb7
                                                            • Opcode Fuzzy Hash: 4f688e2aefef5c6d4025b4b8a0a6c0aae523f986873229565a2305062651131b
                                                            • Instruction Fuzzy Hash: AA310030B24205AFDF499B34C56466E7BE7AF85200F108878D402DB395DE38CE46DBA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH]q
                                                            • API String ID: 0-3168235125
                                                            • Opcode ID: 94cd6bf1b134fc01edb74ce741492393868a49aebfbe083ced6e7586b33eb48c
                                                            • Instruction ID: f3e9ce9e376cceaa884ba234335a0bfe96f1b4087a33027a449762b595b63c01
                                                            • Opcode Fuzzy Hash: 94cd6bf1b134fc01edb74ce741492393868a49aebfbe083ced6e7586b33eb48c
                                                            • Instruction Fuzzy Hash: CA311030B20205AFDF889B74C55066F7BE7AF88200B108428D406DB384DE38CE46DBA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: |
                                                            • API String ID: 0-2343686810
                                                            • Opcode ID: 64b48335734c57463a3f74ba54bc3ea57f0988ecbf504daa6ca90d4755972c03
                                                            • Instruction ID: b13d8ba39ddb5feeeb4235ef325a07f6e4eaa9afbf1aecc3d3320e395e549ab0
                                                            • Opcode Fuzzy Hash: 64b48335734c57463a3f74ba54bc3ea57f0988ecbf504daa6ca90d4755972c03
                                                            • Instruction Fuzzy Hash: 0011DC71B40251CFDB549B788814BAD7BF2EF4C704F1485A9E55ADB3A0EB799D02CB40
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: |
                                                            • API String ID: 0-2343686810
                                                            • Opcode ID: be01825b12638a36a1000ff726fcaae8b245b463e6c7c27e4fd3abe9fb221fd5
                                                            • Instruction ID: 52cf1ef1d3e453cfccd6a20580a798c8be89277752a1876a2915d192b0ba8ff9
                                                            • Opcode Fuzzy Hash: be01825b12638a36a1000ff726fcaae8b245b463e6c7c27e4fd3abe9fb221fd5
                                                            • Instruction Fuzzy Hash: 69114C70F402159FDB449B789814B6D7BF5AF4C604F108469E50AD73A0EA759D01DB90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: \Obq
                                                            • API String ID: 0-2878401908
                                                            • Opcode ID: e63dbd5938165f91c25d4ce56dbb7b97ce48cfcf784722c77efa06a6f41012a4
                                                            • Instruction ID: 05a25bcc8c689928a43ebc8790a912cc69a3d2a2b74066551e6ef45d185ece34
                                                            • Opcode Fuzzy Hash: e63dbd5938165f91c25d4ce56dbb7b97ce48cfcf784722c77efa06a6f41012a4
                                                            • Instruction Fuzzy Hash: 31F0DA30A60119EFDB54DF94E859BAEBBB6FF88705F204119E402A7294CBB41D42DB90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 34ff021f79a368ab22cd2979eb1ac759cf5884b8f7527fe670ed309e4a6c3e21
                                                            • Instruction ID: ebf31586d246e6728c9720d6ebc8dc7a274b1cc0d0a102bdcbf9b40187384b12
                                                            • Opcode Fuzzy Hash: 34ff021f79a368ab22cd2979eb1ac759cf5884b8f7527fe670ed309e4a6c3e21
                                                            • Instruction Fuzzy Hash: C7927634A102049FDBA8DB68C584A9DBBF3FB49314F5484A9D409EB361DB35ED85CFA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2cb6129759252803a803015b2693d190d1a6ff6900729c62777da2c45657fdae
                                                            • Instruction ID: 79fddc04314862440ef730e9b312df1cf283ff618503879325fa755524547f5f
                                                            • Opcode Fuzzy Hash: 2cb6129759252803a803015b2693d190d1a6ff6900729c62777da2c45657fdae
                                                            • Instruction Fuzzy Hash: 8C028A31A102048FDF98DB68D954BADBBF3EB85314F148469E41A9B351DB36EC46CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4c84524df1103776978c2d059666b907f226f399bc11abcff3326f01b2882c08
                                                            • Instruction ID: 3a0d825121996275979e1daeb1a06eebbce19f8d87bebf68c29b2b443818d83b
                                                            • Opcode Fuzzy Hash: 4c84524df1103776978c2d059666b907f226f399bc11abcff3326f01b2882c08
                                                            • Instruction Fuzzy Hash: CC61D071F400114FDF559A6ACC9066FBADBAFD4224F144039E80EDB360EE6ADD0287E1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 00402cdb6f26a1a73802594bce3b5bbe583e77eb47eb750dd188addbabb5c8ac
                                                            • Instruction ID: 013f62091b7bc52d449bc1c39e0af0042c91683cf8d6fe52729b109efea08759
                                                            • Opcode Fuzzy Hash: 00402cdb6f26a1a73802594bce3b5bbe583e77eb47eb750dd188addbabb5c8ac
                                                            • Instruction Fuzzy Hash: D1814D30B4060A8BDF98DFB4D45479EBBF7AB89304F108529D40ADB398EB75DC468B91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ccfb82959e25eeb17455eb570662fa8261ac009b688da9ec274b562ab5c18b65
                                                            • Instruction ID: 71524941a24893ffd2dd0e46d9008429a23aae45bdec0ab143cebd980512d5d3
                                                            • Opcode Fuzzy Hash: ccfb82959e25eeb17455eb570662fa8261ac009b688da9ec274b562ab5c18b65
                                                            • Instruction Fuzzy Hash: 7A912D30E102198FDF64DF68C890B9DBBB1FF89304F208599D54DAB255DB70AA86CF51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d4db3d5778276e45256e61e7a3dce98f82a2ffd7cffc22eb634fc26adf6ff2a5
                                                            • Instruction ID: f8798c65377f5e71c9b32849b9b36d98cc9da88f39fe29d5753cf5185cbee315
                                                            • Opcode Fuzzy Hash: d4db3d5778276e45256e61e7a3dce98f82a2ffd7cffc22eb634fc26adf6ff2a5
                                                            • Instruction Fuzzy Hash: 3B912E30E102198BDF64DF68C890B9DB7B1FF89304F208599D54DAB255DB70AA86CF51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f847b4a29ad7b4526f345305687d08ef28e94c8846a82526f77bbc52359e92e6
                                                            • Instruction ID: d64ca001c76081495caf08f35b6d14d680bcde88ec225de5e824b49d0f6fb071
                                                            • Opcode Fuzzy Hash: f847b4a29ad7b4526f345305687d08ef28e94c8846a82526f77bbc52359e92e6
                                                            • Instruction Fuzzy Hash: 87714B70A402099FDB54DFA8D990A9DBBF6FF88304F24C529E459AB355DB30EC46CB50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e7d41de0dfee0be6a550166fc242711872d6b6a6b12aa02631d5a228fc35770e
                                                            • Instruction ID: 904ea1014f4a12157c6d309377f7233f91ef383fc5085233cde41dea2e791b80
                                                            • Opcode Fuzzy Hash: e7d41de0dfee0be6a550166fc242711872d6b6a6b12aa02631d5a228fc35770e
                                                            • Instruction Fuzzy Hash: FC712A70A002099FDB54DFA8D990A9DBBF6FF88304F14C529E419AB355DB30ED46CB60
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d7fd251e547ebfdbe8a916d7cdcde593c68f7bf07380fab8a09bc202b465887f
                                                            • Instruction ID: af42e47d2eb04770e05b0c7145370350c87d7f6fcf18525550731184666ef953
                                                            • Opcode Fuzzy Hash: d7fd251e547ebfdbe8a916d7cdcde593c68f7bf07380fab8a09bc202b465887f
                                                            • Instruction Fuzzy Hash: BA51F031E41106CFDF54AFB8E4546ADBBB3FB84315F208829E10AD7361EB358855DB91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8aaf2c15075d0c51af1f47e5508107ef758f44b5c11c6e910ea10c64955fe5ff
                                                            • Instruction ID: b50b0cea709783919b576b5dcf60df54de478a78c61755f9c4cfc10833a5746d
                                                            • Opcode Fuzzy Hash: 8aaf2c15075d0c51af1f47e5508107ef758f44b5c11c6e910ea10c64955fe5ff
                                                            • Instruction Fuzzy Hash: CA510A70B502055FEFE4566CD854B6F2FAFDB89300F20482AE50AC73A5DA6CCC05D3A2
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f6899fa803b581a703779ebc37dc1feaa37acc366eafad864b01798f86d4c28e
                                                            • Instruction ID: f6d3f4f2414660de4c0fb88ed223f97702db7ca6ece5e706efa7e37330ceef3e
                                                            • Opcode Fuzzy Hash: f6899fa803b581a703779ebc37dc1feaa37acc366eafad864b01798f86d4c28e
                                                            • Instruction Fuzzy Hash: 2751FB70B502055FEFE4566CE954B2F6AAFDB89314F204829E50EC33A5DE6CCC45D3A2
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6cee98127a000503d8083ff3b5dee61bb98cf70e4109c5690d40bd5dd9bc4b84
                                                            • Instruction ID: 4d925e6a91e6ad6aa131a580ffb39e9c75a14bdd3a8bbc84641b8389be20087c
                                                            • Opcode Fuzzy Hash: 6cee98127a000503d8083ff3b5dee61bb98cf70e4109c5690d40bd5dd9bc4b84
                                                            • Instruction Fuzzy Hash: 99416D71E406098FDFB2CFAADC806AEFBF2FB95310F10492AD255D7250D730A8459BA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cd3228e746051fb5edf020604b34d12ef0b91eb452290d9c33f3ffc5cc50a644
                                                            • Instruction ID: 04d6ee4b79d0357bf976f5c220a45727fa428fcddbea6c341721f6eb7299d0d8
                                                            • Opcode Fuzzy Hash: cd3228e746051fb5edf020604b34d12ef0b91eb452290d9c33f3ffc5cc50a644
                                                            • Instruction Fuzzy Hash: 81317E34E24205ABDF59DFA4D49469EBBF2EF89300F10C929E816E7350DB70AD46CB50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: aae7d68621ea223495b389ec85c4a5567bd1cfb82b88e2a6e37b85cc6d3d9f12
                                                            • Instruction ID: ea1ff84a2f70a4ff7eec3748a29b1fa8c16f5ec0fe4926a6d09590dc8b364bba
                                                            • Opcode Fuzzy Hash: aae7d68621ea223495b389ec85c4a5567bd1cfb82b88e2a6e37b85cc6d3d9f12
                                                            • Instruction Fuzzy Hash: 51314D34E20205ABDF59DFA4D854A9EBBF2EF89300F10C529E816E7350DB71AD46CB50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e135ec6b5a8e72bb1b83569666f2a789ca7d5cdaf645dac71d6fb5c2f15c5767
                                                            • Instruction ID: dde1fc4610363c47be93226566937325cbc8721ed705ef91e121f4bc3427e394
                                                            • Opcode Fuzzy Hash: e135ec6b5a8e72bb1b83569666f2a789ca7d5cdaf645dac71d6fb5c2f15c5767
                                                            • Instruction Fuzzy Hash: E2219F71F01A159FDB88DF78D880AEEBBF5EB48710F108065E905E7351E739D9428BA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b801b1be6b8206ea9b885f7c4f9410e63638e4fcd552ece7d99bfd9c8cd6a986
                                                            • Instruction ID: 2fefcc1efcc87d635772f80dd7d18e79a4028d5080d8ef9d45dcb56732e29974
                                                            • Opcode Fuzzy Hash: b801b1be6b8206ea9b885f7c4f9410e63638e4fcd552ece7d99bfd9c8cd6a986
                                                            • Instruction Fuzzy Hash: 3C21BA71E01A159FDF88DF78D880AAEBBF6AB88310F108029E905E7350E735D9018FA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 246bd49206a2dbeddb2c170fa615f93edb46abddbe619d72e14df049b0f636a6
                                                            • Instruction ID: ad3cf39df052783645738ab30c12b910f38eb2a7b99dd05bddbff1f79bbe92b5
                                                            • Opcode Fuzzy Hash: 246bd49206a2dbeddb2c170fa615f93edb46abddbe619d72e14df049b0f636a6
                                                            • Instruction Fuzzy Hash: 4821AE31B600099FDF88DA68E9507ADBBF7EB85314F108425D409EB344EA359D42CB90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4512941636.000000000095D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0095D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_95d000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5e13d0e657024fc09e9be6e6009d2d3cea43ef78b59d24c1c0f1e126d27a2820
                                                            • Instruction ID: b38a881e8946dd16b951c25531e1bc0fb1119f4159b2a68191455d37fc0746a3
                                                            • Opcode Fuzzy Hash: 5e13d0e657024fc09e9be6e6009d2d3cea43ef78b59d24c1c0f1e126d27a2820
                                                            • Instruction Fuzzy Hash: 8521F271604244DFDB24DF24D9C4B26BF69EB84315F24C969DD094B396C33AD84BCB62
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 97f975fe6384b1336ccbb6d6ae8caafb74bc8c4a51084141e099195198880354
                                                            • Instruction ID: 75d7ed947fa8e1e25480f1a2176011cc39ce5863335f4bc5ac7b5d9e6961f9cf
                                                            • Opcode Fuzzy Hash: 97f975fe6384b1336ccbb6d6ae8caafb74bc8c4a51084141e099195198880354
                                                            • Instruction Fuzzy Hash: F321A231B200189FDF88DA69E950BAEBBF7EB85314F148435E409E7345EB31EC418B91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c137ea2943100b09319d07b563c48970bacf71b2bef088a8fff2875a45ce434b
                                                            • Instruction ID: 32e0ded855e017a7658210f440a03cab4988bcec002b13f413f3ccd87cc96ea1
                                                            • Opcode Fuzzy Hash: c137ea2943100b09319d07b563c48970bacf71b2bef088a8fff2875a45ce434b
                                                            • Instruction Fuzzy Hash: 771126307011414FDF9A967CD898B5A3FE6DBCB214F118179F04AC7365DE28CE0297A2
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4512941636.000000000095D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0095D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_95d000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 57052c4eadc49fd1bfc7e219d973ef4e947d22164b945cc4d7b7361886973b42
                                                            • Instruction ID: 14044c7c8c6e9e2760fc37853861e4a725257bd62d6231203cf380a503fd3a90
                                                            • Opcode Fuzzy Hash: 57052c4eadc49fd1bfc7e219d973ef4e947d22164b945cc4d7b7361886973b42
                                                            • Instruction Fuzzy Hash: D121A1755093C08FDB12CF20D994B15BF71EB46314F28C5EAD8498B6A7C33A980ACB62
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 96b985c61ab27a49897608c3d69a1f0edf274f615a9e3583a75352c912115b9c
                                                            • Instruction ID: 9094802156e773e3828f4e12edbf02ec4e51a96539d6717103929741c89d6a22
                                                            • Opcode Fuzzy Hash: 96b985c61ab27a49897608c3d69a1f0edf274f615a9e3583a75352c912115b9c
                                                            • Instruction Fuzzy Hash: 45118E32B505245BDF999678D8286AEB7EBEBC8610F004539C40AE7344DE29DC069BE1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 32b5a628b7e94e6a6d38a66837aad7109b677ff9bda9582a73ac81ea2287490b
                                                            • Instruction ID: c4caf62b7c409e7265401e935d6268d8b17a55d61c9af02a41c79f52ef3b2584
                                                            • Opcode Fuzzy Hash: 32b5a628b7e94e6a6d38a66837aad7109b677ff9bda9582a73ac81ea2287490b
                                                            • Instruction Fuzzy Hash: 4801F531B441010BDFA99A7C946071AABEBCBCA724F11843AE00ECB341ED25CC0347A1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8332bb120d3a818825034f974a5059334455cbb8b94beb6fd7b0415b65c6a658
                                                            • Instruction ID: 4388d787f7bc32a77b86f54c1d70413a2e91e957fefb1d513f54a246d10fa692
                                                            • Opcode Fuzzy Hash: 8332bb120d3a818825034f974a5059334455cbb8b94beb6fd7b0415b65c6a658
                                                            • Instruction Fuzzy Hash: 06017135B401101BDBA5D678D865B6F6BE7DBCA624F24883EE40AC7351E925CC074391
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3b58d698d991c805a340b981931a76abb3f57043f0ad2c79a0b13aaf067f41cc
                                                            • Instruction ID: 444c10c7a0c6a078398736f45f61fc9676579b07d7c4768b7674d304f7d021a0
                                                            • Opcode Fuzzy Hash: 3b58d698d991c805a340b981931a76abb3f57043f0ad2c79a0b13aaf067f41cc
                                                            • Instruction Fuzzy Hash: 951180A1C1D3D55FDB428B3888A85943F75EF13204F1A04DBC0C5CF1A3E96A891BD366
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 086a00db0cc43ff73eb1afb38bb8e180ef622278f54fcb912ac647732889a084
                                                            • Instruction ID: ec5c535a74ef9396e9a6b771c11d4ebff68cfd07d5e72d2bf5bb69c7b33e2212
                                                            • Opcode Fuzzy Hash: 086a00db0cc43ff73eb1afb38bb8e180ef622278f54fcb912ac647732889a084
                                                            • Instruction Fuzzy Hash: 4311CFB5D01259AFCB00CF9AD884ADEFFB4FB49314F10812AE918A7200C778A944CFA5
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ce3dc2f9540826922ab594a7bdd1dfd6a1ccc978b7c114ffd01df3e18e2c9c6c
                                                            • Instruction ID: badfd9152ededb6916b619590d8fc3d9e32dfe6037e21c22a47042f253588cd1
                                                            • Opcode Fuzzy Hash: ce3dc2f9540826922ab594a7bdd1dfd6a1ccc978b7c114ffd01df3e18e2c9c6c
                                                            • Instruction Fuzzy Hash: 36016D31B401160BEFA8996DD464B2FA7EBCBC9B28F218439F10EC7354EE65DC0247A1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c681af73817592efaa698182edfcca1b08082ed5c930254080213c91bbbf7d3d
                                                            • Instruction ID: 2053330fa9ed762f0e301ba8a46dc86f764be8b7eacbf21030a695ea03833132
                                                            • Opcode Fuzzy Hash: c681af73817592efaa698182edfcca1b08082ed5c930254080213c91bbbf7d3d
                                                            • Instruction Fuzzy Hash: 4B21CCB5D00259DFCB00CF9AD984ADEFBB5FB48314F10812AE918A7240C778A954CFA4
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 64702ade5f5492ac613034006abdcc4eb3a2c7d30f9996f82edbac583a9c8f64
                                                            • Instruction ID: 734a5786754dc5f1c88d785d487a41af13580013271de4fde3dc6c3b85a99bb5
                                                            • Opcode Fuzzy Hash: 64702ade5f5492ac613034006abdcc4eb3a2c7d30f9996f82edbac583a9c8f64
                                                            • Instruction Fuzzy Hash: 9F018C35B000104BDFA5DA7DD854B2E7BEBDBCA624F20883DE50AC7350EA26DC0383A1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 50c8a9fc7232f4394915892cf2902f191efb473a8b2e67bb9da049e633bf2dab
                                                            • Instruction ID: ebebd4d9c37f9a1cc5cf96be8037f14600b2cf9ae0ce28ecc82fa27932eeacbd
                                                            • Opcode Fuzzy Hash: 50c8a9fc7232f4394915892cf2902f191efb473a8b2e67bb9da049e633bf2dab
                                                            • Instruction Fuzzy Hash: B4018F32B504255BDF989668DC146AEA7EBABC8610F144139C00AE7384DA658C078B91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8bc91d6e66051c7738705e6f9efb06d81346a7357644ed850126b448dc4c22b2
                                                            • Instruction ID: adbb893e025b46fab0ade195fe848968112363e3c5dbd6cef0296d2cf36c0013
                                                            • Opcode Fuzzy Hash: 8bc91d6e66051c7738705e6f9efb06d81346a7357644ed850126b448dc4c22b2
                                                            • Instruction Fuzzy Hash: DA018171B100151FDFA5967CD858B1E77DADBCA714F108439E00AC7354DE25DD029BA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b2cfb371be9d10eed3dbdc6c6d62ce37561e2cb5564ca714019b6a91af5f60f4
                                                            • Instruction ID: 5681c129e1f553d5ddc3e1344834587e040e24396f73928371f0fc11b371523e
                                                            • Opcode Fuzzy Hash: b2cfb371be9d10eed3dbdc6c6d62ce37561e2cb5564ca714019b6a91af5f60f4
                                                            • Instruction Fuzzy Hash: 7701F931F101289BEF589A65F840A9EB77AEB85314F108539E905E7345DB31AC04CB90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-2843079600
                                                            • Opcode ID: c79d63fd696ffbd55f5b3268498b99c6f99f83163774dda49ec19c4df5b7d419
                                                            • Instruction ID: fb85c74d1b9dc3617011fcfcea180f35ec0ed8d6fa1b99382dfaf26c6b9e2dd3
                                                            • Opcode Fuzzy Hash: c79d63fd696ffbd55f5b3268498b99c6f99f83163774dda49ec19c4df5b7d419
                                                            • Instruction Fuzzy Hash: 13125D31A512198FDF68DF78C894AADBBF2BF84304F208569D409AB355DB349D45CB90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-1273862796
                                                            • Opcode ID: e0e3ffd1e2f3a6d609cb15d888c42714fb6abe8ec4837d0404236e18e22dcdf2
                                                            • Instruction ID: 3be3acc63b109212a0c2f8cb7e6b53a5aa01ca09ce23369c9201c53efd880798
                                                            • Opcode Fuzzy Hash: e0e3ffd1e2f3a6d609cb15d888c42714fb6abe8ec4837d0404236e18e22dcdf2
                                                            • Instruction Fuzzy Hash: C4918D30B41209DFDFA8DB68D594B6E7BF7AF84301F208429E8069B355DB789941DBA0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                                                            • API String ID: 0-981061697
                                                            • Opcode ID: 54391658bcda99565e004dc284e313f20117dfe947913233c0c5a17a4b895cb6
                                                            • Instruction ID: af86678c75afa5d06a76faac9b75515ec5f9b44601ef80f596677159362de071
                                                            • Opcode Fuzzy Hash: 54391658bcda99565e004dc284e313f20117dfe947913233c0c5a17a4b895cb6
                                                            • Instruction Fuzzy Hash: F5F13B31A51208CFDB59EFA8D554A6EBBB7FF84304F208568D8059B369DB389C42DB90
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 053A3A96
                                                            • GetCurrentThread.KERNEL32 ref: 053A3AD3
                                                            • GetCurrentProcess.KERNEL32 ref: 053A3B10
                                                            • GetCurrentThreadId.KERNEL32 ref: 053A3B69
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4524311151.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_53a0000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 842d5c6ebee8628d3ab43f2786a752c9076573059d8f00dbcb1731b14c9162c0
                                                            • Instruction ID: dcff54a47bd202e7804ec5c26c95c9309d6d72c26509de489b86996bf032c287
                                                            • Opcode Fuzzy Hash: 842d5c6ebee8628d3ab43f2786a752c9076573059d8f00dbcb1731b14c9162c0
                                                            • Instruction Fuzzy Hash: D75158B09003498FDB58DFA9D948BEEBBF5FF88304F208459E019A7360D7789944CB65
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 053A3A96
                                                            • GetCurrentThread.KERNEL32 ref: 053A3AD3
                                                            • GetCurrentProcess.KERNEL32 ref: 053A3B10
                                                            • GetCurrentThreadId.KERNEL32 ref: 053A3B69
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4524311151.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_53a0000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 2a7ab25d9cd47b0aacbc16729d02407286abd960f4f8b7b3adc6e0957129e781
                                                            • Instruction ID: 34c3f6389ee45f047a7e33a4e3f6e882047e2fa6b66b922c791a398595784e7a
                                                            • Opcode Fuzzy Hash: 2a7ab25d9cd47b0aacbc16729d02407286abd960f4f8b7b3adc6e0957129e781
                                                            • Instruction Fuzzy Hash: 775166B0900209CFDB48DFA9D948BEEBBF5FF88304F208419E009A73A0D7789944CB65
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q
                                                            • API String ID: 0-858218434
                                                            • Opcode ID: 73fd5eab01d0418139f29249149bc4b069e52173b644fbad638a88c195e2e47e
                                                            • Instruction ID: 7097a392eb774e88486663aa40a08d3aecacb9b137c63d58cd4f93b83e9c3431
                                                            • Opcode Fuzzy Hash: 73fd5eab01d0418139f29249149bc4b069e52173b644fbad638a88c195e2e47e
                                                            • Instruction Fuzzy Hash: 01B14930A002098FDB98EF64D594A6EBBF7FF85304F24C829D4069B355DB75D886DBA0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR]q$LR]q$$]q$$]q
                                                            • API String ID: 0-3527005858
                                                            • Opcode ID: 0716b37bb55e4a8571e021307e7a1400fd8b5072a5c086e1bd2da2ac6e3b3b4b
                                                            • Instruction ID: 0136f6e5a51b5d9d0573943bcd5ad812e8c105acca3fa4724095ed8beb594697
                                                            • Opcode Fuzzy Hash: 0716b37bb55e4a8571e021307e7a1400fd8b5072a5c086e1bd2da2ac6e3b3b4b
                                                            • Instruction Fuzzy Hash: 13519D30B402059FDB58DF28D990A6E7BF6FF89304F14C968E4169B3A5DA35EC41CBA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.4528970163.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_6090000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $]q$$]q$$]q$$]q
                                                            • API String ID: 0-858218434
                                                            • Opcode ID: dcd97008f56bbea821608d8f254b9a3ee62c31ed4ea0307af9cd200446ce05d8
                                                            • Instruction ID: 9c157ebb9678a723c617aed36f49c25d8024f1c1a9c5467982078bb5f6d09668
                                                            • Opcode Fuzzy Hash: dcd97008f56bbea821608d8f254b9a3ee62c31ed4ea0307af9cd200446ce05d8
                                                            • Instruction Fuzzy Hash: 6751A070B502048FDFA9DBA8D590AAEBBF7EB84314F208529E406D7355DB35DC42DBA0