Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
H9YFiQB7o3.exe

Overview

General Information

Sample name:H9YFiQB7o3.exe
renamed because original name is a hash value
Original sample name:3eda9fff3dbbc6e74162eec9de159c5c07cdc37f27c84ca20eece700ecf98666.exe
Analysis ID:1587598
MD5:254ea708867541a0b41fb64a6896bb2b
SHA1:d0fb4c2e311c685ac97822f0e49ae77afda72ccc
SHA256:3eda9fff3dbbc6e74162eec9de159c5c07cdc37f27c84ca20eece700ecf98666
Tags:exeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • H9YFiQB7o3.exe (PID: 6308 cmdline: "C:\Users\user\Desktop\H9YFiQB7o3.exe" MD5: 254EA708867541A0B41FB64A6896BB2B)
    • powershell.exe (PID: 5660 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\H9YFiQB7o3.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 1008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7660 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • H9YFiQB7o3.exe (PID: 1072 cmdline: "C:\Users\user\Desktop\H9YFiQB7o3.exe" MD5: 254EA708867541A0B41FB64A6896BB2B)
    • H9YFiQB7o3.exe (PID: 6016 cmdline: "C:\Users\user\Desktop\H9YFiQB7o3.exe" MD5: 254EA708867541A0B41FB64A6896BB2B)
    • H9YFiQB7o3.exe (PID: 820 cmdline: "C:\Users\user\Desktop\H9YFiQB7o3.exe" MD5: 254EA708867541A0B41FB64A6896BB2B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.fosna.net", "Username": "sarthiever@fosna.net", "Password": "(=8fPSH$KO_!"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.2496050071.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000007.00000002.2496050071.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000007.00000002.2499635522.00000000029F5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.1271894317.0000000003ED9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.1271894317.0000000003ED9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            0.2.H9YFiQB7o3.exe.3ed9970.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.H9YFiQB7o3.exe.3ed9970.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.H9YFiQB7o3.exe.3ed9970.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x325c5:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x32637:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x326c1:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x32753:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x327bd:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3282f:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x328c5:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x32955:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.H9YFiQB7o3.exe.3ed9970.1.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                • 0x2f78d:$s2: GetPrivateProfileString
                • 0x2ee5d:$s3: get_OSFullName
                • 0x304a3:$s5: remove_Key
                • 0x30693:$s5: remove_Key
                • 0x315ac:$s6: FtpWebRequest
                • 0x325a7:$s7: logins
                • 0x32b19:$s7: logins
                • 0x357fc:$s7: logins
                • 0x358dc:$s7: logins
                • 0x37231:$s7: logins
                • 0x36476:$s9: 1.85 (Hash, version 2, native byte-order)
                7.2.H9YFiQB7o3.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 18 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\H9YFiQB7o3.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\H9YFiQB7o3.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\H9YFiQB7o3.exe", ParentImage: C:\Users\user\Desktop\H9YFiQB7o3.exe, ParentProcessId: 6308, ParentProcessName: H9YFiQB7o3.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\H9YFiQB7o3.exe", ProcessId: 5660, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\H9YFiQB7o3.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\H9YFiQB7o3.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\H9YFiQB7o3.exe", ParentImage: C:\Users\user\Desktop\H9YFiQB7o3.exe, ParentProcessId: 6308, ParentProcessName: H9YFiQB7o3.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\H9YFiQB7o3.exe", ProcessId: 5660, ProcessName: powershell.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\H9YFiQB7o3.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\H9YFiQB7o3.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\H9YFiQB7o3.exe", ParentImage: C:\Users\user\Desktop\H9YFiQB7o3.exe, ParentProcessId: 6308, ParentProcessName: H9YFiQB7o3.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\H9YFiQB7o3.exe", ProcessId: 5660, ProcessName: powershell.exe
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: H9YFiQB7o3.exeAvira: detected
                  Source: 0.2.H9YFiQB7o3.exe.3f15390.2.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.fosna.net", "Username": "sarthiever@fosna.net", "Password": "(=8fPSH$KO_!"}
                  Source: H9YFiQB7o3.exeVirustotal: Detection: 79%Perma Link
                  Source: H9YFiQB7o3.exeReversingLabs: Detection: 86%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                  Source: H9YFiQB7o3.exeJoe Sandbox ML: detected
                  Source: H9YFiQB7o3.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: H9YFiQB7o3.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: Yara matchFile source: 7.2.H9YFiQB7o3.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.H9YFiQB7o3.exe.3f15390.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.H9YFiQB7o3.exe.3ed9970.1.raw.unpack, type: UNPACKEDPE
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: H9YFiQB7o3.exe, 00000007.00000002.2499635522.0000000002A88000.00000004.00000800.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2499635522.0000000002AA3000.00000004.00000800.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2499635522.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: H9YFiQB7o3.exe, 00000000.00000002.1271894317.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2497672411.0000000000B85000.00000004.00000020.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2499635522.0000000002A88000.00000004.00000800.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2496050071.0000000000402000.00000040.00000400.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2499635522.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: H9YFiQB7o3.exe, 00000007.00000002.2497672411.0000000000B85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting=
                  Source: H9YFiQB7o3.exe, 00000000.00000002.1271158882.0000000002F2E000.00000004.00000800.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2499635522.0000000002A88000.00000004.00000800.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2499635522.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: H9YFiQB7o3.exe, 00000000.00000002.1271894317.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2496050071.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                  System Summary

                  barindex
                  Source: 0.2.H9YFiQB7o3.exe.3ed9970.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.H9YFiQB7o3.exe.3ed9970.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 7.2.H9YFiQB7o3.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 7.2.H9YFiQB7o3.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.H9YFiQB7o3.exe.3f15390.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.H9YFiQB7o3.exe.3f15390.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.H9YFiQB7o3.exe.3f15390.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.H9YFiQB7o3.exe.3f15390.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.H9YFiQB7o3.exe.3ed9970.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.H9YFiQB7o3.exe.3ed9970.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 0_2_0139D3040_2_0139D304
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 0_2_05AB55E00_2_05AB55E0
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 0_2_05AB63B90_2_05AB63B9
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 0_2_05AB63C80_2_05AB63C8
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 0_2_05ABB2400_2_05ABB240
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 0_2_05AB2F880_2_05AB2F88
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 0_2_05AB5F800_2_05AB5F80
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 0_2_05AB5F900_2_05AB5F90
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 0_2_05AB3EE80_2_05AB3EE8
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 0_2_05AB3AB00_2_05AB3AB0
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 0_2_05AB3A7F0_2_05AB3A7F
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 7_2_00E3D8907_2_00E3D890
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 7_2_00E34A887_2_00E34A88
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 7_2_00E33E707_2_00E33E70
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 7_2_00E341B87_2_00E341B8
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 7_2_00E3D2847_2_00E3D284
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 7_2_064B23007_2_064B2300
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 7_2_064B11507_2_064B1150
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 7_2_064B3AB07_2_064B3AB0
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 7_2_064B33C87_2_064B33C8
                  Source: H9YFiQB7o3.exe, 00000000.00000002.1271158882.0000000002F2E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename88e10d5e-7fd5-494e-a8ee-82170ba0d629.exe4 vs H9YFiQB7o3.exe
                  Source: H9YFiQB7o3.exe, 00000000.00000002.1268671235.000000000119E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs H9YFiQB7o3.exe
                  Source: H9YFiQB7o3.exe, 00000000.00000002.1277427257.0000000007430000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs H9YFiQB7o3.exe
                  Source: H9YFiQB7o3.exe, 00000000.00000002.1271894317.0000000003ED9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename88e10d5e-7fd5-494e-a8ee-82170ba0d629.exe4 vs H9YFiQB7o3.exe
                  Source: H9YFiQB7o3.exe, 00000000.00000002.1271894317.0000000003ED9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs H9YFiQB7o3.exe
                  Source: H9YFiQB7o3.exe, 00000000.00000000.1250586702.0000000000AD2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameJRoe.exe@ vs H9YFiQB7o3.exe
                  Source: H9YFiQB7o3.exe, 00000007.00000002.2496392107.00000000007F9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs H9YFiQB7o3.exe
                  Source: H9YFiQB7o3.exe, 00000007.00000002.2496050071.000000000043E000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename88e10d5e-7fd5-494e-a8ee-82170ba0d629.exe4 vs H9YFiQB7o3.exe
                  Source: H9YFiQB7o3.exeBinary or memory string: OriginalFilenameJRoe.exe@ vs H9YFiQB7o3.exe
                  Source: H9YFiQB7o3.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0.2.H9YFiQB7o3.exe.3ed9970.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.H9YFiQB7o3.exe.3ed9970.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 7.2.H9YFiQB7o3.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 7.2.H9YFiQB7o3.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.H9YFiQB7o3.exe.3f15390.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.H9YFiQB7o3.exe.3f15390.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.H9YFiQB7o3.exe.3f15390.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.H9YFiQB7o3.exe.3f15390.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.H9YFiQB7o3.exe.3ed9970.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.H9YFiQB7o3.exe.3ed9970.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: H9YFiQB7o3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@11/6@1/1
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\H9YFiQB7o3.exe.logJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1008:120:WilError_03
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uh0xaq55.xan.ps1Jump to behavior
                  Source: H9YFiQB7o3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: H9YFiQB7o3.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: H9YFiQB7o3.exe, 00000007.00000002.2499635522.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2499635522.0000000002AD4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: H9YFiQB7o3.exeVirustotal: Detection: 79%
                  Source: H9YFiQB7o3.exeReversingLabs: Detection: 86%
                  Source: unknownProcess created: C:\Users\user\Desktop\H9YFiQB7o3.exe "C:\Users\user\Desktop\H9YFiQB7o3.exe"
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\H9YFiQB7o3.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess created: C:\Users\user\Desktop\H9YFiQB7o3.exe "C:\Users\user\Desktop\H9YFiQB7o3.exe"
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess created: C:\Users\user\Desktop\H9YFiQB7o3.exe "C:\Users\user\Desktop\H9YFiQB7o3.exe"
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess created: C:\Users\user\Desktop\H9YFiQB7o3.exe "C:\Users\user\Desktop\H9YFiQB7o3.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\H9YFiQB7o3.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess created: C:\Users\user\Desktop\H9YFiQB7o3.exe "C:\Users\user\Desktop\H9YFiQB7o3.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess created: C:\Users\user\Desktop\H9YFiQB7o3.exe "C:\Users\user\Desktop\H9YFiQB7o3.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess created: C:\Users\user\Desktop\H9YFiQB7o3.exe "C:\Users\user\Desktop\H9YFiQB7o3.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: H9YFiQB7o3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: H9YFiQB7o3.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 0_2_0139F498 pushad ; iretd 0_2_0139F499
                  Source: H9YFiQB7o3.exeStatic PE information: section name: .text entropy: 7.9043059772658495

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: H9YFiQB7o3.exe PID: 6308, type: MEMORYSTR
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: H9YFiQB7o3.exe, 00000000.00000002.1271894317.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2499635522.00000000029F5000.00000004.00000800.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2499635522.0000000002AA3000.00000004.00000800.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2496050071.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeMemory allocated: 1140000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeMemory allocated: 2ED0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeMemory allocated: 2DE0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeMemory allocated: 8AD0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeMemory allocated: 9AD0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeMemory allocated: 9CC0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeMemory allocated: ACC0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeMemory allocated: E30000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeMemory allocated: 29C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeMemory allocated: 2830000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7103Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2431Jump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exe TID: 1548Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7372Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: H9YFiQB7o3.exe, 00000007.00000002.2499635522.0000000002AA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: H9YFiQB7o3.exe, 00000007.00000002.2496050071.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: H9YFiQB7o3.exe, 00000007.00000002.2496050071.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                  Source: H9YFiQB7o3.exe, 00000007.00000002.2497672411.0000000000C0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeCode function: 7_2_00E37070 CheckRemoteDebuggerPresent,7_2_00E37070
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\H9YFiQB7o3.exe"
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\H9YFiQB7o3.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeMemory written: C:\Users\user\Desktop\H9YFiQB7o3.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\H9YFiQB7o3.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess created: C:\Users\user\Desktop\H9YFiQB7o3.exe "C:\Users\user\Desktop\H9YFiQB7o3.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess created: C:\Users\user\Desktop\H9YFiQB7o3.exe "C:\Users\user\Desktop\H9YFiQB7o3.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeProcess created: C:\Users\user\Desktop\H9YFiQB7o3.exe "C:\Users\user\Desktop\H9YFiQB7o3.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeQueries volume information: C:\Users\user\Desktop\H9YFiQB7o3.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeQueries volume information: C:\Users\user\Desktop\H9YFiQB7o3.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.H9YFiQB7o3.exe.3ed9970.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.H9YFiQB7o3.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.H9YFiQB7o3.exe.3f15390.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.H9YFiQB7o3.exe.3f15390.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.H9YFiQB7o3.exe.3ed9970.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000002.2496050071.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1271894317.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: H9YFiQB7o3.exe PID: 6308, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: H9YFiQB7o3.exe PID: 820, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Users\user\Desktop\H9YFiQB7o3.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Yara matchFile source: 0.2.H9YFiQB7o3.exe.3ed9970.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.H9YFiQB7o3.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.H9YFiQB7o3.exe.3f15390.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.H9YFiQB7o3.exe.3f15390.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.H9YFiQB7o3.exe.3ed9970.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000002.2496050071.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2499635522.00000000029F5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1271894317.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: H9YFiQB7o3.exe PID: 6308, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: H9YFiQB7o3.exe PID: 820, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.H9YFiQB7o3.exe.3ed9970.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.H9YFiQB7o3.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.H9YFiQB7o3.exe.3f15390.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.H9YFiQB7o3.exe.3f15390.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.H9YFiQB7o3.exe.3ed9970.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000002.2496050071.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1271894317.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: H9YFiQB7o3.exe PID: 6308, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: H9YFiQB7o3.exe PID: 820, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  111
                  Process Injection
                  1
                  Masquerading
                  1
                  OS Credential Dumping
                  531
                  Security Software Discovery
                  Remote Services1
                  Email Collection
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  11
                  Disable or Modify Tools
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop Protocol1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)261
                  Virtualization/Sandbox Evasion
                  Security Account Manager261
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin Shares1
                  Data from Local System
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                  Process Injection
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput Capture2
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                  Obfuscated Files or Information
                  LSA Secrets1
                  System Network Configuration Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                  Software Packing
                  Cached Domain Credentials1
                  File and Directory Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  DLL Side-Loading
                  DCSync34
                  System Information Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1587598 Sample: H9YFiQB7o3.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 100 28 ip-api.com 2->28 32 Found malware configuration 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 Antivirus / Scanner detection for submitted sample 2->36 38 8 other signatures 2->38 8 H9YFiQB7o3.exe 4 2->8         started        signatures3 process4 file5 26 C:\Users\user\AppData\...\H9YFiQB7o3.exe.log, ASCII 8->26 dropped 40 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->40 42 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->42 44 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->44 46 3 other signatures 8->46 12 H9YFiQB7o3.exe 15 2 8->12         started        16 powershell.exe 23 8->16         started        18 H9YFiQB7o3.exe 8->18         started        20 H9YFiQB7o3.exe 8->20         started        signatures6 process7 dnsIp8 30 ip-api.com 208.95.112.1, 49702, 80 TUT-ASUS United States 12->30 48 Tries to steal Mail credentials (via file / registry access) 12->48 50 Tries to harvest and steal browser information (history, passwords, etc) 12->50 52 Loading BitLocker PowerShell Module 16->52 22 WmiPrvSE.exe 16->22         started        24 conhost.exe 16->24         started        signatures9 process10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  H9YFiQB7o3.exe79%VirustotalBrowse
                  H9YFiQB7o3.exe86%ReversingLabsWin32.Spyware.Negasteal
                  H9YFiQB7o3.exe100%AviraTR/AD.GenSteal.pvpbb
                  H9YFiQB7o3.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ip-api.com
                  208.95.112.1
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://ip-api.com/line/?fields=hostingfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://account.dyn.com/H9YFiQB7o3.exe, 00000000.00000002.1271894317.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2496050071.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameH9YFiQB7o3.exe, 00000000.00000002.1271158882.0000000002F2E000.00000004.00000800.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2499635522.0000000002A88000.00000004.00000800.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2499635522.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://ip-api.com/line/?fields=hosting=H9YFiQB7o3.exe, 00000007.00000002.2497672411.0000000000B85000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://ip-api.comH9YFiQB7o3.exe, 00000007.00000002.2499635522.0000000002A88000.00000004.00000800.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2499635522.0000000002AA3000.00000004.00000800.00020000.00000000.sdmp, H9YFiQB7o3.exe, 00000007.00000002.2499635522.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              208.95.112.1
                              ip-api.comUnited States
                              53334TUT-ASUSfalse
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1587598
                              Start date and time:2025-01-10 15:23:01 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 5m 15s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:20
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:H9YFiQB7o3.exe
                              renamed because original name is a hash value
                              Original Sample Name:3eda9fff3dbbc6e74162eec9de159c5c07cdc37f27c84ca20eece700ecf98666.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@11/6@1/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 31
                              • Number of non-executed functions: 11
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 2.23.242.162, 13.107.246.45, 52.149.20.212
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtCreateKey calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              09:23:56API Interceptor1x Sleep call for process: H9YFiQB7o3.exe modified
                              09:23:58API Interceptor16x Sleep call for process: powershell.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              208.95.112.1lFlw40OH6u.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              Pago devuelto #.Documentos#9787565789678675645767856843.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              driver.exeGet hashmaliciousBlank GrabberBrowse
                              • ip-api.com/json/?fields=225545
                              XClient.exeGet hashmaliciousXWormBrowse
                              • ip-api.com/line/?fields=hosting
                              Comprobante.de.pago.pdf.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              p.exeGet hashmaliciousUnknownBrowse
                              • ip-api.com/csv/?fields=query
                              rNuevaorden_pdf.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              I334hDwRjj.exeGet hashmaliciousBlank Grabber, NjratBrowse
                              • ip-api.com/json/?fields=225545
                              startup_str_466.batGet hashmaliciousXWormBrowse
                              • ip-api.com/line/?fields=hosting
                              7dtpow.ps1Get hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              ip-api.comlFlw40OH6u.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              Pago devuelto #.Documentos#9787565789678675645767856843.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              driver.exeGet hashmaliciousBlank GrabberBrowse
                              • 208.95.112.1
                              XClient.exeGet hashmaliciousXWormBrowse
                              • 208.95.112.1
                              Comprobante.de.pago.pdf.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              p.exeGet hashmaliciousUnknownBrowse
                              • 208.95.112.1
                              rNuevaorden_pdf.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              I334hDwRjj.exeGet hashmaliciousBlank Grabber, NjratBrowse
                              • 208.95.112.1
                              startup_str_466.batGet hashmaliciousXWormBrowse
                              • 208.95.112.1
                              7dtpow.ps1Get hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              TUT-ASUSlFlw40OH6u.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              Pago devuelto #.Documentos#9787565789678675645767856843.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              driver.exeGet hashmaliciousBlank GrabberBrowse
                              • 208.95.112.1
                              XClient.exeGet hashmaliciousXWormBrowse
                              • 208.95.112.1
                              Comprobante.de.pago.pdf.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              p.exeGet hashmaliciousUnknownBrowse
                              • 208.95.112.1
                              rNuevaorden_pdf.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              I334hDwRjj.exeGet hashmaliciousBlank Grabber, NjratBrowse
                              • 208.95.112.1
                              startup_str_466.batGet hashmaliciousXWormBrowse
                              • 208.95.112.1
                              7dtpow.ps1Get hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              No context
                              No context
                              Process:C:\Users\user\Desktop\H9YFiQB7o3.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:modified
                              Size (bytes):1216
                              Entropy (8bit):5.34331486778365
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2232
                              Entropy (8bit):5.380285623575084
                              Encrypted:false
                              SSDEEP:48:+WSU4xympjgZ9tz4RIoUl8NPZHUl7u1iMuge//YM0Uyus:+LHxvCZfIfSKRHmOug81s
                              MD5:CAA9F51B6B2EF6B91691AB0F9D7E1CBB
                              SHA1:910495587AF5EEAC020254B9222ADB3E540CD780
                              SHA-256:4B0E953BB1137D570E6B6AEC7C3ABDE92C592104CC406F977549D1C89A18D068
                              SHA-512:EE18ED7F122CF485D67405666D62004F9F83F68606EDDE2D67F6766AAB94C387B3D9E9A2919D85E72F8740DDF955B3009F678D652A6F3EAD1398897CEB7118EB
                              Malicious:false
                              Reputation:low
                              Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.896318613313735
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                              • Win32 Executable (generic) a (10002005/4) 49.75%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Windows Screen Saver (13104/52) 0.07%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              File name:H9YFiQB7o3.exe
                              File size:722'432 bytes
                              MD5:254ea708867541a0b41fb64a6896bb2b
                              SHA1:d0fb4c2e311c685ac97822f0e49ae77afda72ccc
                              SHA256:3eda9fff3dbbc6e74162eec9de159c5c07cdc37f27c84ca20eece700ecf98666
                              SHA512:2412318afb2415b97336aa1e64045e63993e79aadea29d6d0b25049f896114782818a7170afafafb8b1687cd9b0f8182f9bf3cd64c6d7cd8ca008da94ef53662
                              SSDEEP:12288:oyH5mU+8fo3iraJEW6I/4xE+6R+sSSC4D0s9JT7Y9kas9Mof:1HxzakasgEsShm9u9U
                              TLSH:15E4120432FC0B32DABB4BFD55B5411547B3B92A6532EA0E2FED60CE1B67B409920767
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...>1.g..............0.............B.... ... ....@.. .......................`............@................................
                              Icon Hash:71f06930924d0f0f
                              Entrypoint:0x4b0d42
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x6704313E [Mon Oct 7 19:06:38 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xb0cf00x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xb20000x1340.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xb40000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000xaed480xaee0000a5ffd7b21414d830cd7b94dfb730baFalse0.9291877010364546data7.9043059772658495IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rsrc0xb20000x13400x1400bec998d313c2f8e3fc4675d9fe2fba1cFalse0.7451171875data6.915025369519242IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xb40000xc0x200dc8add2ca5cc82c5f0ea2deceac68051False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0xb20c80xf1aPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8706673564407656
                              RT_GROUP_ICON0xb2ff40x14data1.05
                              RT_VERSION0xb30180x324data0.4291044776119403
                              DLLImport
                              mscoree.dll_CorExeMain
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 10, 2025 15:23:59.399918079 CET4970280192.168.2.7208.95.112.1
                              Jan 10, 2025 15:23:59.404834986 CET8049702208.95.112.1192.168.2.7
                              Jan 10, 2025 15:23:59.404942036 CET4970280192.168.2.7208.95.112.1
                              Jan 10, 2025 15:23:59.406059980 CET4970280192.168.2.7208.95.112.1
                              Jan 10, 2025 15:23:59.411034107 CET8049702208.95.112.1192.168.2.7
                              Jan 10, 2025 15:23:59.860126019 CET8049702208.95.112.1192.168.2.7
                              Jan 10, 2025 15:23:59.911194086 CET4970280192.168.2.7208.95.112.1
                              Jan 10, 2025 15:25:01.202681065 CET8049702208.95.112.1192.168.2.7
                              Jan 10, 2025 15:25:01.202790022 CET4970280192.168.2.7208.95.112.1
                              Jan 10, 2025 15:25:39.873939991 CET4970280192.168.2.7208.95.112.1
                              Jan 10, 2025 15:25:39.878851891 CET8049702208.95.112.1192.168.2.7
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 10, 2025 15:23:59.377098083 CET6022053192.168.2.71.1.1.1
                              Jan 10, 2025 15:23:59.383836985 CET53602201.1.1.1192.168.2.7
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jan 10, 2025 15:23:59.377098083 CET192.168.2.71.1.1.10xaf33Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 10, 2025 15:23:59.383836985 CET1.1.1.1192.168.2.70xaf33No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                              • ip-api.com
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.749702208.95.112.180820C:\Users\user\Desktop\H9YFiQB7o3.exe
                              TimestampBytes transferredDirectionData
                              Jan 10, 2025 15:23:59.406059980 CET80OUTGET /line/?fields=hosting HTTP/1.1
                              Host: ip-api.com
                              Connection: Keep-Alive
                              Jan 10, 2025 15:23:59.860126019 CET175INHTTP/1.1 200 OK
                              Date: Fri, 10 Jan 2025 14:23:59 GMT
                              Content-Type: text/plain; charset=utf-8
                              Content-Length: 6
                              Access-Control-Allow-Origin: *
                              X-Ttl: 59
                              X-Rl: 43
                              Data Raw: 66 61 6c 73 65 0a
                              Data Ascii: false


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:09:23:56
                              Start date:10/01/2025
                              Path:C:\Users\user\Desktop\H9YFiQB7o3.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\H9YFiQB7o3.exe"
                              Imagebase:0xa20000
                              File size:722'432 bytes
                              MD5 hash:254EA708867541A0B41FB64A6896BB2B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1271894317.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1271894317.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:true

                              Target ID:3
                              Start time:09:23:57
                              Start date:10/01/2025
                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\H9YFiQB7o3.exe"
                              Imagebase:0xc0000
                              File size:433'152 bytes
                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:4
                              Start time:09:23:57
                              Start date:10/01/2025
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff75da10000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:5
                              Start time:09:23:57
                              Start date:10/01/2025
                              Path:C:\Users\user\Desktop\H9YFiQB7o3.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\Desktop\H9YFiQB7o3.exe"
                              Imagebase:0x360000
                              File size:722'432 bytes
                              MD5 hash:254EA708867541A0B41FB64A6896BB2B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:6
                              Start time:09:23:57
                              Start date:10/01/2025
                              Path:C:\Users\user\Desktop\H9YFiQB7o3.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\Desktop\H9YFiQB7o3.exe"
                              Imagebase:0x3b0000
                              File size:722'432 bytes
                              MD5 hash:254EA708867541A0B41FB64A6896BB2B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:7
                              Start time:09:23:57
                              Start date:10/01/2025
                              Path:C:\Users\user\Desktop\H9YFiQB7o3.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\H9YFiQB7o3.exe"
                              Imagebase:0x5b0000
                              File size:722'432 bytes
                              MD5 hash:254EA708867541A0B41FB64A6896BB2B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2496050071.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2496050071.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2499635522.00000000029F5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:false

                              Target ID:13
                              Start time:09:23:59
                              Start date:10/01/2025
                              Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                              Imagebase:0x7ff7fb730000
                              File size:496'640 bytes
                              MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                              Has elevated privileges:true
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:7.8%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:181
                                Total number of Limit Nodes:16
                                execution_graph 23070 5ab712a 23071 5ab70ce 23070->23071 23076 5ab7e68 23071->23076 23094 5ab7ea0 23071->23094 23111 5ab7efe 23071->23111 23072 5ab735a 23077 5ab7e1b 23076->23077 23078 5ab7e77 23076->23078 23077->23072 23090 5ab7ede 23078->23090 23129 5ab8660 23078->23129 23134 5ab83f7 23078->23134 23140 5ab8870 23078->23140 23145 5ab8550 23078->23145 23151 5ab88f2 23078->23151 23155 5ab82b2 23078->23155 23160 5ab859c 23078->23160 23166 5ab8438 23078->23166 23172 5ab89d9 23078->23172 23176 5ab833a 23078->23176 23182 5ab8344 23078->23182 23186 5ab8765 23078->23186 23193 5ab85e7 23078->23193 23199 5ab8ca0 23078->23199 23090->23072 23095 5ab7eba 23094->23095 23096 5ab8660 2 API calls 23095->23096 23097 5ab8ca0 2 API calls 23095->23097 23098 5ab85e7 2 API calls 23095->23098 23099 5ab8765 2 API calls 23095->23099 23100 5ab8344 2 API calls 23095->23100 23101 5ab833a 2 API calls 23095->23101 23102 5ab89d9 2 API calls 23095->23102 23103 5ab8438 2 API calls 23095->23103 23104 5ab859c 2 API calls 23095->23104 23105 5ab82b2 2 API calls 23095->23105 23106 5ab88f2 2 API calls 23095->23106 23107 5ab7ede 23095->23107 23108 5ab8550 2 API calls 23095->23108 23109 5ab8870 2 API calls 23095->23109 23110 5ab83f7 2 API calls 23095->23110 23096->23107 23097->23107 23098->23107 23099->23107 23100->23107 23101->23107 23102->23107 23103->23107 23104->23107 23105->23107 23106->23107 23107->23072 23108->23107 23109->23107 23110->23107 23112 5ab7e8c 23111->23112 23114 5ab7f01 23111->23114 23113 5ab7ede 23112->23113 23115 5ab8660 2 API calls 23112->23115 23116 5ab8ca0 2 API calls 23112->23116 23117 5ab85e7 2 API calls 23112->23117 23118 5ab8765 2 API calls 23112->23118 23119 5ab8344 2 API calls 23112->23119 23120 5ab833a 2 API calls 23112->23120 23121 5ab89d9 2 API calls 23112->23121 23122 5ab8438 2 API calls 23112->23122 23123 5ab859c 2 API calls 23112->23123 23124 5ab82b2 2 API calls 23112->23124 23125 5ab88f2 2 API calls 23112->23125 23126 5ab8550 2 API calls 23112->23126 23127 5ab8870 2 API calls 23112->23127 23128 5ab83f7 2 API calls 23112->23128 23113->23072 23114->23072 23115->23113 23116->23113 23117->23113 23118->23113 23119->23113 23120->23113 23121->23113 23122->23113 23123->23113 23124->23113 23125->23113 23126->23113 23127->23113 23128->23113 23130 5ab8666 23129->23130 23204 5ab69a9 23130->23204 23208 5ab69b0 23130->23208 23131 5ab8cc9 23136 5ab8330 23134->23136 23135 5ab865a 23135->23090 23136->23135 23212 5ab68b8 23136->23212 23216 5ab68c0 23136->23216 23137 5ab87ca 23137->23090 23141 5ab8876 23140->23141 23143 5ab68b8 WriteProcessMemory 23141->23143 23144 5ab68c0 WriteProcessMemory 23141->23144 23142 5ab87ca 23142->23090 23143->23142 23144->23142 23147 5ab856a 23145->23147 23146 5ab87ad 23146->23090 23147->23146 23149 5ab69a9 ReadProcessMemory 23147->23149 23150 5ab69b0 ReadProcessMemory 23147->23150 23148 5ab8cc9 23149->23148 23150->23148 23153 5ab68b8 WriteProcessMemory 23151->23153 23154 5ab68c0 WriteProcessMemory 23151->23154 23152 5ab8925 23153->23152 23154->23152 23156 5ab82d1 23155->23156 23220 5ab6b48 23156->23220 23224 5ab6b3c 23156->23224 23161 5ab8330 23160->23161 23161->23160 23163 5ab865a 23161->23163 23164 5ab68b8 WriteProcessMemory 23161->23164 23165 5ab68c0 WriteProcessMemory 23161->23165 23162 5ab87ca 23162->23090 23163->23090 23163->23163 23164->23162 23165->23162 23168 5ab8330 23166->23168 23167 5ab865a 23167->23090 23168->23167 23170 5ab68b8 WriteProcessMemory 23168->23170 23171 5ab68c0 WriteProcessMemory 23168->23171 23169 5ab87ca 23169->23090 23170->23169 23171->23169 23228 5ab67f8 23172->23228 23232 5ab6800 23172->23232 23173 5ab89f7 23177 5ab8330 23176->23177 23179 5ab865a 23177->23179 23180 5ab68b8 WriteProcessMemory 23177->23180 23181 5ab68c0 WriteProcessMemory 23177->23181 23178 5ab87ca 23178->23090 23179->23090 23180->23178 23181->23178 23184 5ab68b8 WriteProcessMemory 23182->23184 23185 5ab68c0 WriteProcessMemory 23182->23185 23183 5ab836c 23183->23090 23184->23183 23185->23183 23187 5ab8776 23186->23187 23189 5ab8330 23186->23189 23188 5ab865a 23188->23090 23189->23188 23191 5ab68b8 WriteProcessMemory 23189->23191 23192 5ab68c0 WriteProcessMemory 23189->23192 23190 5ab87ca 23190->23090 23191->23190 23192->23190 23194 5ab8330 23193->23194 23196 5ab865a 23194->23196 23197 5ab68b8 WriteProcessMemory 23194->23197 23198 5ab68c0 WriteProcessMemory 23194->23198 23195 5ab87ca 23195->23090 23196->23090 23197->23195 23198->23195 23200 5ab8ca6 23199->23200 23201 5ab8cc9 23200->23201 23202 5ab69a9 ReadProcessMemory 23200->23202 23203 5ab69b0 ReadProcessMemory 23200->23203 23202->23201 23203->23201 23205 5ab69fb ReadProcessMemory 23204->23205 23207 5ab6a3f 23205->23207 23207->23131 23209 5ab69fb ReadProcessMemory 23208->23209 23211 5ab6a3f 23209->23211 23211->23131 23213 5ab6908 WriteProcessMemory 23212->23213 23215 5ab695f 23213->23215 23215->23137 23217 5ab6908 WriteProcessMemory 23216->23217 23219 5ab695f 23217->23219 23219->23137 23221 5ab6bd1 23220->23221 23221->23221 23222 5ab6d36 CreateProcessA 23221->23222 23223 5ab6d93 23222->23223 23225 5ab6bd1 23224->23225 23225->23225 23226 5ab6d36 CreateProcessA 23225->23226 23227 5ab6d93 23226->23227 23229 5ab6840 VirtualAllocEx 23228->23229 23231 5ab687d 23229->23231 23231->23173 23233 5ab6840 VirtualAllocEx 23232->23233 23235 5ab687d 23233->23235 23235->23173 23236 139d3d8 23237 139d41e GetCurrentProcess 23236->23237 23239 139d469 23237->23239 23240 139d470 GetCurrentThread 23237->23240 23239->23240 23241 139d4ad GetCurrentProcess 23240->23241 23242 139d4a6 23240->23242 23243 139d4e3 23241->23243 23242->23241 23244 139d50b GetCurrentThreadId 23243->23244 23245 139d53c 23244->23245 23260 1394668 23261 139467a 23260->23261 23262 1394686 23261->23262 23264 1394778 23261->23264 23265 139479d 23264->23265 23269 1394878 23265->23269 23273 1394888 23265->23273 23270 139488b 23269->23270 23272 139498c 23270->23272 23277 13944e4 23270->23277 23275 13948af 23273->23275 23274 139498c 23275->23274 23276 13944e4 CreateActCtxA 23275->23276 23276->23274 23278 1395918 CreateActCtxA 23277->23278 23280 13959db 23278->23280 23281 139d6e1 23282 139d6a4 DuplicateHandle 23281->23282 23284 139d6ea 23281->23284 23283 139d6b6 23282->23283 23246 139ac50 23250 139ad48 23246->23250 23255 139ad37 23246->23255 23247 139ac5f 23251 139ad7c 23250->23251 23252 139ad59 23250->23252 23251->23247 23252->23251 23253 139af80 GetModuleHandleW 23252->23253 23254 139afad 23253->23254 23254->23247 23256 139ad7c 23255->23256 23257 139ad59 23255->23257 23256->23247 23257->23256 23258 139af80 GetModuleHandleW 23257->23258 23259 139afad 23258->23259 23259->23247 23285 5ab9150 23286 5ab9310 23285->23286 23289 5ab9176 23285->23289 23287 5ab92db 23287->23287 23289->23287 23290 5ab4bbc 23289->23290 23291 5ab93d0 PostMessageW 23290->23291 23292 5ab943c 23291->23292 23292->23289

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 296 139d3d8-139d467 GetCurrentProcess 300 139d469-139d46f 296->300 301 139d470-139d4a4 GetCurrentThread 296->301 300->301 302 139d4ad-139d4e1 GetCurrentProcess 301->302 303 139d4a6-139d4ac 301->303 305 139d4ea-139d505 call 139d5a8 302->305 306 139d4e3-139d4e9 302->306 303->302 309 139d50b-139d53a GetCurrentThreadId 305->309 306->305 310 139d53c-139d542 309->310 311 139d543-139d5a5 309->311 310->311
                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 0139D456
                                • GetCurrentThread.KERNEL32 ref: 0139D493
                                • GetCurrentProcess.KERNEL32 ref: 0139D4D0
                                • GetCurrentThreadId.KERNEL32 ref: 0139D529
                                Memory Dump Source
                                • Source File: 00000000.00000002.1269057511.0000000001390000.00000040.00000800.00020000.00000000.sdmp, Offset: 01390000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1390000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID:
                                • API String ID: 2063062207-0
                                • Opcode ID: f776ca368ab2ff7720c9ac8ee66d3c03dcb064bafe10ce474a38c3c5ceee5ad7
                                • Instruction ID: 7a68dfbea6ffbc64e7812be9893307a4485614f80e2814cae8b14e8ea36ede82
                                • Opcode Fuzzy Hash: f776ca368ab2ff7720c9ac8ee66d3c03dcb064bafe10ce474a38c3c5ceee5ad7
                                • Instruction Fuzzy Hash: C05156B0D003098FEB14DFAAD949BEEBBF1AB48314F208459E459A73A0DB346945CF65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 392 5ab6b3c-5ab6bdd 394 5ab6bdf-5ab6be9 392->394 395 5ab6c16-5ab6c36 392->395 394->395 396 5ab6beb-5ab6bed 394->396 400 5ab6c38-5ab6c42 395->400 401 5ab6c6f-5ab6c9e 395->401 397 5ab6bef-5ab6bf9 396->397 398 5ab6c10-5ab6c13 396->398 402 5ab6bfb 397->402 403 5ab6bfd-5ab6c0c 397->403 398->395 400->401 404 5ab6c44-5ab6c46 400->404 411 5ab6ca0-5ab6caa 401->411 412 5ab6cd7-5ab6d91 CreateProcessA 401->412 402->403 403->403 405 5ab6c0e 403->405 406 5ab6c69-5ab6c6c 404->406 407 5ab6c48-5ab6c52 404->407 405->398 406->401 409 5ab6c56-5ab6c65 407->409 410 5ab6c54 407->410 409->409 413 5ab6c67 409->413 410->409 411->412 414 5ab6cac-5ab6cae 411->414 423 5ab6d9a-5ab6e20 412->423 424 5ab6d93-5ab6d99 412->424 413->406 416 5ab6cd1-5ab6cd4 414->416 417 5ab6cb0-5ab6cba 414->417 416->412 418 5ab6cbe-5ab6ccd 417->418 419 5ab6cbc 417->419 418->418 421 5ab6ccf 418->421 419->418 421->416 434 5ab6e22-5ab6e26 423->434 435 5ab6e30-5ab6e34 423->435 424->423 434->435 436 5ab6e28 434->436 437 5ab6e36-5ab6e3a 435->437 438 5ab6e44-5ab6e48 435->438 436->435 437->438 439 5ab6e3c 437->439 440 5ab6e4a-5ab6e4e 438->440 441 5ab6e58-5ab6e5c 438->441 439->438 440->441 444 5ab6e50 440->444 442 5ab6e6e-5ab6e75 441->442 443 5ab6e5e-5ab6e64 441->443 445 5ab6e8c 442->445 446 5ab6e77-5ab6e86 442->446 443->442 444->441 448 5ab6e8d 445->448 446->445 448->448
                                APIs
                                • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 05AB6D7E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: CreateProcess
                                • String ID:
                                • API String ID: 963392458-0
                                • Opcode ID: 9dcc7ac534212e370dc9ad396a43a3de7d12dc194eefdc790f5590522065e4db
                                • Instruction ID: 5be1fc550a3108d75117fe53ae9d4bb74ce94eb8a8c79ec798c1db4e0e56315b
                                • Opcode Fuzzy Hash: 9dcc7ac534212e370dc9ad396a43a3de7d12dc194eefdc790f5590522065e4db
                                • Instruction Fuzzy Hash: 09917B71D00219CFEB24CFA9C841BEDBBB6FF49310F1481A9D819A7240DBB59985CF91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 449 5ab6b48-5ab6bdd 451 5ab6bdf-5ab6be9 449->451 452 5ab6c16-5ab6c36 449->452 451->452 453 5ab6beb-5ab6bed 451->453 457 5ab6c38-5ab6c42 452->457 458 5ab6c6f-5ab6c9e 452->458 454 5ab6bef-5ab6bf9 453->454 455 5ab6c10-5ab6c13 453->455 459 5ab6bfb 454->459 460 5ab6bfd-5ab6c0c 454->460 455->452 457->458 461 5ab6c44-5ab6c46 457->461 468 5ab6ca0-5ab6caa 458->468 469 5ab6cd7-5ab6d91 CreateProcessA 458->469 459->460 460->460 462 5ab6c0e 460->462 463 5ab6c69-5ab6c6c 461->463 464 5ab6c48-5ab6c52 461->464 462->455 463->458 466 5ab6c56-5ab6c65 464->466 467 5ab6c54 464->467 466->466 470 5ab6c67 466->470 467->466 468->469 471 5ab6cac-5ab6cae 468->471 480 5ab6d9a-5ab6e20 469->480 481 5ab6d93-5ab6d99 469->481 470->463 473 5ab6cd1-5ab6cd4 471->473 474 5ab6cb0-5ab6cba 471->474 473->469 475 5ab6cbe-5ab6ccd 474->475 476 5ab6cbc 474->476 475->475 478 5ab6ccf 475->478 476->475 478->473 491 5ab6e22-5ab6e26 480->491 492 5ab6e30-5ab6e34 480->492 481->480 491->492 493 5ab6e28 491->493 494 5ab6e36-5ab6e3a 492->494 495 5ab6e44-5ab6e48 492->495 493->492 494->495 496 5ab6e3c 494->496 497 5ab6e4a-5ab6e4e 495->497 498 5ab6e58-5ab6e5c 495->498 496->495 497->498 501 5ab6e50 497->501 499 5ab6e6e-5ab6e75 498->499 500 5ab6e5e-5ab6e64 498->500 502 5ab6e8c 499->502 503 5ab6e77-5ab6e86 499->503 500->499 501->498 505 5ab6e8d 502->505 503->502 505->505
                                APIs
                                • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 05AB6D7E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: CreateProcess
                                • String ID:
                                • API String ID: 963392458-0
                                • Opcode ID: 30458f1f72f233937de766db5bbbd8396425b5911bc265c2146d8f687f99d05e
                                • Instruction ID: f54c32840254b369e9c08d26bde2502bb47ef0c7c0d45e4e2923d0d0d833c966
                                • Opcode Fuzzy Hash: 30458f1f72f233937de766db5bbbd8396425b5911bc265c2146d8f687f99d05e
                                • Instruction Fuzzy Hash: B4916A71D00219DFEB24CFA9C841BEDBBB6FF49310F1481A9E819A7240DBB59985CF91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 506 139ad48-139ad57 507 139ad59-139ad66 call 139a0a0 506->507 508 139ad83-139ad87 506->508 514 139ad68 507->514 515 139ad7c 507->515 510 139ad89-139ad93 508->510 511 139ad9b-139addc 508->511 510->511 517 139ade9-139adf7 511->517 518 139adde-139ade6 511->518 561 139ad6e call 139afe0 514->561 562 139ad6e call 139afd0 514->562 515->508 519 139adf9-139adfe 517->519 520 139ae1b-139ae1d 517->520 518->517 523 139ae09 519->523 524 139ae00-139ae07 call 139a0ac 519->524 522 139ae20-139ae27 520->522 521 139ad74-139ad76 521->515 525 139aeb8-139af78 521->525 527 139ae29-139ae31 522->527 528 139ae34-139ae3b 522->528 529 139ae0b-139ae19 523->529 524->529 556 139af7a-139af7d 525->556 557 139af80-139afab GetModuleHandleW 525->557 527->528 532 139ae48-139ae4a call 139a0bc 528->532 533 139ae3d-139ae45 528->533 529->522 536 139ae4f-139ae51 532->536 533->532 537 139ae5e-139ae63 536->537 538 139ae53-139ae5b 536->538 539 139ae81-139ae8e 537->539 540 139ae65-139ae6c 537->540 538->537 547 139aeb1-139aeb7 539->547 548 139ae90-139aeae 539->548 540->539 542 139ae6e-139ae7e call 139a0cc call 139a0dc 540->542 542->539 548->547 556->557 558 139afad-139afb3 557->558 559 139afb4-139afc8 557->559 558->559 561->521 562->521
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000), ref: 0139AF9E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1269057511.0000000001390000.00000040.00000800.00020000.00000000.sdmp, Offset: 01390000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1390000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 8e3626b99599caec58babec1d6e9590a8164009e4595ca66c60d7e603d516f40
                                • Instruction ID: 8c4417e9a5ab05073cb8e0793e23a8641e6f5d843476f4a4c310ea728e43f11c
                                • Opcode Fuzzy Hash: 8e3626b99599caec58babec1d6e9590a8164009e4595ca66c60d7e603d516f40
                                • Instruction Fuzzy Hash: 2E812670A00B058FEB24DF6AD45579ABBF1FF88208F008A2DD58AD7B50D775E849CB91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 563 139590d-1395913 564 139591b-13959d9 CreateActCtxA 563->564 566 13959db-13959e1 564->566 567 13959e2-1395a3c 564->567 566->567 574 1395a4b-1395a4f 567->574 575 1395a3e-1395a41 567->575 576 1395a51-1395a5d 574->576 577 1395a60 574->577 575->574 576->577 579 1395a61 577->579 579->579
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 013959C9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1269057511.0000000001390000.00000040.00000800.00020000.00000000.sdmp, Offset: 01390000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1390000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: 9efd76769e69692c300707a91004db657c711d11997f6f86b74fc5f4cbc44310
                                • Instruction ID: a6273573a733d75c90c8a06b621c4fd93b17d8edaa30ffe3a6fe9870ba50fa6b
                                • Opcode Fuzzy Hash: 9efd76769e69692c300707a91004db657c711d11997f6f86b74fc5f4cbc44310
                                • Instruction Fuzzy Hash: 32410471C0072DCBEB25DFAAC88478DBBB5BF49314F20815AD419AB290DB75594ACF50

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 580 13944e4-13959d9 CreateActCtxA 583 13959db-13959e1 580->583 584 13959e2-1395a3c 580->584 583->584 591 1395a4b-1395a4f 584->591 592 1395a3e-1395a41 584->592 593 1395a51-1395a5d 591->593 594 1395a60 591->594 592->591 593->594 596 1395a61 594->596 596->596
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 013959C9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1269057511.0000000001390000.00000040.00000800.00020000.00000000.sdmp, Offset: 01390000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1390000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: 123ef228ae461d4a9df0615695701d97d5a4a481827612e8569ce6b27373c66b
                                • Instruction ID: e7158d0802a9e68fb59da5831110af93dcb9446327c768a7f9c5dcf7aca84b2e
                                • Opcode Fuzzy Hash: 123ef228ae461d4a9df0615695701d97d5a4a481827612e8569ce6b27373c66b
                                • Instruction Fuzzy Hash: 2D41D471C0072DCBEB25DFAAC84478EBBF5BF49314F20815AD409AB251DB755946CF90

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 597 139d6e1-139d6e8 598 139d6ea-139d80e 597->598 599 139d6a4-139d6b4 DuplicateHandle 597->599 601 139d6bd-139d6da 599->601 602 139d6b6-139d6bc 599->602 602->601
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0139D6A7
                                Memory Dump Source
                                • Source File: 00000000.00000002.1269057511.0000000001390000.00000040.00000800.00020000.00000000.sdmp, Offset: 01390000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1390000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: cf326df31454e3cdce6c175668875a67a36b6370e582452956066170a6f00072
                                • Instruction ID: 83afffd8561685f0fab11f99ec52b69794f8320e3a07e69e2cf1ea3dd944fa69
                                • Opcode Fuzzy Hash: cf326df31454e3cdce6c175668875a67a36b6370e582452956066170a6f00072
                                • Instruction Fuzzy Hash: 2E31A574A803419FE304EF62F4457693BB6F784310F508539EA158B7D8DBB868A5CF21

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 615 5ab68b8-5ab690e 617 5ab691e-5ab695d WriteProcessMemory 615->617 618 5ab6910-5ab691c 615->618 620 5ab695f-5ab6965 617->620 621 5ab6966-5ab6996 617->621 618->617 620->621
                                APIs
                                • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 05AB6950
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: MemoryProcessWrite
                                • String ID:
                                • API String ID: 3559483778-0
                                • Opcode ID: 0d9716c0778c8a141c8010f95ab6a424aa203738b7ef056bc8cdbdaed0aa8c2c
                                • Instruction ID: 55d6f01378546285e4c86652bdc193bb93771dd5fb6b3468cba6b19c0428e710
                                • Opcode Fuzzy Hash: 0d9716c0778c8a141c8010f95ab6a424aa203738b7ef056bc8cdbdaed0aa8c2c
                                • Instruction Fuzzy Hash: 872144B5D00309DFDB10CFA9C981BEEBBF5BF48310F14842AE969A7240C7789944CBA0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 625 5ab68c0-5ab690e 627 5ab691e-5ab695d WriteProcessMemory 625->627 628 5ab6910-5ab691c 625->628 630 5ab695f-5ab6965 627->630 631 5ab6966-5ab6996 627->631 628->627 630->631
                                APIs
                                • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 05AB6950
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: MemoryProcessWrite
                                • String ID:
                                • API String ID: 3559483778-0
                                • Opcode ID: cd4601d11c453a507473a6bdffec748ea3a0d14381ff0f4f9e4c8517d76a5e39
                                • Instruction ID: 0262b7af1050b6ecd06ceee6dd6ccdcba7a77bd02939721612f541551b166ec1
                                • Opcode Fuzzy Hash: cd4601d11c453a507473a6bdffec748ea3a0d14381ff0f4f9e4c8517d76a5e39
                                • Instruction Fuzzy Hash: 3F212371D003499FDB10DFAAC885BEEBBF5FF48310F50842AE969A7241C7789944CBA4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 635 5ab69a9-5ab6a3d ReadProcessMemory 638 5ab6a3f-5ab6a45 635->638 639 5ab6a46-5ab6a76 635->639 638->639
                                APIs
                                • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 05AB6A30
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: MemoryProcessRead
                                • String ID:
                                • API String ID: 1726664587-0
                                • Opcode ID: 0ff24e36cba38c41fb2b98228d323138b9d22febbb12ce6554e1ab1ee6a160b1
                                • Instruction ID: 4678a61722fa579ccc0cf05734f7a6a1a268b2a65c8ca744d126b90dd86e0dc1
                                • Opcode Fuzzy Hash: 0ff24e36cba38c41fb2b98228d323138b9d22febbb12ce6554e1ab1ee6a160b1
                                • Instruction Fuzzy Hash: F12116B5C003199FDB10DFA9C981BEEBBF5BF48310F54842AE959A7240C7789905DBA0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 643 5ab69b0-5ab6a3d ReadProcessMemory 646 5ab6a3f-5ab6a45 643->646 647 5ab6a46-5ab6a76 643->647 646->647
                                APIs
                                • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 05AB6A30
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: MemoryProcessRead
                                • String ID:
                                • API String ID: 1726664587-0
                                • Opcode ID: 7c581cf31bfd5a699316db784d399a12e4a134a9535d86d2f362938835d9ba5c
                                • Instruction ID: 45ba80ee7f62cccd5a513e426b64e6d4941e90884fe2266fb8d86fe4bcc5ba7a
                                • Opcode Fuzzy Hash: 7c581cf31bfd5a699316db784d399a12e4a134a9535d86d2f362938835d9ba5c
                                • Instruction Fuzzy Hash: 012116B1C003499FDB10DFAAC881BDEBBF5FF48310F508429E919A7240C7799905CBA4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 651 139d620-139d6b4 DuplicateHandle 652 139d6bd-139d6da 651->652 653 139d6b6-139d6bc 651->653 653->652
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0139D6A7
                                Memory Dump Source
                                • Source File: 00000000.00000002.1269057511.0000000001390000.00000040.00000800.00020000.00000000.sdmp, Offset: 01390000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1390000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: f09feb7d095fe340fe960d3797a9a7d1f299a481ee32d7b6d1daf9049b0565fe
                                • Instruction ID: 4ad1315488bda14fe0637ac8fb383a2a4e9cd94ac0e0943f28969f9ac831278f
                                • Opcode Fuzzy Hash: f09feb7d095fe340fe960d3797a9a7d1f299a481ee32d7b6d1daf9049b0565fe
                                • Instruction Fuzzy Hash: 2921E4B5D00209DFDB10CF9AD985ADEBBF4EB48320F14841AE918A3350C378A944CFA4
                                APIs
                                • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 05AB686E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 466535eb34b71b9183ab87c1759337d33bf948c71e1c8f0a237c86c6e92ad6c2
                                • Instruction ID: 6bcd33b4713e040f79899de5aaa73610c56ff2fd067735d011709d9db649cc00
                                • Opcode Fuzzy Hash: 466535eb34b71b9183ab87c1759337d33bf948c71e1c8f0a237c86c6e92ad6c2
                                • Instruction Fuzzy Hash: DA112676D003098FDB24DFA9C945BEEBBF5AF48320F14881AE929A7250C7759945CFA0
                                APIs
                                • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 05AB686E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 15ca15dd09a6e16d9b6da6d20a1425c4f7cdc3b0b2361d4b8d96b767e0f0e7ec
                                • Instruction ID: cb099bacd32d122d80d6675f72cda9cbb1e6578945b43f2c416d14ba5c7fe7e8
                                • Opcode Fuzzy Hash: 15ca15dd09a6e16d9b6da6d20a1425c4f7cdc3b0b2361d4b8d96b767e0f0e7ec
                                • Instruction Fuzzy Hash: CD112672D003499FDB24DFAAC845BDEBFF5EB48320F148419E529A7250CB759944CFA0
                                APIs
                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 05AB942D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: e506270dd02bca34928a0b46547648197c0c42fda5d58406cc845334251002e0
                                • Instruction ID: fa65f29cda5d28a9ee9799c3078a0d45bf66f61a42508883dd10226634fe7979
                                • Opcode Fuzzy Hash: e506270dd02bca34928a0b46547648197c0c42fda5d58406cc845334251002e0
                                • Instruction Fuzzy Hash: F011E0B58003499FDB20DF9AD945BDEBBF8EB48320F108459E619A7241C3B5A944CFA5
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000), ref: 0139AF9E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1269057511.0000000001390000.00000040.00000800.00020000.00000000.sdmp, Offset: 01390000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1390000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: f2e81e249a17c6a5901faf7493a2f5aee76c8e5835908480ec03a55837492777
                                • Instruction ID: c8c50fdc3dfc0a70d32aebe006d9a7c724ec8cea0dcf105357bae784c244c3bf
                                • Opcode Fuzzy Hash: f2e81e249a17c6a5901faf7493a2f5aee76c8e5835908480ec03a55837492777
                                • Instruction Fuzzy Hash: 1B1113B6C003498FDB10CF9AC844BDEFBF4EB88314F10851AD429A7250C379A549CFA1
                                APIs
                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 05AB942D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: 81652d358d646eb1c36756005b6b9d882d36ff8eaa2e54c361f9f390003f9402
                                • Instruction ID: f08fb489e95ea575922f9e2ded4709666e21265b491de1a4db350305355fda4f
                                • Opcode Fuzzy Hash: 81652d358d646eb1c36756005b6b9d882d36ff8eaa2e54c361f9f390003f9402
                                • Instruction Fuzzy Hash: 3011F2B5800249CFDB10DF99D545BDEBBF8EB08320F20845AD569A7211C375AA44CFA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1268089540.00000000010AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010AD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10ad000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a7822212e3e1bf33d0da9b9d78e11728d8933556ca69c865f7e572613b12d40a
                                • Instruction ID: ffd1edd00bbc99fc5721dcff8bb1c59d9c81fc8d79a47d7fbd148b71900e2dc9
                                • Opcode Fuzzy Hash: a7822212e3e1bf33d0da9b9d78e11728d8933556ca69c865f7e572613b12d40a
                                • Instruction Fuzzy Hash: 03214871504200DFDB15DFA4D9C0B2ABFA1FB88318F60C5A9E8850F656C336D446CBA2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1268222010.00000000010BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10bd000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d9a243ee57b3d82f7a1a0bc720402a19f90cd935a46374a96c47be9cc2b78b6b
                                • Instruction ID: b2cd2254df9ad1a758c3ca8b072c03c70061d06639af11a8362719485a2fe977
                                • Opcode Fuzzy Hash: d9a243ee57b3d82f7a1a0bc720402a19f90cd935a46374a96c47be9cc2b78b6b
                                • Instruction Fuzzy Hash: 08210375614300DFDB15DF54D9C4B56FBA1EB84318F20C5ADE8890B246C336D407CB61
                                Memory Dump Source
                                • Source File: 00000000.00000002.1268222010.00000000010BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10bd000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5c0dec01dbef2dd78225ea2bffcc064a13e169de3bd2eab73d3a02e9d498e8cc
                                • Instruction ID: 4e19232b9130be172cc01729d209c8535a2f93b0cc99a45effa63eb9dde5d36c
                                • Opcode Fuzzy Hash: 5c0dec01dbef2dd78225ea2bffcc064a13e169de3bd2eab73d3a02e9d498e8cc
                                • Instruction Fuzzy Hash: 1421F575A04240EFDB15DF94D9C0B55FBA5FB94328F20C5ADD8894B252C336D846CB61
                                Memory Dump Source
                                • Source File: 00000000.00000002.1268222010.00000000010BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10bd000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c54de2308fa4d3231fa34fe90a21b1704fe48c9fdd284fddab12d35ffa3d9594
                                • Instruction ID: abf4ea8b98085f3a23aacdc4af0dc9050fea9b1c9877d44230638ad8b6480ac5
                                • Opcode Fuzzy Hash: c54de2308fa4d3231fa34fe90a21b1704fe48c9fdd284fddab12d35ffa3d9594
                                • Instruction Fuzzy Hash: A32153755083809FCB16CF54D9D4711BFB1EB46314F28C5DAD8898F2A7C33A9856CB62
                                Memory Dump Source
                                • Source File: 00000000.00000002.1268089540.00000000010AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010AD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10ad000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                • Instruction ID: a72f1f308ee467d07c6c281792574fc020c53545bd54bb67b8aa652a67e1603f
                                • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                • Instruction Fuzzy Hash: 2E11B176504280CFCB16CF54D5C4B16BFB2FB84324F24C6A9D8890B657C336D456CBA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1268222010.00000000010BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10bd000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                • Instruction ID: ccac7ac6c407e99890f74d78f1ab6be334920f59b44ba4079b4f371432c424d8
                                • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                • Instruction Fuzzy Hash: FA11BB75504280DFCB06CF54C5C0B55FFA2FB84328F24C6ADD8894B296C33AD80ACB61
                                Memory Dump Source
                                • Source File: 00000000.00000002.1268089540.00000000010AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010AD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10ad000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3a3a21077d77df2152f34e26691c7e69e5f0ee738e86a0c18b23ca917dfaca10
                                • Instruction ID: da3c01ded74b9f9bf15dfcf0bd68d07ede5d55bef413cab049e0fb214c0105a3
                                • Opcode Fuzzy Hash: 3a3a21077d77df2152f34e26691c7e69e5f0ee738e86a0c18b23ca917dfaca10
                                • Instruction Fuzzy Hash: 3401F7311043809EE7644AD5CC84B6EBFD8EF41221F58C45AED490A682D2389844CBB1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1268089540.00000000010AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010AD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10ad000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 164660198552a35e279d9557e0ad6f9d06fd22f654de8a1afc2dda9836a65d77
                                • Instruction ID: 4ef179e2f5c89c93d83755b3fc53cecbd9478c56d7f412930be573124e1300cf
                                • Opcode Fuzzy Hash: 164660198552a35e279d9557e0ad6f9d06fd22f654de8a1afc2dda9836a65d77
                                • Instruction Fuzzy Hash: B8F0C2310043809EE7648A4ACC84B66FFE8EF40734F18C49AED480A286C279A844CBB1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 154772d23abdc79e432d5b0992eff4012de35e945a248da98a15fab3f9740b52
                                • Instruction ID: 4ff2c687f967b68d3e204300d63dbf7cc817c5e1b7d8aba8bfe8dc6c9322f74f
                                • Opcode Fuzzy Hash: 154772d23abdc79e432d5b0992eff4012de35e945a248da98a15fab3f9740b52
                                • Instruction Fuzzy Hash: F9D1BD717006088FEB25DB7AC550BAE77FAAF89700F144569D156CB292CFB4D902CBA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7aa33a2309e5fd627a2e5c9f370b0dc244893b4fd4c84646608c6656bdbda357
                                • Instruction ID: 8eea767867d458681cc8b7043847d9a22f0fbd393b9fd3d3266df9ad992a6092
                                • Opcode Fuzzy Hash: 7aa33a2309e5fd627a2e5c9f370b0dc244893b4fd4c84646608c6656bdbda357
                                • Instruction Fuzzy Hash: C1E11B74E042598FDB14DF99C580AAEFBF6BF49304F248169D815A735AD730AD42CFA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 994e015d1b77c711ab3dc05f2a7588cadfb5c325f14498ede76d247031d201ca
                                • Instruction ID: 3ebf675708bbe2c6a149d57e6c3a92d88a9b8f854c1b7528b758c5b57ddf11d8
                                • Opcode Fuzzy Hash: 994e015d1b77c711ab3dc05f2a7588cadfb5c325f14498ede76d247031d201ca
                                • Instruction Fuzzy Hash: 80E11B74E042598FDB14DFA9C580AAEFBF6BF89304F248169D815A7356C730AD42CFA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1d9cbc33d80a89188bde581ed7654a22f26f43d09d24fcfea90cc2676191d882
                                • Instruction ID: b027215aa0db86dd496e060b0e308bfa738a4c111e0beb53c63d91eefd9e6588
                                • Opcode Fuzzy Hash: 1d9cbc33d80a89188bde581ed7654a22f26f43d09d24fcfea90cc2676191d882
                                • Instruction Fuzzy Hash: BCE10B74E042298FDB14DFA9D580AAEFBF6BF89300F248159D415AB35AD7709D42CFA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 52914d0dfec1ef9a401c8ab8d9e4fe39d9c2f269cd7035ed7c4748af112c2d29
                                • Instruction ID: 7f6d033c9f1f1aba55a913d7941a5b3ec0e13f5cbc1f061afc4ec6918d2a305c
                                • Opcode Fuzzy Hash: 52914d0dfec1ef9a401c8ab8d9e4fe39d9c2f269cd7035ed7c4748af112c2d29
                                • Instruction Fuzzy Hash: 57E11B74E042198FDB14DFA9C580AAEFBF6BF49304F248169D815A735AD770AD41CFA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 44c19f5e1407cebd73c6c8ea0554fc1eb66cb06baf0e15edf7b95a18940b5d79
                                • Instruction ID: 7b7bf828dc57928ba56dabe084221c49b798259e0527c8a2322a103a429ee8e5
                                • Opcode Fuzzy Hash: 44c19f5e1407cebd73c6c8ea0554fc1eb66cb06baf0e15edf7b95a18940b5d79
                                • Instruction Fuzzy Hash: A9E12B74E002598FDB14DF99C580AAEFBF6BF49300F24856AD415A735AC771AD42CFA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1269057511.0000000001390000.00000040.00000800.00020000.00000000.sdmp, Offset: 01390000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1390000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0b81a0f22b2922e66c5041519e89f030c3a9f7d164c0c11c00f44b6d29edaa84
                                • Instruction ID: 966e783f4b4527ab66dcb2a4a36604fcbc103dceddf5bca7367fdbafd379627d
                                • Opcode Fuzzy Hash: 0b81a0f22b2922e66c5041519e89f030c3a9f7d164c0c11c00f44b6d29edaa84
                                • Instruction Fuzzy Hash: 8EA19232E00209CFCF15DFB9C84059EBBBAFF85304B25456AE905EB265DB71E956CB40
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bc1fb5cf2abb7b53860a787529af88dae2c17df9b9ec4d1f834045624e0b28ee
                                • Instruction ID: 3b6163776cffbc402188cdf237a915dda42caf3b787bbde6979d65a63b47b284
                                • Opcode Fuzzy Hash: bc1fb5cf2abb7b53860a787529af88dae2c17df9b9ec4d1f834045624e0b28ee
                                • Instruction Fuzzy Hash: B8512D74E042598FDB14CFA9C580AAEFBF6BF89300F24856AD418A7356D7319D42CFA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3efc017c327a16f549b8e8b98fa78a7123caa4a2c238ea7492c6c1653c792032
                                • Instruction ID: 729d1269a0517b92aa6c268cf12770cf1b5be85cc710c33b76c5cd319d77cd8c
                                • Opcode Fuzzy Hash: 3efc017c327a16f549b8e8b98fa78a7123caa4a2c238ea7492c6c1653c792032
                                • Instruction Fuzzy Hash: D151D674E09609DFEF04CFAAD4449EEBBFABF89310F149426E419A7212D7B19941CF90
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b4f5ee49036099ed705d74fcfb2c67e51ea79c8e582e515b21e52bbd4d26a392
                                • Instruction ID: 563abc24fd8dfc282a8cde3701fe8167b90522986ba268e166246976e3b25725
                                • Opcode Fuzzy Hash: b4f5ee49036099ed705d74fcfb2c67e51ea79c8e582e515b21e52bbd4d26a392
                                • Instruction Fuzzy Hash: 0751F874E042298FDB14DFAAD5809AEBBF6BF89300F24C169D418A7356D7319942CFA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1276685808.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5ab0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 79195006f0c7a63890fee3fb2de52d36681cbbf5b859b2bf9713783ea99b73ab
                                • Instruction ID: e23960772e09edc35a5f45cc10d57b70dc70ae0fdcc56e7fe4c99e17b149c774
                                • Opcode Fuzzy Hash: 79195006f0c7a63890fee3fb2de52d36681cbbf5b859b2bf9713783ea99b73ab
                                • Instruction Fuzzy Hash: 9F511B74E042298FDB14DFA9C540AAEFBF6BF89300F248169D419A735AD7319D41CFA1

                                Execution Graph

                                Execution Coverage:8.7%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:60%
                                Total number of Nodes:5
                                Total number of Limit Nodes:0
                                execution_graph 25062 e37070 25063 e370b4 CheckRemoteDebuggerPresent 25062->25063 25064 e370f6 25063->25064 25065 64ba930 DuplicateHandle 25066 64ba9c6 25065->25066

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1518 e37070-e370f4 CheckRemoteDebuggerPresent 1520 e370f6-e370fc 1518->1520 1521 e370fd-e37138 1518->1521 1520->1521
                                APIs
                                • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 00E370E7
                                Memory Dump Source
                                • Source File: 00000007.00000002.2498558270.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_e30000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: CheckDebuggerPresentRemote
                                • String ID:
                                • API String ID: 3662101638-0
                                • Opcode ID: ec7b32b62191e57b8e513beaf8f7593940a809a90d07fadca725e17fae1fef72
                                • Instruction ID: 9a8c077149c5a91125426eeb4529993e2401254f00599ae5ae7742da762da34c
                                • Opcode Fuzzy Hash: ec7b32b62191e57b8e513beaf8f7593940a809a90d07fadca725e17fae1fef72
                                • Instruction Fuzzy Hash: C12128B5C002598FDB14CF9AD485BEEFBF4AF49310F14842AE459B3250D778A944CF61

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1512 e3706a-e370f4 CheckRemoteDebuggerPresent 1514 e370f6-e370fc 1512->1514 1515 e370fd-e37138 1512->1515 1514->1515
                                APIs
                                • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 00E370E7
                                Memory Dump Source
                                • Source File: 00000007.00000002.2498558270.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_e30000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: CheckDebuggerPresentRemote
                                • String ID:
                                • API String ID: 3662101638-0
                                • Opcode ID: 3181515346bbae011cf102f152b93c1c62e9da489e03e49cb39b6994ac53e3d3
                                • Instruction ID: 07069e003f6d526c0840d0248e191df85d9624a399b1d26df0d7e39a3fa8ee24
                                • Opcode Fuzzy Hash: 3181515346bbae011cf102f152b93c1c62e9da489e03e49cb39b6994ac53e3d3
                                • Instruction Fuzzy Hash: 832124B5C002598FDB24CF9AD485BEEBBF4AF49320F14842AE459B3250C7789A45CF60

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1524 64ba928-64ba9c4 DuplicateHandle 1525 64ba9cd-64ba9ea 1524->1525 1526 64ba9c6-64ba9cc 1524->1526 1526->1525
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 064BA9B7
                                Memory Dump Source
                                • Source File: 00000007.00000002.2502391660.00000000064B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064B0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_64b0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: de98a79ef7aaf951f8bdd44365485c1bf7173455f12b593a0e32572c6abcdb56
                                • Instruction ID: cd345a8a59d2f853346fcb8e4f353daf137266a84c4b62383e2f7a4379713bb7
                                • Opcode Fuzzy Hash: de98a79ef7aaf951f8bdd44365485c1bf7173455f12b593a0e32572c6abcdb56
                                • Instruction Fuzzy Hash: AA21E4B5D10208DFDB10CFAAD984AEEBBF5EB48310F14841AE958A3350D375A945DFA1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1529 64ba930-64ba9c4 DuplicateHandle 1530 64ba9cd-64ba9ea 1529->1530 1531 64ba9c6-64ba9cc 1529->1531 1531->1530
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 064BA9B7
                                Memory Dump Source
                                • Source File: 00000007.00000002.2502391660.00000000064B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064B0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_64b0000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: b66b29073975020208f152f7fb9171b4a75938656ef48d3efd6006be11246858
                                • Instruction ID: d92207dfe2bc96f437e17ca2b4b81dc549e2506f20c2a8b7a11945eeab175c6f
                                • Opcode Fuzzy Hash: b66b29073975020208f152f7fb9171b4a75938656ef48d3efd6006be11246858
                                • Instruction Fuzzy Hash: F221E4B5D10208DFDB10CF9AD984ADEFBF4EB48310F14841AE918A3350D375A944CFA0
                                Memory Dump Source
                                • Source File: 00000007.00000002.2496888053.0000000000B0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_b0d000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 73c734d5a5709dc968303117472e074b2e4c08bb1ded5c1eae4d7c6c359557dc
                                • Instruction ID: c33f38fb61ed4d346e517b5259abcd6870a4e276ac8430d28da2a20776015ed3
                                • Opcode Fuzzy Hash: 73c734d5a5709dc968303117472e074b2e4c08bb1ded5c1eae4d7c6c359557dc
                                • Instruction Fuzzy Hash: D321D075604200DFDB14DF54D9D4B16BFA5EB84324F20C5ADD84E4B2D6D336D847CA62
                                Memory Dump Source
                                • Source File: 00000007.00000002.2496888053.0000000000B0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_7_2_b0d000_H9YFiQB7o3.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 26fc60d63533a3438c2be5c108211631deb60a9d98e91a691cdce8eecfb46c16
                                • Instruction ID: 82347cf3d33c053fe82f59eef44316aa533ac19b172db13ee81cf6726944911b
                                • Opcode Fuzzy Hash: 26fc60d63533a3438c2be5c108211631deb60a9d98e91a691cdce8eecfb46c16
                                • Instruction Fuzzy Hash: E52162755083809FCB06CF54D994B11BFB1EB46314F28C5DAD8498F2E7D33A9856CB62