Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
zIpa.exe

Overview

General Information

Sample name:zIpa.exe
Analysis ID:1501600
MD5:1498dac596521e58327c2a3adf097c99
SHA1:c52325ad976cf3020fba6c2107676e0aaf03e143
SHA256:61e5404eafb1cd95fbeb3e3408a95ee888cfaa3ee1af913490f74fb9badd25ec
Tags:agentteslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • zIpa.exe (PID: 7736 cmdline: "C:\Users\user\Desktop\zIpa.exe" MD5: 1498DAC596521E58327C2A3ADF097C99)
    • powershell.exe (PID: 7904 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\zIpa.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7912 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 8136 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • zIpa.exe (PID: 7920 cmdline: "C:\Users\user\Desktop\zIpa.exe" MD5: 1498DAC596521E58327C2A3ADF097C99)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "cp8nl.hyperhost.ua", "Username": "specificationlog@mideaholdings.top", "Password": " 7213575aceACE@#$  "}
SourceRuleDescriptionAuthorStrings
00000004.00000002.2915654403.00000000027FE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.2915654403.0000000002829000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000004.00000002.2913652248.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000004.00000002.2913652248.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000004.00000002.2915654403.00000000027B1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            4.2.zIpa.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              4.2.zIpa.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                4.2.zIpa.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x33513:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x33585:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x3360f:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x336a1:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x3370b:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3377d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x33813:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x338a3:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.zIpa.exe.42c4390.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.zIpa.exe.42c4390.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 12 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\zIpa.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\zIpa.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\zIpa.exe", ParentImage: C:\Users\user\Desktop\zIpa.exe, ParentProcessId: 7736, ParentProcessName: zIpa.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\zIpa.exe", ProcessId: 7904, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\zIpa.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\zIpa.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\zIpa.exe", ParentImage: C:\Users\user\Desktop\zIpa.exe, ParentProcessId: 7736, ParentProcessName: zIpa.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\zIpa.exe", ProcessId: 7904, ProcessName: powershell.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 185.174.175.187, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\zIpa.exe, Initiated: true, ProcessId: 7920, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49735
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\zIpa.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\zIpa.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\zIpa.exe", ParentImage: C:\Users\user\Desktop\zIpa.exe, ParentProcessId: 7736, ParentProcessName: zIpa.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\zIpa.exe", ProcessId: 7904, ProcessName: powershell.exe
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.2.zIpa.exe.42c4390.2.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "cp8nl.hyperhost.ua", "Username": "specificationlog@mideaholdings.top", "Password": " 7213575aceACE@#$ "}
                    Source: zIpa.exeReversingLabs: Detection: 52%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: zIpa.exeJoe Sandbox ML: detected
                    Source: zIpa.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: zIpa.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: zIpa.pdb source: zIpa.exe
                    Source: Binary string: zIpa.pdbSHA256: source: zIpa.exe

                    Networking

                    barindex
                    Source: Yara matchFile source: 0.2.zIpa.exe.42c4390.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.zIpa.exe.4289970.1.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.4:49735 -> 185.174.175.187:587
                    Source: Joe Sandbox ViewIP Address: 185.174.175.187 185.174.175.187
                    Source: Joe Sandbox ViewASN Name: ITLDC-NLUA ITLDC-NLUA
                    Source: global trafficTCP traffic: 192.168.2.4:49735 -> 185.174.175.187:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: cp8nl.hyperhost.ua
                    Source: zIpa.exe, 00000004.00000002.2915654403.0000000002806000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cp8nl.hyperhost.ua
                    Source: zIpa.exe, 00000004.00000002.2914071750.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2919046582.0000000006062000.00000004.00000020.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2914071750.0000000000B76000.00000004.00000020.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2915654403.0000000002806000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: zIpa.exe, 00000004.00000002.2919046582.0000000006062000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: zIpa.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                    Source: zIpa.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                    Source: zIpa.exe, 00000004.00000002.2919046582.0000000006062000.00000004.00000020.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2914071750.0000000000B76000.00000004.00000020.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2915654403.0000000002806000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                    Source: zIpa.exeString found in binary or memory: http://ocsp.comodoca.com0
                    Source: zIpa.exe, 00000004.00000002.2919046582.0000000006062000.00000004.00000020.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2914071750.0000000000B76000.00000004.00000020.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2915654403.0000000002806000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                    Source: zIpa.exe, 00000000.00000002.1694123489.00000000032E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: zIpa.exe, 00000000.00000002.1695231282.0000000004289000.00000004.00000800.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2913652248.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: zIpa.exe, 00000004.00000002.2919046582.0000000006062000.00000004.00000020.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2914071750.0000000000B76000.00000004.00000020.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2915654403.0000000002806000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                    Source: zIpa.exeString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.zIpa.exe.42c4390.2.raw.unpack, 8WWn.cs.Net Code: uhcY
                    Source: 0.2.zIpa.exe.4289970.1.raw.unpack, 8WWn.cs.Net Code: uhcY

                    System Summary

                    barindex
                    Source: 4.2.zIpa.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.zIpa.exe.42c4390.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.zIpa.exe.4289970.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.zIpa.exe.42c4390.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.zIpa.exe.4289970.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 0_2_0170DE4C0_2_0170DE4C
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 4_2_00D84A984_2_00D84A98
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 4_2_00D89BFB4_2_00D89BFB
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 4_2_00D83E804_2_00D83E80
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 4_2_00D841C84_2_00D841C8
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 4_2_00D8D24B4_2_00D8D24B
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 4_2_05D305B84_2_05D305B8
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 4_2_05D3DCC84_2_05D3DCC8
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 4_2_05D3BCA84_2_05D3BCA8
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 4_2_05D33EF84_2_05D33EF8
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 4_2_05D32EE84_2_05D32EE8
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 4_2_05D356804_2_05D35680
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 4_2_05D38B334_2_05D38B33
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 4_2_05D39A884_2_05D39A88
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 4_2_05D335EF4_2_05D335EF
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 4_2_05D34FA04_2_05D34FA0
                    Source: zIpa.exeStatic PE information: invalid certificate
                    Source: zIpa.exe, 00000000.00000002.1694123489.00000000032F3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs zIpa.exe
                    Source: zIpa.exe, 00000000.00000002.1695231282.0000000004289000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename6a37924e-3615-49a6-8854-210337854d42.exe4 vs zIpa.exe
                    Source: zIpa.exe, 00000000.00000002.1695231282.0000000004289000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs zIpa.exe
                    Source: zIpa.exe, 00000000.00000002.1692802292.00000000014EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs zIpa.exe
                    Source: zIpa.exe, 00000000.00000002.1694123489.0000000003281000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs zIpa.exe
                    Source: zIpa.exe, 00000000.00000002.1706519155.0000000009480000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs zIpa.exe
                    Source: zIpa.exe, 00000000.00000002.1703768484.0000000007BC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs zIpa.exe
                    Source: zIpa.exe, 00000000.00000002.1694123489.00000000032E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename6a37924e-3615-49a6-8854-210337854d42.exe4 vs zIpa.exe
                    Source: zIpa.exe, 00000004.00000002.2913943284.00000000008F9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs zIpa.exe
                    Source: zIpa.exe, 00000004.00000002.2913652248.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename6a37924e-3615-49a6-8854-210337854d42.exe4 vs zIpa.exe
                    Source: zIpa.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 4.2.zIpa.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.zIpa.exe.42c4390.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.zIpa.exe.4289970.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.zIpa.exe.42c4390.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.zIpa.exe.4289970.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: zIpa.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.zIpa.exe.42c4390.2.raw.unpack, G39cBQ.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.zIpa.exe.42c4390.2.raw.unpack, G39cBQ.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.zIpa.exe.42c4390.2.raw.unpack, sDtvQjPGfa.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.zIpa.exe.42c4390.2.raw.unpack, sDtvQjPGfa.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.zIpa.exe.42c4390.2.raw.unpack, sDtvQjPGfa.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.zIpa.exe.42c4390.2.raw.unpack, sDtvQjPGfa.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.zIpa.exe.42c4390.2.raw.unpack, b1PPCKov2KZ.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.zIpa.exe.42c4390.2.raw.unpack, b1PPCKov2KZ.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, HxlrlCNmyiPjid08vs.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, hNLuaXukMEaK5TXU3r.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, hNLuaXukMEaK5TXU3r.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, hNLuaXukMEaK5TXU3r.csSecurity API names: _0020.AddAccessRule
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/6@1/1
                    Source: C:\Users\user\Desktop\zIpa.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\zIpa.exe.logJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7912:120:WilError_03
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qw4jqknp.3pk.ps1Jump to behavior
                    Source: zIpa.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: zIpa.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                    Source: C:\Users\user\Desktop\zIpa.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\zIpa.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\zIpa.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: zIpa.exeReversingLabs: Detection: 52%
                    Source: unknownProcess created: C:\Users\user\Desktop\zIpa.exe "C:\Users\user\Desktop\zIpa.exe"
                    Source: C:\Users\user\Desktop\zIpa.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\zIpa.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\zIpa.exeProcess created: C:\Users\user\Desktop\zIpa.exe "C:\Users\user\Desktop\zIpa.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\Desktop\zIpa.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\zIpa.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess created: C:\Users\user\Desktop\zIpa.exe "C:\Users\user\Desktop\zIpa.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\zIpa.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: zIpa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: zIpa.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: zIpa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: zIpa.pdb source: zIpa.exe
                    Source: Binary string: zIpa.pdbSHA256: source: zIpa.exe

                    Data Obfuscation

                    barindex
                    Source: 0.2.zIpa.exe.9480000.4.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.zIpa.exe.32b5f28.0.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, hNLuaXukMEaK5TXU3r.cs.Net Code: ld5QsnmlNU System.Reflection.Assembly.Load(byte[])
                    Source: zIpa.exeStatic PE information: 0xDDD7FB8F [Wed Dec 10 18:29:35 2087 UTC]
                    Source: C:\Users\user\Desktop\zIpa.exeCode function: 0_2_0C1C0DF5 push FFFFFF8Bh; iretd 0_2_0C1C0DF7
                    Source: zIpa.exeStatic PE information: section name: .text entropy: 7.850969982598096
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, hlGaWn4UiLp1kRLxoQY.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'HClFUv3tXF', 'F2uF1QcuIv', 'ig0Fd8rYTS', 'UCeFTWYLWO', 'uZmFDIum8T', 'a8tFeIcFJG', 'dHMFHLcPQ0'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, Bmt4c3zBZSx25HueFG.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'vKo4gjOqcw', 'i6y4vZHSYF', 'KfN45nitsT', 'QMA4btQsiy', 'Mbm4fb5Yi5', 'zQc44qTdav', 'oWw4F7jl4s'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, rjHxmOwBuDOnWYl1vl.csHigh entropy of concatenated method names: 'xj4onn59QL', 'Q0Jo7019aA', 'FfAoq1QCdx', 'JGsqAbj7Oa', 'kQvqzyBkTk', 's4soKvhhb1', 'AZ3oMsj5PE', 'IqwoYwCH6k', 'Sbgot1mYWB', 'hdJoQKBxIK'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, vOPoaKIYVrR4KYuJmM.csHigh entropy of concatenated method names: 'ToString', 'a8L5SwrvNI', 'iZY5ijY6jh', 'jNp5EmgxNS', 'ovQ5JuugyQ', 'gMO5GWY1Mw', 'AWK5WU7MDV', 'M085kcB4mB', 'naw5X8sV8Q', 'k0k5yBWqbS'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, hNLuaXukMEaK5TXU3r.csHigh entropy of concatenated method names: 'Hoct8gaDL1', 'ElntnMhsKU', 'aCEtI1ZLhH', 'OhAt7vjOOJ', 'JLptNhSqN5', 'd96tq6bPC0', 'P7KtoFLBfW', 'NdWtBT9cgl', 'nQntcSEu1G', 'SG1tjSWA6D'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, hXwcwKsBNlHnMMNiEr.csHigh entropy of concatenated method names: 'yuaNZN0QWR', 'Sn1Na5TLL2', 'UKi7EajRDI', 'Ij47J4eWly', 'rFZ7GDvmld', 'U1T7WimYHk', 'RKm7kGZFm5', 'G6i7XcWZgM', 'Vb87yRRs02', 'tlX738W3bB'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, fgajisW65tNtVRPEWq.csHigh entropy of concatenated method names: 'zsjq8OHMlg', 'VBQqI3EGxB', 'XD7qNfJL4J', 'xaEqof7gaE', 'fJcqBhd5Mg', 'UAsNDmWZib', 'WqPNe1pPuu', 'NofNHO0nNE', 'sdLN0jusmU', 'XchNu3jw9t'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, fuFSaWfPepDuoCSxGp.csHigh entropy of concatenated method names: 'JepoLUCER3', 'XEGompLRFx', 'WHhosEVVxs', 'k4yohp2dAh', 'krwoZZN1Je', 'DJno2LCff2', 'Kc3oaS6U2B', 'qL5owTYXY4', 'kGMolqo94C', 'donop4YEuJ'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, w7cDA0eelrcqpvYNte.csHigh entropy of concatenated method names: 'QGnfnlwlLX', 'l22fIhiVLU', 'WGnf7xFJdl', 'hKvfNWkd0j', 'kdSfq437Xo', 'BGRfo54ZUJ', 'Ax7fBoeZ8w', 'WagfcFIoMA', 'dj4fjwOq59', 'JTEfrFw8SR'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, kvfK6svae6rojd1tt4.csHigh entropy of concatenated method names: 'CcEMocrDaC', 'unZMBs9S2U', 'WhEMjDDa2M', 'kTRMrJ9uqU', 'hCjMvVQNmi', 'pXkM5E1PKG', 'eBoZnnitPu28Vjfpqc', 'vtIXElv2PqyPb1egoU', 'H2fMMWlLkk', 'XAqMtq189k'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, bMyiq2K0xySh3PaVLd.csHigh entropy of concatenated method names: 'KaE7hRSM4A', 'gcs72PGg3L', 'nNW7weMrNc', 'j6f7l4qHIS', 'tBx7vaggBE', 'f0w75spihm', 'Qwb7brLT7E', 'QvD7fj3JfQ', 'LdQ746efcM', 'm957FtkcNs'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, pUU4lj84B8x8POeqpI.csHigh entropy of concatenated method names: 'Jcbv3pKdFH', 'qK7v9Jult7', 'BNcvU65FaT', 'AbPv1b4QFL', 'cKwviwexWf', 'YcsvEkyqNF', 'Y18vJcc7Cj', 'cb4vGYUNMG', 'm65vWOJEJ7', 'JW9vkkwSIb'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, HxlrlCNmyiPjid08vs.csHigh entropy of concatenated method names: 'G6hIUtfIrH', 'zf1I1dtOur', 'dS6IdYqB3n', 's8oIT8lr6F', 'SlVIDIMTyZ', 'qXSIeHfqY5', 'KkdIH6PnWJ', 'GExI0cZl7p', 'zaQIulLheP', 'MWVIAEKtQA'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, ov6ZKdASXAOA8RgFvK.csHigh entropy of concatenated method names: 'WPlgw9WZoO', 'yYogl2m8WT', 'UGfgRRCI3K', 'vMFgih9igc', 'E6bgJvAdZM', 'sLcgGW3Ksa', 'o9Ogkp7LLf', 'Io3gXfSBRQ', 'TTdg3ihwVI', 'n9YgSxHkLT'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, wRA76uogtTN6P734fM.csHigh entropy of concatenated method names: 'UvOskqkBF', 'FF3hSyJNw', 'HKs2Y6K4w', 'hfCahU7Vy', 'ELal4WVU9', 'fccptn5MU', 'IolkqFJtKQqSV79rIn', 'Po3OTGeVmNK1MD7fdf', 'h53fFANbY', 'JPnFvSHac'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, CC3rq1F242Z3qf6kAC.csHigh entropy of concatenated method names: 'AtN4Ms9N8f', 'gxD4tLEDnD', 'Pwb4QRUtqa', 'iYH4nTgMJr', 'iMl4ImAECs', 'uJB4NceVAE', 'Ju74qaYlvc', 'HKhfHPYp0S', 'oatf0j4v0O', 'xEJfulRQmp'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, RLodU5jB8FAwgqRYfx.csHigh entropy of concatenated method names: 'UDDb0kjXp5', 'dBDbAhhBCS', 'pX2fKxwa0q', 'wI3fMDHZvt', 'Sn9bSwpMra', 'fjdb9UENyI', 'PvMbP4lnDN', 'zgGbU7YBXV', 'koDb1T5f0M', 'Ge4bdH4uC3'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, sryyyS4oeEOBeY5To7w.csHigh entropy of concatenated method names: 'L09FLnsOQW', 'xONFmY08hT', 'MZgFsW1vJd', 'mOpncJrLkFoYdAZU4Av', 'P6xHMervBLN5YowoJKN', 'KEwhmmrynsjNcEbPuhZ', 'Y9nsfOrZav684qlJRJl', 'B8GFQnrb2FXBeAsNb0y', 'RY51TkrqaAyEIGTHVU9'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, tOk1WK4bo3fRylkBQQk.csHigh entropy of concatenated method names: 'cMv4LHNPN7', 'XOX4mNmee1', 'FnH4sxqDVT', 'wfe4hXbReV', 'vxC4ZsFPsS', 'naw42KrC3B', 'JSp4aWu56X', 'IEJ4wnJ6pm', 'xPk4l6K5J7', 'GWk4p6naqx'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, nNKEtRakFheZIKdyO2.csHigh entropy of concatenated method names: 'Dispose', 'EcRMuigMyo', 'BCZYifq92H', 'vRYxxhOEIB', 'oMDMAxZmJf', 'FOfMzg6doc', 'ProcessDialogKey', 'ErGYK2E1b2', 'GrBYMMnetm', 'STYYY0SxDl'
                    Source: 0.2.zIpa.exe.7bc0000.3.raw.unpack, YiTCvsl7A22HKHATMU.csHigh entropy of concatenated method names: 'wIWfRNhelk', 'Lqqfi3QjIH', 'cnKfECqdAL', 'o1pfJcy1hF', 'JF5fUlAFma', 'uZbfGwCkR9', 'Next', 'Next', 'Next', 'NextBytes'

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: zIpa.exe PID: 7736, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\zIpa.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\zIpa.exeMemory allocated: 1700000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeMemory allocated: 3280000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeMemory allocated: 5280000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeMemory allocated: 94B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeMemory allocated: A4B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeMemory allocated: A6C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeMemory allocated: B6C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeMemory allocated: D40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeMemory allocated: 27B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeMemory allocated: 2670000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7417Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2186Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeWindow / User API: threadDelayed 2242Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeWindow / User API: threadDelayed 2872Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 7756Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8100Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -15679732462653109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8124Thread sleep count: 2242 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -99859s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8124Thread sleep count: 2872 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -99749s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -99640s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -99531s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -99421s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -99312s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -99203s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -99092s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -98983s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -98874s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -98546s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -98281s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -98140s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -98031s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -97921s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -97812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -97702s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -97593s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -97484s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -97374s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -97265s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -97156s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -97044s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -96921s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -96812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -96702s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exe TID: 8116Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\zIpa.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\zIpa.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 99859Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 99749Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 99640Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 99531Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 99421Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 99312Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 99203Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 99092Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 98983Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 98874Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 98546Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 98281Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 98140Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 98031Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 97921Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 97812Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 97702Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 97593Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 97484Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 97374Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 97265Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 97156Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 97044Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 96921Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 96812Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 96702Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: zIpa.exe, 00000000.00000002.1692909840.0000000001522000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: zIpa.exe, 00000004.00000002.2914071750.0000000000B4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllE
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\zIpa.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\zIpa.exe"
                    Source: C:\Users\user\Desktop\zIpa.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\zIpa.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\zIpa.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeProcess created: C:\Users\user\Desktop\zIpa.exe "C:\Users\user\Desktop\zIpa.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Users\user\Desktop\zIpa.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\OFFSYM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Users\user\Desktop\zIpa.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 4.2.zIpa.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.zIpa.exe.42c4390.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.zIpa.exe.4289970.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.zIpa.exe.42c4390.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.zIpa.exe.4289970.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.2915654403.00000000027FE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2915654403.0000000002829000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2913652248.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2915654403.00000000027B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1695231282.0000000004289000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: zIpa.exe PID: 7736, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: zIpa.exe PID: 7920, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\zIpa.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\zIpa.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 4.2.zIpa.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.zIpa.exe.42c4390.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.zIpa.exe.4289970.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.zIpa.exe.42c4390.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.zIpa.exe.4289970.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.2913652248.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2915654403.00000000027B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1695231282.0000000004289000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: zIpa.exe PID: 7736, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: zIpa.exe PID: 7920, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 4.2.zIpa.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.zIpa.exe.42c4390.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.zIpa.exe.4289970.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.zIpa.exe.42c4390.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.zIpa.exe.4289970.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.2915654403.00000000027FE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2915654403.0000000002829000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2913652248.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2915654403.00000000027B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1695231282.0000000004289000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: zIpa.exe PID: 7736, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: zIpa.exe PID: 7920, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                    Software Packing
                    NTDS111
                    Security Software Discovery
                    Distributed Component Object Model1
                    Input Capture
                    11
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Timestomp
                    LSA Secrets1
                    Process Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials141
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Masquerading
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                    Virtualization/Sandbox Evasion
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                    Process Injection
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    zIpa.exe53%ReversingLabsByteCode-MSIL.Trojan.SnakeKeyLogger
                    zIpa.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                    http://www.fontbureau.com0%URL Reputationsafe
                    http://www.fontbureau.com/designersG0%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    http://www.fontbureau.com/designers/?0%URL Reputationsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    http://ocsp.sectigo.com00%URL Reputationsafe
                    http://www.fontbureau.com/designers?0%URL Reputationsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.fontbureau.com/designers0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    https://www.chiark.greenend.org.uk/~sgtatham/putty/00%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.fontbureau.com/designers80%URL Reputationsafe
                    http://www.fonts.com0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    http://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
                    http://cp8nl.hyperhost.ua0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    cp8nl.hyperhost.ua
                    185.174.175.187
                    truetrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#zIpa.exe, 00000004.00000002.2919046582.0000000006062000.00000004.00000020.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2914071750.0000000000B76000.00000004.00000020.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2915654403.0000000002806000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.apache.org/licenses/LICENSE-2.0zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.comzIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersGzIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://sectigo.com/CPS0zIpa.exe, 00000004.00000002.2919046582.0000000006062000.00000004.00000020.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2914071750.0000000000B76000.00000004.00000020.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2915654403.0000000002806000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/?zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/bThezIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://account.dyn.com/zIpa.exe, 00000000.00000002.1695231282.0000000004289000.00000004.00000800.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2913652248.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ocsp.sectigo.com0zIpa.exe, 00000004.00000002.2919046582.0000000006062000.00000004.00000020.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2914071750.0000000000B76000.00000004.00000020.00020000.00000000.sdmp, zIpa.exe, 00000004.00000002.2915654403.0000000002806000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers?zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.tiro.comzIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designerszIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.goodfont.co.krzIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.chiark.greenend.org.uk/~sgtatham/putty/0zIpa.exefalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlzIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comzIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDzIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNzIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/cThezIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmzIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnzIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/frere-user.htmlzIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/DPleasezIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers8zIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.comzIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sandoll.co.krzIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.urwpp.deDPleasezIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.zhongyicts.com.cnzIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namezIpa.exe, 00000000.00000002.1694123489.00000000032E8000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sakkal.comzIpa.exe, 00000000.00000002.1701404773.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://cp8nl.hyperhost.uazIpa.exe, 00000004.00000002.2915654403.0000000002806000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      185.174.175.187
                      cp8nl.hyperhost.uaUkraine
                      21100ITLDC-NLUAtrue
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1501600
                      Start date and time:2024-08-30 07:22:06 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 15s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:10
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:zIpa.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@7/6@1/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 72
                      • Number of non-executed functions: 1
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtCreateKey calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: zIpa.exe
                      TimeTypeDescription
                      01:22:57API Interceptor28x Sleep call for process: zIpa.exe modified
                      01:23:00API Interceptor17x Sleep call for process: powershell.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      185.174.175.187172491216448f4bc8ff309136c7e986bb20f1bf12028c8fb2faf6b3c0f8bd116ab9d41ffb9335.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                        INQUIRY#46789-AUG24.jsGet hashmaliciousAgentTeslaBrowse
                          PROFORMA INVOICEPI-RY93849HT.bat.exeGet hashmaliciousAgentTeslaBrowse
                            PROFORMA INVOICEPI-RY93849HT.pif.exeGet hashmaliciousAgentTeslaBrowse
                              TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exeGet hashmaliciousAgentTeslaBrowse
                                e-dekont_html.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  TNT Express Arrival Notice AWB 8013580_xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                    RDE890246U87-DCH9095490-BVF00088898U78.exeGet hashmaliciousAgentTeslaBrowse
                                      VHT548009889-WNY0890088R4678-DFV588890900.exeGet hashmaliciousAgentTeslaBrowse
                                        DGH99702I90-HY899239000YHG-PLV90-0090.exeGet hashmaliciousAgentTeslaBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          cp8nl.hyperhost.ua172491216448f4bc8ff309136c7e986bb20f1bf12028c8fb2faf6b3c0f8bd116ab9d41ffb9335.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          INQUIRY#46789-AUG24.jsGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          PROFORMA INVOICEPI-RY93849HT.bat.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          PROFORMA INVOICEPI-RY93849HT.pif.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          e-dekont_html.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 185.174.175.187
                                          TNT Express Arrival Notice AWB 8013580_xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          RDE890246U87-DCH9095490-BVF00088898U78.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          VHT548009889-WNY0890088R4678-DFV588890900.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          DGH99702I90-HY899239000YHG-PLV90-0090.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ITLDC-NLUA172491216448f4bc8ff309136c7e986bb20f1bf12028c8fb2faf6b3c0f8bd116ab9d41ffb9335.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          INQUIRY#46789-AUG24.jsGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          PROFORMA INVOICEPI-RY93849HT.bat.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          PROFORMA INVOICEPI-RY93849HT.pif.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          e-dekont_html.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 185.174.175.187
                                          TNT Express Arrival Notice AWB 8013580_xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          RDE890246U87-DCH9095490-BVF00088898U78.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          VHT548009889-WNY0890088R4678-DFV588890900.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          DGH99702I90-HY899239000YHG-PLV90-0090.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          No context
                                          No context
                                          Process:C:\Users\user\Desktop\zIpa.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1216
                                          Entropy (8bit):5.34331486778365
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                          Malicious:true
                                          Reputation:high, very likely benign file
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2232
                                          Entropy (8bit):5.379736180876081
                                          Encrypted:false
                                          SSDEEP:48:tWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//ZeUyus:tLHyIFKL3IZ2KRH9Ougos
                                          MD5:9D384A9EBEABB083763926A2E63505A6
                                          SHA1:3AB2DD8F7518A36D7E22EFD76FF25F3DFA25D889
                                          SHA-256:801BC488523F40135A2F58EE86844AD3AFD2EFD0AF5DD0F7DE40978E7EDE92DD
                                          SHA-512:03941519E7F748E7A151CDEFC2E6D98A19B2E077AB09C48822B3882D8BA39C8427A9766C26B3F28DB419385FD7F030C3A7D5FE5ADE4F796AE876921042F5FED9
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview:@...e.................................,..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Reputation:high, very likely benign file
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Reputation:high, very likely benign file
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.843225159168028
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                                          • Win32 Executable (generic) a (10002005/4) 49.93%
                                          • Windows Screen Saver (13104/52) 0.07%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          • DOS Executable Generic (2002/1) 0.01%
                                          File name:zIpa.exe
                                          File size:763'400 bytes
                                          MD5:1498dac596521e58327c2a3adf097c99
                                          SHA1:c52325ad976cf3020fba6c2107676e0aaf03e143
                                          SHA256:61e5404eafb1cd95fbeb3e3408a95ee888cfaa3ee1af913490f74fb9badd25ec
                                          SHA512:502aa2951a99208d0e63f98e50f7ad9b08809dbcc40db2024d0d0666141d68397b3fc43380dd933b38428201e1a6cff920afc2972e2a9d0bf483a132bd356938
                                          SSDEEP:12288:+0O1pVVEe3TBFLaGfOyd+kt7aYercRUNCAqaeZm8+2AzRv6P7AyOwkR:ArfjuG7+MbercuC08Oztu7AT3
                                          TLSH:78F4F1213AF82F9AD27AC7F91154500957B2B90B64AEE68A4ED771DF39F1F400B60E43
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..d..........v.... ........@.. ....................................@................................
                                          Icon Hash:90cececece8e8eb0
                                          Entrypoint:0x4b8276
                                          Entrypoint Section:.text
                                          Digitally signed:true
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0xDDD7FB8F [Wed Dec 10 18:29:35 2087 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Signature Valid:false
                                          Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                          Signature Validation Error:The digital signature of the object did not verify
                                          Error Number:-2146869232
                                          Not Before, Not After
                                          • 13/11/2018 00:00:00 08/11/2021 23:59:59
                                          Subject Chain
                                          • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                          Version:3
                                          Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                          Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                          Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                          Serial:7C1118CBBADC95DA3752C46E47A27438
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xb82220x4f.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xba0000x6a0.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0xb70000x3608
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xbc0000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0xb489c0x70.text
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000xb627c0xb6400c2c7c7f0799f7e1ff3320f4786bf6bbeFalse0.9021615655006858data7.850969982598096IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0xba0000x6a00x80029d32cb2ae8a759958b1e0f04256a961False0.3564453125data3.658521413541081IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0xbc0000xc0x200e9e5f92fb3e2709c00226ba09b5bde75False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_VERSION0xba0900x410data0.40384615384615385
                                          RT_MANIFEST0xba4b00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampSource PortDest PortSource IPDest IP
                                          Aug 30, 2024 07:23:01.196084976 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:01.202121019 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:01.203417063 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:02.069264889 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:02.070235014 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:02.075038910 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:02.245950937 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:02.246382952 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:02.251205921 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:02.422585964 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:02.524401903 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:02.529455900 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:02.713897943 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:02.713917971 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:02.713928938 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:02.713943005 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:02.713996887 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:02.714040041 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:02.801024914 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:02.866174936 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:02.871089935 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:03.041347027 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:03.071043015 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:03.076096058 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:03.249638081 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:03.250957966 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:03.255911112 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:03.427061081 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:03.427369118 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:03.432305098 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:03.620934010 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:03.621356964 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:03.626244068 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:03.796710968 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:03.796971083 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:03.801752090 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:03.976389885 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:03.976633072 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:03.981417894 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:04.158782005 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:04.159409046 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:04.159483910 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:04.159483910 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:04.159607887 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:23:04.164222002 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:04.164232016 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:04.164375067 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:04.465797901 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:23:04.506035089 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:24:41.181843042 CEST49735587192.168.2.4185.174.175.187
                                          Aug 30, 2024 07:24:41.186781883 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:24:41.357422113 CEST58749735185.174.175.187192.168.2.4
                                          Aug 30, 2024 07:24:41.361079931 CEST49735587192.168.2.4185.174.175.187
                                          TimestampSource PortDest PortSource IPDest IP
                                          Aug 30, 2024 07:23:01.159944057 CEST5453453192.168.2.41.1.1.1
                                          Aug 30, 2024 07:23:01.173067093 CEST53545341.1.1.1192.168.2.4
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Aug 30, 2024 07:23:01.159944057 CEST192.168.2.41.1.1.10xda6eStandard query (0)cp8nl.hyperhost.uaA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Aug 30, 2024 07:23:01.173067093 CEST1.1.1.1192.168.2.40xda6eNo error (0)cp8nl.hyperhost.ua185.174.175.187A (IP address)IN (0x0001)false
                                          TimestampSource PortDest PortSource IPDest IPCommands
                                          Aug 30, 2024 07:23:02.069264889 CEST58749735185.174.175.187192.168.2.4220-cp8nl.hyperhost.ua ESMTP Exim 4.97.1 #2 Fri, 30 Aug 2024 08:23:01 +0300
                                          220-We do not authorize the use of this system to transport unsolicited,
                                          220 and/or bulk e-mail.
                                          Aug 30, 2024 07:23:02.070235014 CEST49735587192.168.2.4185.174.175.187EHLO 965543
                                          Aug 30, 2024 07:23:02.245950937 CEST58749735185.174.175.187192.168.2.4250-cp8nl.hyperhost.ua Hello 965543 [8.46.123.33]
                                          250-SIZE 52428800
                                          250-8BITMIME
                                          250-PIPELINING
                                          250-PIPECONNECT
                                          250-STARTTLS
                                          250 HELP
                                          Aug 30, 2024 07:23:02.246382952 CEST49735587192.168.2.4185.174.175.187STARTTLS
                                          Aug 30, 2024 07:23:02.422585964 CEST58749735185.174.175.187192.168.2.4220 TLS go ahead

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:01:22:56
                                          Start date:30/08/2024
                                          Path:C:\Users\user\Desktop\zIpa.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\zIpa.exe"
                                          Imagebase:0xf10000
                                          File size:763'400 bytes
                                          MD5 hash:1498DAC596521E58327C2A3ADF097C99
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1695231282.0000000004289000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1695231282.0000000004289000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:2
                                          Start time:01:22:58
                                          Start date:30/08/2024
                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\zIpa.exe"
                                          Imagebase:0x5c0000
                                          File size:433'152 bytes
                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:3
                                          Start time:01:22:58
                                          Start date:30/08/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:01:22:58
                                          Start date:30/08/2024
                                          Path:C:\Users\user\Desktop\zIpa.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\zIpa.exe"
                                          Imagebase:0x440000
                                          File size:763'400 bytes
                                          MD5 hash:1498DAC596521E58327C2A3ADF097C99
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2915654403.00000000027FE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2915654403.0000000002829000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2913652248.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2913652248.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2915654403.00000000027B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2915654403.00000000027B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:false

                                          Target ID:5
                                          Start time:01:23:01
                                          Start date:30/08/2024
                                          Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                          Imagebase:0x7ff693ab0000
                                          File size:496'640 bytes
                                          MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:7.9%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:45
                                            Total number of Limit Nodes:6
                                            execution_graph 16005 170d7a0 16006 170d7a5 DuplicateHandle 16005->16006 16007 170d836 16006->16007 16008 1704668 16009 170467a 16008->16009 16010 1704686 16009->16010 16012 1704778 16009->16012 16013 170479d 16012->16013 16017 1704888 16013->16017 16021 1704878 16013->16021 16018 17048af 16017->16018 16019 170498c 16018->16019 16025 170449c 16018->16025 16022 1704889 16021->16022 16023 170449c CreateActCtxA 16022->16023 16024 170498c 16022->16024 16023->16024 16026 1705918 CreateActCtxA 16025->16026 16028 17059db 16026->16028 16029 170d558 16030 170d59e GetCurrentProcess 16029->16030 16032 170d5f0 GetCurrentThread 16030->16032 16033 170d5e9 16030->16033 16034 170d62d GetCurrentProcess 16032->16034 16035 170d626 16032->16035 16033->16032 16036 170d663 16034->16036 16035->16034 16037 170d68b GetCurrentThreadId 16036->16037 16038 170d6bc 16037->16038 16039 170b0a8 16042 170b190 16039->16042 16040 170b0b7 16043 170b1b1 16042->16043 16044 170b1d4 16042->16044 16043->16044 16050 170b838 16043->16050 16054 170b829 16043->16054 16044->16040 16045 170b1cc 16045->16044 16046 170b3d8 GetModuleHandleW 16045->16046 16047 170b405 16046->16047 16047->16040 16051 170b84c 16050->16051 16053 170b871 16051->16053 16058 170b428 16051->16058 16053->16045 16055 170b84c 16054->16055 16056 170b871 16055->16056 16057 170b428 LoadLibraryExW 16055->16057 16056->16045 16057->16056 16059 170ba18 LoadLibraryExW 16058->16059 16061 170ba91 16059->16061 16061->16053

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 294 170d553-170d5e7 GetCurrentProcess 298 170d5f0-170d624 GetCurrentThread 294->298 299 170d5e9-170d5ef 294->299 300 170d626-170d62c 298->300 301 170d62d-170d661 GetCurrentProcess 298->301 299->298 300->301 303 170d663-170d669 301->303 304 170d66a-170d685 call 170d728 301->304 303->304 307 170d68b-170d6ba GetCurrentThreadId 304->307 308 170d6c3-170d725 307->308 309 170d6bc-170d6c2 307->309 309->308
                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 0170D5D6
                                            • GetCurrentThread.KERNEL32 ref: 0170D613
                                            • GetCurrentProcess.KERNEL32 ref: 0170D650
                                            • GetCurrentThreadId.KERNEL32 ref: 0170D6A9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693806533.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1700000_zIpa.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: 4ce1b694455ee49150dee2114b60e03f2091f855f6aa0e7bf9b7a47a5ed55ab4
                                            • Instruction ID: aa09ab17f76c085e569504a10e2258eccc694d287f424f64e899e6d28f7a1063
                                            • Opcode Fuzzy Hash: 4ce1b694455ee49150dee2114b60e03f2091f855f6aa0e7bf9b7a47a5ed55ab4
                                            • Instruction Fuzzy Hash: B65127B0901709CFDB14DFA9D948BEEFBF1AB88314F208469D459A73A0D7345984CF69

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 316 170d558-170d5e7 GetCurrentProcess 320 170d5f0-170d624 GetCurrentThread 316->320 321 170d5e9-170d5ef 316->321 322 170d626-170d62c 320->322 323 170d62d-170d661 GetCurrentProcess 320->323 321->320 322->323 325 170d663-170d669 323->325 326 170d66a-170d685 call 170d728 323->326 325->326 329 170d68b-170d6ba GetCurrentThreadId 326->329 330 170d6c3-170d725 329->330 331 170d6bc-170d6c2 329->331 331->330
                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 0170D5D6
                                            • GetCurrentThread.KERNEL32 ref: 0170D613
                                            • GetCurrentProcess.KERNEL32 ref: 0170D650
                                            • GetCurrentThreadId.KERNEL32 ref: 0170D6A9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693806533.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1700000_zIpa.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: 1e1cb60a0fc168961492da88dfb66a122000bdd43b4c507732b3ce781f77e05c
                                            • Instruction ID: 5f83d0adcf485186841163e8fc581d6af254898e44cab8303966aab7227e84a8
                                            • Opcode Fuzzy Hash: 1e1cb60a0fc168961492da88dfb66a122000bdd43b4c507732b3ce781f77e05c
                                            • Instruction Fuzzy Hash: 915136B0901309DFDB14DFAAD948B9EFBF1AB48314F208469D459A73A0DB349984CF69

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 360 170b190-170b1af 361 170b1b1-170b1be call 170a0f0 360->361 362 170b1db-170b1df 360->362 369 170b1c0 361->369 370 170b1d4 361->370 363 170b1e1-170b1eb 362->363 364 170b1f3-170b234 362->364 363->364 371 170b241-170b24f 364->371 372 170b236-170b23e 364->372 415 170b1c6 call 170b838 369->415 416 170b1c6 call 170b829 369->416 370->362 373 170b251-170b256 371->373 374 170b273-170b275 371->374 372->371 377 170b261 373->377 378 170b258-170b25f call 170a0fc 373->378 376 170b278-170b27f 374->376 375 170b1cc-170b1ce 375->370 379 170b310-170b3d0 375->379 380 170b281-170b289 376->380 381 170b28c-170b293 376->381 383 170b263-170b271 377->383 378->383 410 170b3d2-170b3d5 379->410 411 170b3d8-170b403 GetModuleHandleW 379->411 380->381 384 170b2a0-170b2a9 call 170a10c 381->384 385 170b295-170b29d 381->385 383->376 391 170b2b6-170b2bb 384->391 392 170b2ab-170b2b3 384->392 385->384 393 170b2d9-170b2e6 391->393 394 170b2bd-170b2c4 391->394 392->391 400 170b2e8-170b306 393->400 401 170b309-170b30f 393->401 394->393 396 170b2c6-170b2d6 call 170a11c call 170a12c 394->396 396->393 400->401 410->411 412 170b405-170b40b 411->412 413 170b40c-170b420 411->413 412->413 415->375 416->375
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0170B3F6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693806533.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1700000_zIpa.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: b112599a93aa024b3e8de325a3729644f2fb85a55af2cfeb4ecd3329baced18a
                                            • Instruction ID: 774169a999a4bf7fa20f157dc6d0364f4fb42061533e32f348f5f95acaa707ad
                                            • Opcode Fuzzy Hash: b112599a93aa024b3e8de325a3729644f2fb85a55af2cfeb4ecd3329baced18a
                                            • Instruction Fuzzy Hash: 2F812270A04B05CFDB26DF69D45479ABBF1FF88200F108A29D48ADBA91D774E945CB90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 417 170590c-17059d9 CreateActCtxA 419 17059e2-1705a3c 417->419 420 17059db-17059e1 417->420 427 1705a4b-1705a4f 419->427 428 1705a3e-1705a41 419->428 420->419 429 1705a60 427->429 430 1705a51-1705a5d 427->430 428->427 432 1705a61 429->432 430->429 432->432
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 017059C9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693806533.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1700000_zIpa.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: bbdb8b06aaac43750fe04c08541b3f90e33b6f6549c860c27e18dda7e19b303c
                                            • Instruction ID: 5718100c6e9641f0e2e20a2f99c3bff371bc6d5880032335c35ac2aa64de4a74
                                            • Opcode Fuzzy Hash: bbdb8b06aaac43750fe04c08541b3f90e33b6f6549c860c27e18dda7e19b303c
                                            • Instruction Fuzzy Hash: 1941ADB0C00719CFDB25CFA9C88479DBBF5BF49304F2484AAD408AB255DB756986CF91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 433 170449c-17059d9 CreateActCtxA 436 17059e2-1705a3c 433->436 437 17059db-17059e1 433->437 444 1705a4b-1705a4f 436->444 445 1705a3e-1705a41 436->445 437->436 446 1705a60 444->446 447 1705a51-1705a5d 444->447 445->444 449 1705a61 446->449 447->446 449->449
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 017059C9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693806533.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1700000_zIpa.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: e88bcb079ef01ff6c3f1a5a7fc66d459b1c2525c01a430cacc92f8bff43ffdab
                                            • Instruction ID: 3ea29579c12ef93c466a9558e572fc40ba0c20f117e91479af144ef71639da88
                                            • Opcode Fuzzy Hash: e88bcb079ef01ff6c3f1a5a7fc66d459b1c2525c01a430cacc92f8bff43ffdab
                                            • Instruction Fuzzy Hash: 0241B1B0C0071DCFDB24DFA9C94469DBBF5BF49304F24846AD408AB295DBB56985CF90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 450 170d798-170d79e 452 170d7a0-170d7a4 450->452 453 170d7a5-170d834 DuplicateHandle 450->453 452->453 454 170d836-170d83c 453->454 455 170d83d-170d85a 453->455 454->455
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0170D827
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693806533.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1700000_zIpa.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 6b44e21fa86301074c75eff6ca35ef54912bba82b1ce2723d01f2da498edb569
                                            • Instruction ID: f8a7ddb68e07f6b06b263781e4ec0c984c9553b8be0642ef96b92b973c10d4d6
                                            • Opcode Fuzzy Hash: 6b44e21fa86301074c75eff6ca35ef54912bba82b1ce2723d01f2da498edb569
                                            • Instruction Fuzzy Hash: 3D21D4B5900358DFDB10CF9AD584ADEFBF4EB48320F14801AE918A7250D374A940CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 458 170d7a0-170d834 DuplicateHandle 460 170d836-170d83c 458->460 461 170d83d-170d85a 458->461 460->461
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0170D827
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693806533.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1700000_zIpa.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: e3198880c0906d488dc7417bc5e931cb8b211953fd7b05308b1b0e027accf062
                                            • Instruction ID: bba4d09b297304fd5883b36fb143b17929a0f7c0cd14646bc83d5eafb7082efc
                                            • Opcode Fuzzy Hash: e3198880c0906d488dc7417bc5e931cb8b211953fd7b05308b1b0e027accf062
                                            • Instruction Fuzzy Hash: 0B21B3B5D00358DFDB10CF9AD584ADEFBF5EB48310F14841AE958A7250D374A944CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 464 170b428-170ba58 466 170ba60-170ba8f LoadLibraryExW 464->466 467 170ba5a-170ba5d 464->467 468 170ba91-170ba97 466->468 469 170ba98-170bab5 466->469 467->466 468->469
                                            APIs
                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0170B871,00000800,00000000,00000000), ref: 0170BA82
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693806533.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1700000_zIpa.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: dc3394f163342d7a76f94e4834504eecbe5d361043eb6612246a19048abe4b22
                                            • Instruction ID: 726f76459307206ff17744c86b0e0f46f45d66fc213ff6dddd3e9ca37779efec
                                            • Opcode Fuzzy Hash: dc3394f163342d7a76f94e4834504eecbe5d361043eb6612246a19048abe4b22
                                            • Instruction Fuzzy Hash: 751114B6D00349CFDB20CF9AD444ADEFBF4EB48310F10842AD519A7250C375A684CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 472 170ba10-170ba58 473 170ba60-170ba8f LoadLibraryExW 472->473 474 170ba5a-170ba5d 472->474 475 170ba91-170ba97 473->475 476 170ba98-170bab5 473->476 474->473 475->476
                                            APIs
                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0170B871,00000800,00000000,00000000), ref: 0170BA82
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693806533.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1700000_zIpa.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 9cbc10fbe478e616fe889b49d401f6b3f1fafaa0a65590ec51eb18d557f55c97
                                            • Instruction ID: 43a5fe68737869efa3a3914d040c1ecd03a482035c2ca59c321c84fb8afe76ee
                                            • Opcode Fuzzy Hash: 9cbc10fbe478e616fe889b49d401f6b3f1fafaa0a65590ec51eb18d557f55c97
                                            • Instruction Fuzzy Hash: 9A1114B6C00349CFDB10CF9AD884ADEFBF5EB88314F14842AD519A7650C775A645CFA4

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 479 170b390-170b3d0 480 170b3d2-170b3d5 479->480 481 170b3d8-170b403 GetModuleHandleW 479->481 480->481 482 170b405-170b40b 481->482 483 170b40c-170b420 481->483 482->483
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0170B3F6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693806533.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1700000_zIpa.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: 88d4d6e63ad1fccbdef4b9b4bf8cda12da5dd28dd3e6c13f50f748feef917d2e
                                            • Instruction ID: c36acbf41b95329841cab5da6bff132a60af7947c29239e88659c0aca9110e53
                                            • Opcode Fuzzy Hash: 88d4d6e63ad1fccbdef4b9b4bf8cda12da5dd28dd3e6c13f50f748feef917d2e
                                            • Instruction Fuzzy Hash: DB110FB5C00349CFDB10CF9AD444ADEFBF4EB88220F10842AD928B7250C375A645CFA5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693506947.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_16ad000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 306c31b478208ecf0ef9e6def2aca098b4b7d33384d5e4a231e86e9a71fe0a71
                                            • Instruction ID: 7da685c72549d0b6111dc592e1571159958bb060aecfb57dcb2f88f75596366b
                                            • Opcode Fuzzy Hash: 306c31b478208ecf0ef9e6def2aca098b4b7d33384d5e4a231e86e9a71fe0a71
                                            • Instruction Fuzzy Hash: D92122B1500240EFDB05DF58DDC0B2ABFA5FB88318F64C569E9890B756C336D856CBA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693540480.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_16bd000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 93be28bfa2718bfe7da1ae2df3645baed5178cfaedbe9fb68b65cf88904db6e8
                                            • Instruction ID: 1496f4d87fbc462180e58ff6b9ecc379f6f46ada7ac89b19fd32465b0c82825f
                                            • Opcode Fuzzy Hash: 93be28bfa2718bfe7da1ae2df3645baed5178cfaedbe9fb68b65cf88904db6e8
                                            • Instruction Fuzzy Hash: 74210071604200DFCB15DF58D9C4B66BFA5EB88318F20C569D80A4F396C33AD487CB61
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693540480.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_16bd000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f6c5ecb814c84869cf02fb0b005d1e908869d35d37d6411c7201116d6b19aa5f
                                            • Instruction ID: 2182f61187b23870f3e62a13ddff45ff221cd31ce779dcc38721ac46c0da5bf6
                                            • Opcode Fuzzy Hash: f6c5ecb814c84869cf02fb0b005d1e908869d35d37d6411c7201116d6b19aa5f
                                            • Instruction Fuzzy Hash: 9F210471504280EFDB05DF98D9C0B66BBA5FB84328F20C66DEA094F356C336D886CB61
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693540480.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_16bd000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 24bdc433ac8278ff1e89f5b3c054c06b055fac3efa8beb40134c3425a00efd82
                                            • Instruction ID: 1578be7c9c6c173a547eb4efb14d824f45b83957e86804f8fbdf35ef2d352f8f
                                            • Opcode Fuzzy Hash: 24bdc433ac8278ff1e89f5b3c054c06b055fac3efa8beb40134c3425a00efd82
                                            • Instruction Fuzzy Hash: 22219F755093808FDB03CF24D9D4B15BF71EB46218F28C5DAD8498F2A7C33A984ACB62
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693506947.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_16ad000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                            • Instruction ID: 22de7bd28a39bcaf8e965b827c170b7da790423848aa136a37f9e88ddb1da3a7
                                            • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                            • Instruction Fuzzy Hash: 5411E172404280CFCB02CF54D9C4B1ABF71FB84318F24C6A9D8490B656C336D85ACFA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693540480.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_16bd000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                            • Instruction ID: 74ec0d93d110fcaeed9e16f6e06e9dfb8e9964beae129877a939767243879480
                                            • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                            • Instruction Fuzzy Hash: DE11BB75504280DFDB02CF54C9C4B55BFA1FB84228F24C6AAD9494F396C33AD44ACB61
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1707377996.000000000C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0C1C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_c1c0000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 627955dd70faeafb573bb0b7a3fe9ae144790af55b29abd9cca7e4e55e900226
                                            • Instruction ID: 7083d748723cd3ece9787f220a7298149df219204836f031073dcc38904ab809
                                            • Opcode Fuzzy Hash: 627955dd70faeafb573bb0b7a3fe9ae144790af55b29abd9cca7e4e55e900226
                                            • Instruction Fuzzy Hash: 53016934E05258EFCB109FB4D8887FDBBB0AB0A301F0494AAE459A3282C3748A40DF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693506947.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_16ad000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3a301f080fb780cbd22d1acc4470ab0eb17640173565bd5478ce4087493e5a16
                                            • Instruction ID: a31bfe3c09a03dcff7588e82c52c42ed016ee1751dad7e7b21b62f48bc44780f
                                            • Opcode Fuzzy Hash: 3a301f080fb780cbd22d1acc4470ab0eb17640173565bd5478ce4087493e5a16
                                            • Instruction Fuzzy Hash: EA01A7710083809AE7154A6ADD84777BFE8EF41324F58C56AED094A796C779DC40CA71
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1707377996.000000000C1C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0C1C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_c1c0000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 89d96049fe6ea08c9f2839f4766f5a95800afed6f71e5f94330391f09508086b
                                            • Instruction ID: c36ba8b08473b9c9c479aa0d2cacc4fedc7efe38ebace6473850362ce18b6f09
                                            • Opcode Fuzzy Hash: 89d96049fe6ea08c9f2839f4766f5a95800afed6f71e5f94330391f09508086b
                                            • Instruction Fuzzy Hash: 45015A30E01219EFCB14DFA5C8487BEFBF0AB0A301F1494AAE429A3291D7788A40DF54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693506947.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_16ad000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3153b9775f0057f37bdf299916576f15e1fa1b74c1ae97b39dac85182634f5d9
                                            • Instruction ID: 5afa04638fdc0df1d408790012ce4612006c8a3241980db695db7a2ffb4f5da2
                                            • Opcode Fuzzy Hash: 3153b9775f0057f37bdf299916576f15e1fa1b74c1ae97b39dac85182634f5d9
                                            • Instruction Fuzzy Hash: 1FF062714043849EE7158A1ADC84B66FFE8EF51624F18C45AED094A787C379AC44CAB1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1693806533.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_1700000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6f1550b868ee01306580437ac87c83ea3531902d360fd3bf6d9ec6227ba13f57
                                            • Instruction ID: 37c48df6c56ea5d5b859db71deff39e0c71318b0441f2e1b75957f70db1973a7
                                            • Opcode Fuzzy Hash: 6f1550b868ee01306580437ac87c83ea3531902d360fd3bf6d9ec6227ba13f57
                                            • Instruction Fuzzy Hash: C4A15D36A00315CFCF26DFA8C88459EFBF2FF98300B15456AE905AB299DB71E945CB40

                                            Execution Graph

                                            Execution Coverage:13%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:23
                                            Total number of Limit Nodes:5
                                            execution_graph 25457 d80848 25459 d8084e 25457->25459 25458 d8091b 25459->25458 25462 d8148b 25459->25462 25467 d8137f 25459->25467 25464 d81396 25462->25464 25463 d81484 25463->25459 25464->25463 25466 d8148b GlobalMemoryStatusEx 25464->25466 25472 d87090 25464->25472 25466->25464 25468 d81352 25467->25468 25469 d81383 25467->25469 25468->25459 25469->25468 25470 d87090 GlobalMemoryStatusEx 25469->25470 25471 d8148b GlobalMemoryStatusEx 25469->25471 25470->25469 25471->25469 25473 d8709a 25472->25473 25474 d870b4 25473->25474 25477 5d3d320 25473->25477 25481 5d3d358 25473->25481 25474->25464 25478 5d3d32d 25477->25478 25479 5d3d57e 25478->25479 25480 5d3d598 GlobalMemoryStatusEx 25478->25480 25479->25474 25480->25478 25482 5d3d36d 25481->25482 25483 5d3d57e 25482->25483 25484 5d3d598 GlobalMemoryStatusEx 25482->25484 25483->25474 25484->25482
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 757b59f6a97237072d7853885c231f6fbde1f2dafc548b657ecb573df465bb59
                                            • Instruction ID: 2af2b1197f38b94aa71aa2b4e2c0d12a244c10b05d2a0e07b68705197572a60a
                                            • Opcode Fuzzy Hash: 757b59f6a97237072d7853885c231f6fbde1f2dafc548b657ecb573df465bb59
                                            • Instruction Fuzzy Hash: AA53E831D10B1A8ADB11EF68C8945A9F7B1FF99300F15D79AE45877221EB70AAC4CF81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \Vel
                                            • API String ID: 0-2485161877
                                            • Opcode ID: 9b8aa3bd6ed219c2301831df5042baec6b4133a1c820c6c15e1bf3463f983f42
                                            • Instruction ID: 85ca0acd13de0bdcfcf2569b6e700d0f60ae836555a872d468a6469ad1046997
                                            • Opcode Fuzzy Hash: 9b8aa3bd6ed219c2301831df5042baec6b4133a1c820c6c15e1bf3463f983f42
                                            • Instruction Fuzzy Hash: AD917F70E0030A8FDF14DFA8C9957DEBBF2AF48704F188129E408A7254EB749985CBA1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5a372496b95b8a49367f96203c27e18c5291bd60d78044b923fe83d96e28eee5
                                            • Instruction ID: 2449ce047564224b6a2d19f51e4672e9e4356b15b659b0ac979ee0e573218956
                                            • Opcode Fuzzy Hash: 5a372496b95b8a49367f96203c27e18c5291bd60d78044b923fe83d96e28eee5
                                            • Instruction Fuzzy Hash: DAB15E70E0020A8FDF10DFA9D8957ADBBF2AF88314F188529D819E7294EB74D845CB91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2064 d84804-d8489c 2068 d8489e-d848a9 2064->2068 2069 d848e6-d848e8 2064->2069 2068->2069 2071 d848ab-d848b7 2068->2071 2070 d848ea-d84902 2069->2070 2078 d8494c-d8494e 2070->2078 2079 d84904-d8490f 2070->2079 2072 d848b9-d848c3 2071->2072 2073 d848da-d848e4 2071->2073 2075 d848c5 2072->2075 2076 d848c7-d848d6 2072->2076 2073->2070 2075->2076 2076->2076 2077 d848d8 2076->2077 2077->2073 2081 d84950-d84962 2078->2081 2079->2078 2080 d84911-d8491d 2079->2080 2082 d8491f-d84929 2080->2082 2083 d84940-d8494a 2080->2083 2088 d84969-d84995 2081->2088 2085 d8492b 2082->2085 2086 d8492d-d8493c 2082->2086 2083->2081 2085->2086 2086->2086 2087 d8493e 2086->2087 2087->2083 2089 d8499b-d849a9 2088->2089 2090 d849ab-d849b1 2089->2090 2091 d849b2-d849c0 2089->2091 2090->2091 2094 d849c8-d849d2 2091->2094 2095 d849dc-d84a0f 2094->2095 2098 d84a1f-d84a23 2095->2098 2099 d84a11-d84a15 2095->2099 2101 d84a33-d84a37 2098->2101 2102 d84a25-d84a29 2098->2102 2099->2098 2100 d84a17-d84a1a call d80ab8 2099->2100 2100->2098 2105 d84a39-d84a3d 2101->2105 2106 d84a47-d84a4b 2101->2106 2102->2101 2104 d84a2b-d84a2e call d80ab8 2102->2104 2104->2101 2105->2106 2108 d84a3f 2105->2108 2109 d84a5b 2106->2109 2110 d84a4d-d84a51 2106->2110 2108->2106 2112 d84a5c 2109->2112 2110->2109 2111 d84a53 2110->2111 2111->2109 2112->2112
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \Vel$\Vel
                                            • API String ID: 0-3334154659
                                            • Opcode ID: 7bfb990844196a0ef100f659ef24b86d385ab3b536a6f3062536fa9aa107edb7
                                            • Instruction ID: c7d0e212c2d3664798f23a89dd4f8596d3bce4eebf8408b135547515d5af2054
                                            • Opcode Fuzzy Hash: 7bfb990844196a0ef100f659ef24b86d385ab3b536a6f3062536fa9aa107edb7
                                            • Instruction Fuzzy Hash: 5D716D70E0024ADFDF14EFA9C9857DEBBF1AF48314F188129E414AB254EB749845CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2113 d84810-d8489c 2116 d8489e-d848a9 2113->2116 2117 d848e6-d848e8 2113->2117 2116->2117 2119 d848ab-d848b7 2116->2119 2118 d848ea-d84902 2117->2118 2126 d8494c-d8494e 2118->2126 2127 d84904-d8490f 2118->2127 2120 d848b9-d848c3 2119->2120 2121 d848da-d848e4 2119->2121 2123 d848c5 2120->2123 2124 d848c7-d848d6 2120->2124 2121->2118 2123->2124 2124->2124 2125 d848d8 2124->2125 2125->2121 2129 d84950-d849a9 2126->2129 2127->2126 2128 d84911-d8491d 2127->2128 2130 d8491f-d84929 2128->2130 2131 d84940-d8494a 2128->2131 2138 d849ab-d849b1 2129->2138 2139 d849b2-d849d2 2129->2139 2133 d8492b 2130->2133 2134 d8492d-d8493c 2130->2134 2131->2129 2133->2134 2134->2134 2135 d8493e 2134->2135 2135->2131 2138->2139 2143 d849dc-d84a0f 2139->2143 2146 d84a1f-d84a23 2143->2146 2147 d84a11-d84a15 2143->2147 2149 d84a33-d84a37 2146->2149 2150 d84a25-d84a29 2146->2150 2147->2146 2148 d84a17-d84a1a call d80ab8 2147->2148 2148->2146 2153 d84a39-d84a3d 2149->2153 2154 d84a47-d84a4b 2149->2154 2150->2149 2152 d84a2b-d84a2e call d80ab8 2150->2152 2152->2149 2153->2154 2156 d84a3f 2153->2156 2157 d84a5b 2154->2157 2158 d84a4d-d84a51 2154->2158 2156->2154 2160 d84a5c 2157->2160 2158->2157 2159 d84a53 2158->2159 2159->2157 2160->2160
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \Vel$\Vel
                                            • API String ID: 0-3334154659
                                            • Opcode ID: a3dc508e7ca859b6722f6ede1134748d2465c60552bb6da8855540a4e04a265a
                                            • Instruction ID: 177d929bc9c90d4df340ae699bdc1074c8ba9c383441d59bda5a1f8e5ae02a54
                                            • Opcode Fuzzy Hash: a3dc508e7ca859b6722f6ede1134748d2465c60552bb6da8855540a4e04a265a
                                            • Instruction Fuzzy Hash: F3718E70E0024ACFDB14EFA9C88579EBBF2BF48314F188129E415AB254EB749845CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2227 5d3e161-5d3e17b 2228 5d3e1a5-5d3e1c4 call 5d3d318 2227->2228 2229 5d3e17d-5d3e1a4 call 5d3d30c 2227->2229 2235 5d3e1c6-5d3e1c9 2228->2235 2236 5d3e1ca-5d3e229 2228->2236 2243 5d3e22b-5d3e22e 2236->2243 2244 5d3e22f-5d3e2bc GlobalMemoryStatusEx 2236->2244 2247 5d3e2c5-5d3e2ed 2244->2247 2248 5d3e2be-5d3e2c4 2244->2248 2248->2247
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2918694977.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5d30000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b6585c3ed838b71eb3cb92fbf17f1cffd10637ca4acf582d6cdbf2fefab59b24
                                            • Instruction ID: 2f03f82af29ff28e4e1fb7376c7c903ca686a226312a5781f2f6aaf3511d6abb
                                            • Opcode Fuzzy Hash: b6585c3ed838b71eb3cb92fbf17f1cffd10637ca4acf582d6cdbf2fefab59b24
                                            • Instruction Fuzzy Hash: 8C411272E043959FDB14DFA9D8042AEBBF5EF89210F14856BD405F7391DB78A840CB90
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(8B5504D9), ref: 05D3E2AF
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2918694977.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5d30000_zIpa.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: 2eb363089afbefd9d5fc8b933af03ec06b574b4f4dec421df2a99d7a00621994
                                            • Instruction ID: 42f8b1f8e757b9c3f83bbe7aa421385059d91b97a91b87c77c46eca433954ab6
                                            • Opcode Fuzzy Hash: 2eb363089afbefd9d5fc8b933af03ec06b574b4f4dec421df2a99d7a00621994
                                            • Instruction Fuzzy Hash: BF11D0B1C0065A9BDB10DF9AC545BDEFBB4AB48320F14816AD818A7250D378A944CFA5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,buq
                                            • API String ID: 0-4122549453
                                            • Opcode ID: eb2ec748d0bd4cdc7c1c6df91e233c49ffdae0bd4266b650e9f57df72606e3dc
                                            • Instruction ID: b5524fc62bcb1af9b80a3815df5c1ba479407d733d07318f8cd31ea76d4a8fb5
                                            • Opcode Fuzzy Hash: eb2ec748d0bd4cdc7c1c6df91e233c49ffdae0bd4266b650e9f57df72606e3dc
                                            • Instruction Fuzzy Hash: 7D91C170B002159FDB14EF78C880A2EBBB6EF84710F258569E549DB2E5DB31EC42C7A5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \Vel
                                            • API String ID: 0-2485161877
                                            • Opcode ID: 1f0b45f45ee4654897105a17718a2706965d3df4e9e3efa98564b67b7898d16f
                                            • Instruction ID: dad10fcde6879d14f227411441b78de4976b6edc27ea63d38848e89ff7d74a7b
                                            • Opcode Fuzzy Hash: 1f0b45f45ee4654897105a17718a2706965d3df4e9e3efa98564b67b7898d16f
                                            • Instruction Fuzzy Hash: 80916070E0030ADFDF10DFA8C9857DEBBF2AF58714F188129E419A7254DB749986CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,buq
                                            • API String ID: 0-4122549453
                                            • Opcode ID: baa6c572847e0c06bf9c8ea114e351a21102d96bbacfb30faa67dcaff21657a1
                                            • Instruction ID: cdef3e8dea16ccb0d73c618dd58a37b1740827775f19b1d207056a2412848d84
                                            • Opcode Fuzzy Hash: baa6c572847e0c06bf9c8ea114e351a21102d96bbacfb30faa67dcaff21657a1
                                            • Instruction Fuzzy Hash: B9517071B00615AFD704DF28C880F2ABBB6BF84714F15C659E4459B2E9CB32EC42C7A5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: PH^q
                                            • API String ID: 0-2549759414
                                            • Opcode ID: 9389a0c94a6627a022a73a014e1b434b52a410e08e793f80abb704463fe80755
                                            • Instruction ID: 6623857eda688ca5d15865eb153cab88a2ceca3e215eca0fa74ba5504b27ef60
                                            • Opcode Fuzzy Hash: 9389a0c94a6627a022a73a014e1b434b52a410e08e793f80abb704463fe80755
                                            • Instruction Fuzzy Hash: DB31EE307002058FDB05BB78D5942AF7BE2AB89300F244579D006DB395EE39DD46CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LR^q
                                            • API String ID: 0-2625958711
                                            • Opcode ID: f865f09fce86507ea5b1209e1d925b4a35c83f7ce1a483ebb0ff0d61eae8f820
                                            • Instruction ID: 3fdb9ef6fd5f2b13c4f23649f82c8616271c42220ae8d4ca572639cd95d544a1
                                            • Opcode Fuzzy Hash: f865f09fce86507ea5b1209e1d925b4a35c83f7ce1a483ebb0ff0d61eae8f820
                                            • Instruction Fuzzy Hash: 0B31AF31E102099BDF14DFA8D44079EB7B2FF85314F24852AE905EB240EB71EC46CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LR^q
                                            • API String ID: 0-2625958711
                                            • Opcode ID: 16c5b28ca263956fb079497e457856a8120d6d113a71bbde5e844150d7e6cfa4
                                            • Instruction ID: d494bc5fa1487f8d312bf5c39f814eacf1e21788040af3d90f49655de7aba985
                                            • Opcode Fuzzy Hash: 16c5b28ca263956fb079497e457856a8120d6d113a71bbde5e844150d7e6cfa4
                                            • Instruction Fuzzy Hash: 7E318B30E102099BDF14DFA9D854B9EB7B2FF85314F248429E905EB240EB71EC46CB61
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LR^q
                                            • API String ID: 0-2625958711
                                            • Opcode ID: e8052e660f80c5cec20fbde2cfc717e3ceb3a148f3af834b94cf3abc4f29c9c6
                                            • Instruction ID: dc02191956ed485fb1c79ff1c97a14c59ac241b0965dfc32f8582e0032b8a37a
                                            • Opcode Fuzzy Hash: e8052e660f80c5cec20fbde2cfc717e3ceb3a148f3af834b94cf3abc4f29c9c6
                                            • Instruction Fuzzy Hash: FD110830705240AFC706AB78905565E7FE6EFC6714F1488AED149CB353DA3598468396
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: df604b7c568a7249a3b121bcc0210dc19dfe471cda9d946dbeb0abebedea7f13
                                            • Instruction ID: b2e8ec2a2eddda0880ce2f6b1ba9003a6e701c8621a34fa1cc35aa4526073b42
                                            • Opcode Fuzzy Hash: df604b7c568a7249a3b121bcc0210dc19dfe471cda9d946dbeb0abebedea7f13
                                            • Instruction Fuzzy Hash: 0F126B31B012028FDF16AB38E44572D73A2EBC9354B248D39E005CB765DF76ECA69B91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: effe20ac7fa10bb01bac4e7291583644a13d1ac6306bcf62e151ce3e18686782
                                            • Instruction ID: 5e954559842791163001ba00d3a548ef74e72b1a186eb54b1284db5b807cd916
                                            • Opcode Fuzzy Hash: effe20ac7fa10bb01bac4e7291583644a13d1ac6306bcf62e151ce3e18686782
                                            • Instruction Fuzzy Hash: 12B16F34B002049FCB14EFA8D5A4AADB7F6EF88310F288565E946E7365DB35DD42CB50
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d51531e523a80fa312796d1ac73cd4d9ad320f584578c5353d0bf140680b1d57
                                            • Instruction ID: f4c7894d8eb5a82586109b0679b7eed2f3041eca57eb70cfd79da5bcd917e4bd
                                            • Opcode Fuzzy Hash: d51531e523a80fa312796d1ac73cd4d9ad320f584578c5353d0bf140680b1d57
                                            • Instruction Fuzzy Hash: 45A1CF70A002058FDF14EF68D8907AEFBB6EB85310F28856AE949DB395D734DC45CBA1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ef2d45e4bc4c43cf295380c617879c4f7191e8222a5a35d2228f7a83ba1bc0c0
                                            • Instruction ID: e49c2402cf29ca376c5031448da33986b6d5a9e7096c864249ff095d02ae565b
                                            • Opcode Fuzzy Hash: ef2d45e4bc4c43cf295380c617879c4f7191e8222a5a35d2228f7a83ba1bc0c0
                                            • Instruction Fuzzy Hash: 46B14D70E0021A8FDF10EFA9D9957DDBBF1BF48314F288529D818E7254EB749885CBA1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8fd0ab21036e8d1e0721deb3b4ad9b9bb39d3e4d7e2d901534b6197d98bc4bcf
                                            • Instruction ID: 957747be914577e392b155bc3e0ce4e0ab083e9a89a2aeacbc73b2427eb405f0
                                            • Opcode Fuzzy Hash: 8fd0ab21036e8d1e0721deb3b4ad9b9bb39d3e4d7e2d901534b6197d98bc4bcf
                                            • Instruction Fuzzy Hash: 85510374E002188FDB14DFA9C884BADBBB1BF48714F148129E819BB391D774A845CFA5
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 24f0d95b910319b25f325809e15ec7a6aa383579818fe76b63f4eea5ad3b13af
                                            • Instruction ID: 1afbcf0a0fab419d6daacfbbf5970a0fbaf8dcde84d89bd661985dccd200c8f4
                                            • Opcode Fuzzy Hash: 24f0d95b910319b25f325809e15ec7a6aa383579818fe76b63f4eea5ad3b13af
                                            • Instruction Fuzzy Hash: DE512574E002188FDB14DFA9C884B9DBBF1BF48714F188519E819BB391D774A845CFA5
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8677891dc559831990352a4be806f2842122e7fe983ca6ee250d0ed14750bd1e
                                            • Instruction ID: 966fb9048208e103070e3a0c1a8e7fe800424ee44cf836c2fcf0c16f46a24bfe
                                            • Opcode Fuzzy Hash: 8677891dc559831990352a4be806f2842122e7fe983ca6ee250d0ed14750bd1e
                                            • Instruction Fuzzy Hash: CC51DC312461418FC70AFB78FD90F5A7BB6EB9A304344CA69D0144B33EF7686989CB60
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7ef91f938a4cb9904ab2dd2410aede377a14e80c3d5f5b722ee7175acbe8b306
                                            • Instruction ID: 7b9c66a07a968afc9c2e5b7c6ff80aa9656458ecdfada26ef3717ad2caf04331
                                            • Opcode Fuzzy Hash: 7ef91f938a4cb9904ab2dd2410aede377a14e80c3d5f5b722ee7175acbe8b306
                                            • Instruction Fuzzy Hash: 2F51AB312521418FC70AFB78FD90F4A7BB6EB9A304745C969D0144733EEB686989CBA0
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 85ce933889b65fe533e35a0386fe11573322fb1cce7decf7f6957c3c1d452793
                                            • Instruction ID: 9ea03436ceb3fb98f13cc76261b216d15aefbac8cbed818e1ba34bf5a299d484
                                            • Opcode Fuzzy Hash: 85ce933889b65fe533e35a0386fe11573322fb1cce7decf7f6957c3c1d452793
                                            • Instruction Fuzzy Hash: CA31B579A012118FDF11BB78EC48B5E77B9EB49310F148A65E40AC7355EB34CC4B87A2
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c148d7556edd8d1b0311a70a7c90d4316469cc8e9f429fb5e511724b5fb2b130
                                            • Instruction ID: 8e667ca4a71bd71b5fc0eab6aff6b8ed082ac0d49e3d61963cd6eb6d304a6041
                                            • Opcode Fuzzy Hash: c148d7556edd8d1b0311a70a7c90d4316469cc8e9f429fb5e511724b5fb2b130
                                            • Instruction Fuzzy Hash: E331BCB490024DEFDF11EFA9D884AEDBFB0EF05314F148159E455AB264DB31584ACBA1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 41166cb86e2f8720b0cab82a017ec3216a545a7f99db31d7bb93ed7423c660e6
                                            • Instruction ID: f9cc508fead4e2b0657c32c7fe5949a00e717c3f77b7bc0a0debf521c50c8afe
                                            • Opcode Fuzzy Hash: 41166cb86e2f8720b0cab82a017ec3216a545a7f99db31d7bb93ed7423c660e6
                                            • Instruction Fuzzy Hash: 9241E3B0D00249DFDB10DFA9C984AEEBFB5FF48314F148429E409AB254DB75A945CB90
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 19b4217c1d7eb072abf18cd49dcb954d5d31b9a72be35c2dff6cbce1e9328774
                                            • Instruction ID: 01d4d12f192b26bcafc8c96e7cc82be74affbbb0f9d6842ba732fa891d7dd2ce
                                            • Opcode Fuzzy Hash: 19b4217c1d7eb072abf18cd49dcb954d5d31b9a72be35c2dff6cbce1e9328774
                                            • Instruction Fuzzy Hash: 04312935E0060A9BDB19DFA5D854A9EB7F2EF89304F148929E80AE7354DB70AC46CB50
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 934aa5362572bc13f792585cb76da5ac1eb779f92a5a26452571b5400ba673ef
                                            • Instruction ID: 71d61e155a39eafa41af5a2344babe05e6ce8f8ae047665a68b27007468c0694
                                            • Opcode Fuzzy Hash: 934aa5362572bc13f792585cb76da5ac1eb779f92a5a26452571b5400ba673ef
                                            • Instruction Fuzzy Hash: 53312935E0060A9BDB19DFA5D454A9EB7F2EF89304F148929E80AE7354DB70EC46CB90
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4a752deb57ba64e198f0499f3a1ec092a4c0e6607dc857f93011c30ae66a01af
                                            • Instruction ID: 67a5040541f79bd9175010d23d2892c2f04bb965688178130546125097bbc90a
                                            • Opcode Fuzzy Hash: 4a752deb57ba64e198f0499f3a1ec092a4c0e6607dc857f93011c30ae66a01af
                                            • Instruction Fuzzy Hash: 2741C0B0D002499FDB10DFA9C984ADEBFB5FF48314F14842AE419AB254DB75A945CB90
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b3b3149d364759ae04dc0e95305d31613061ba0d6eacd32ed2f1953e37455bf5
                                            • Instruction ID: 1c3e80c617bf7c7df6ff72e2b533f11160076dffd56f1e673958916c49358039
                                            • Opcode Fuzzy Hash: b3b3149d364759ae04dc0e95305d31613061ba0d6eacd32ed2f1953e37455bf5
                                            • Instruction Fuzzy Hash: 35319178A412108FEF25B638E488B6D3769EB57314F188929E10AC7355D629DC8F8762
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a3d7e56e0213092b137fff5c9d65613a61101383bf3f8c63f4fec19cb7979f0c
                                            • Instruction ID: a2789668233a302aa29531447ee81591ad5036ce1fe07e60db04eafd8b52c09c
                                            • Opcode Fuzzy Hash: a3d7e56e0213092b137fff5c9d65613a61101383bf3f8c63f4fec19cb7979f0c
                                            • Instruction Fuzzy Hash: C2314D71E1020AABDB05DFA4D8A47EEF7B6FF89300F588615E409AB354DB709D46CB90
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: efbb6fdce22de9b53c22233896a64cd3ac21bc3fedce80acccd299704313929c
                                            • Instruction ID: d1c4fd66218a039f64467c87befb4eec107ad55b793194b1f8e9a863a11112c6
                                            • Opcode Fuzzy Hash: efbb6fdce22de9b53c22233896a64cd3ac21bc3fedce80acccd299704313929c
                                            • Instruction Fuzzy Hash: F0319678A001019FEB12FB34E885B993779EB55314F198A65D04AC7259F734DC8B8BB2
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2667baf354003aa096b1d281949e1a8b7c651ef11b2065c53f924fb96dc56c59
                                            • Instruction ID: 350b0417daa4cf0c626ba3e0037d2f1f3a6a7b2b115ef6ffcfc13a1a44d7de85
                                            • Opcode Fuzzy Hash: 2667baf354003aa096b1d281949e1a8b7c651ef11b2065c53f924fb96dc56c59
                                            • Instruction Fuzzy Hash: EA213C31E0020AABDF05DFA5D8546AEF7B6FF89304F588619E805EB354DB70AC46CB90
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2914851299.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_cad000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9770765758996f24bbfad1e70fc89070e3f2c4d8faa654440ed442ea86d290f3
                                            • Instruction ID: 4554dc45a5048d54c63ca3a152876d1473ce0678c733115a5ad65ec5b8123c97
                                            • Opcode Fuzzy Hash: 9770765758996f24bbfad1e70fc89070e3f2c4d8faa654440ed442ea86d290f3
                                            • Instruction Fuzzy Hash: 07315E7550D3C49FC7138B24C990711BF71AB57218F29C5DBD98A8F6A3C23A980ACB62
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6a1b2052b0c94a6f1584af65d8ba7e19e79e80195089d6bfdde5ce240f244409
                                            • Instruction ID: 54d239c487f0c208b5fb12d7e7c415f31201e8c2c191c1fe5da2ac03875a17db
                                            • Opcode Fuzzy Hash: 6a1b2052b0c94a6f1584af65d8ba7e19e79e80195089d6bfdde5ce240f244409
                                            • Instruction Fuzzy Hash: 3721A931E0420A9BDB04DFA4D4546EEF7B2AF49304F18851AE855FB340DB70ED46CB60
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 999c0319803840a5578eaf8a349d7a5727eeb58241ea88b81716c93246066c4a
                                            • Instruction ID: 70f4abb5c0bfe07a38c629b316fb548a8c32b4e87534c2437b363f66ffaa6ffd
                                            • Opcode Fuzzy Hash: 999c0319803840a5578eaf8a349d7a5727eeb58241ea88b81716c93246066c4a
                                            • Instruction Fuzzy Hash: 4521C871B002048FDB18EF69C9A4BBEBBF5EF88710F288125E545EB3A4DA71DD048760
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f39417d921deb163ecbbc1b3d2a9f2bd3eb2a6029f643c40931d43ecd885bbef
                                            • Instruction ID: c1a7a036095140f34832bf2e9912b937b0865a98ac2022d3ffbbbb1cf5864942
                                            • Opcode Fuzzy Hash: f39417d921deb163ecbbc1b3d2a9f2bd3eb2a6029f643c40931d43ecd885bbef
                                            • Instruction Fuzzy Hash: 8B212834600205CFDB14EB68D959B9E77F1EF89314F204468E506EB365EB76DD02CBA0
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2914851299.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_cad000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fd44c8aec1485f0f3bd7d01a8f48eec7d2e00e7a47131b91dcd5fcc8fbae9613
                                            • Instruction ID: 0550860e328399ad4bc3878d842f17b92c759d6477e4f25b9e4a2cf708c143f1
                                            • Opcode Fuzzy Hash: fd44c8aec1485f0f3bd7d01a8f48eec7d2e00e7a47131b91dcd5fcc8fbae9613
                                            • Instruction Fuzzy Hash: 4B213471504201DFCB10DF14D9C0B26BBA5FB85318F20C56DD84B4B696C33AD847CA62
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aa212f55b252f39b18cd81463d5101fa5e123bf5a03f7d95c7689b25d65f82e2
                                            • Instruction ID: ae4a1bf5b56535c93a6b9107fc4e162598a50cd534560067cda10b19afeb1513
                                            • Opcode Fuzzy Hash: aa212f55b252f39b18cd81463d5101fa5e123bf5a03f7d95c7689b25d65f82e2
                                            • Instruction Fuzzy Hash: AE21A275A012148FDF31FFBC94913AD7BA8EB45311F2944BAD445E7202D635D88B87B1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f6df3e0844f72f9907da3b94b01524d0b81edd889664b7b35556f6653481b464
                                            • Instruction ID: 3f8e5dc4be3a079642bf7f4b45872998ae09a2590b5f655b29fec63b65c69b58
                                            • Opcode Fuzzy Hash: f6df3e0844f72f9907da3b94b01524d0b81edd889664b7b35556f6653481b464
                                            • Instruction Fuzzy Hash: B6215331E0420A9BDB09DFA4D854AAEF7B2AF89304F18851AE855F7340DB70AD46CB60
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c5ea54d163b35e1b327fd3ad3ea504ad6787e2b6b77623dcb007f8ebaa7ec230
                                            • Instruction ID: e3ce5757735c30e3b74190bf501a32a834646b1d69c0f943ebd91150f962b02e
                                            • Opcode Fuzzy Hash: c5ea54d163b35e1b327fd3ad3ea504ad6787e2b6b77623dcb007f8ebaa7ec230
                                            • Instruction Fuzzy Hash: 28212A34B00205CFDB14FB64C5657AE77FAAB49300F240468D506EB364EB369D4ACBB5
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6c00fa05c6e3e07a010570089615b7c3194addacba53b389e08f4488df57f42b
                                            • Instruction ID: 19978f85d1fe75a345136ca1a787a21801e0061864a282e760c1c45318ab6e49
                                            • Opcode Fuzzy Hash: 6c00fa05c6e3e07a010570089615b7c3194addacba53b389e08f4488df57f42b
                                            • Instruction Fuzzy Hash: 0A215C34B00205CFDB24FB64C565BAE37B5AF49304F2404A8D106EB391EB368D4ACB75
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 61d68c5c6e6a04a98134d253699f91f4ce8d6254704ef885554d4d366441f3df
                                            • Instruction ID: 1f513ce52746a62f6e48bdbca7a13a2e53b6234bd1c9b38c3f7c746690955fa6
                                            • Opcode Fuzzy Hash: 61d68c5c6e6a04a98134d253699f91f4ce8d6254704ef885554d4d366441f3df
                                            • Instruction Fuzzy Hash: ED2133386401019FEB12FB38E884F597779EB55314F148A25D00AC7369FB78DCCA8BA2
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 53edcbdfc570cfff6bb36c8820ec1b032e27188e6b5c5425d42dc4b68b99b26f
                                            • Instruction ID: c98bfbe4049c02cbe9d6bac437ac913f9c4b1951354dca76b1ebac5db16942f5
                                            • Opcode Fuzzy Hash: 53edcbdfc570cfff6bb36c8820ec1b032e27188e6b5c5425d42dc4b68b99b26f
                                            • Instruction Fuzzy Hash: 6321E434600205CFDB54EB78E959BAE77F1AF89304F204568E506EB3A5EB369D00CBA1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a697e71625e10e4c7db793072b840208f4c982b6350c24e8a013eb883a45b961
                                            • Instruction ID: 92ea2899d2bf8b6a4463689eb1b759729203fe1a143a229cb437cfec5b5b1d37
                                            • Opcode Fuzzy Hash: a697e71625e10e4c7db793072b840208f4c982b6350c24e8a013eb883a45b961
                                            • Instruction Fuzzy Hash: F7119130B012049FEFA47A79D41472E7AB5EB86314F24893AE006CB355EA65DDC98BE1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d08db8c444384b698910a0977ceecbf3029ebc58d60e12d6f4225e29aeccb176
                                            • Instruction ID: 51d9401a6631553caba6e92e2f63dd9126333923dbff934a539e2549d7783963
                                            • Opcode Fuzzy Hash: d08db8c444384b698910a0977ceecbf3029ebc58d60e12d6f4225e29aeccb176
                                            • Instruction Fuzzy Hash: C8110430B012009FEFA57674941077E3AB1EB86310F288A3AD002CB341EA64CDC98FE1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cf607d51ddb3b25263a28a3d650fc6368916f24f5a556de118844141973ce425
                                            • Instruction ID: f1a9a9291f97b12ffcbb9e476cde6d47444228e0070ab305ca1b59c2a62a0bd1
                                            • Opcode Fuzzy Hash: cf607d51ddb3b25263a28a3d650fc6368916f24f5a556de118844141973ce425
                                            • Instruction Fuzzy Hash: 0A018035A012158FCF21FFB884511AEBBF9EF48310B2544BAE805E7301E735E8468BB1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b0e9efa649d74bb3d842fa6e8de00dc45d5b0971ec5ced97f8aa98e4778f9310
                                            • Instruction ID: b1fda6f529192344cd3efaf78fc3e90a849749dae76862eff7b651c85086caac
                                            • Opcode Fuzzy Hash: b0e9efa649d74bb3d842fa6e8de00dc45d5b0971ec5ced97f8aa98e4778f9310
                                            • Instruction Fuzzy Hash: 3211C431A002048FDB05EF64D98435DBBA2FF84310F6881B5C98C5F2AADB70DD49CBA0
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4f27961e055a97411304a1242f1a9c5e53b664dbb7e15955482df6be6e15ae1a
                                            • Instruction ID: 721336c9e67a9b25793c53da1349801b91095d9d2e1c535f0cebbfb8530d7ca8
                                            • Opcode Fuzzy Hash: 4f27961e055a97411304a1242f1a9c5e53b664dbb7e15955482df6be6e15ae1a
                                            • Instruction Fuzzy Hash: 2911B730E1030ADEDF24EB94E99E7ECB7B2AF65319F18142AD011A21959B3448C9CB21
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1b1888449a5e2e716f85e42f051ed227e91f11ea8ed816b4aa40b32764ed274b
                                            • Instruction ID: 2664caeb8d7b39f5e64388c22a4bd7493761282bb82e9d606eaf2378b0725f19
                                            • Opcode Fuzzy Hash: 1b1888449a5e2e716f85e42f051ed227e91f11ea8ed816b4aa40b32764ed274b
                                            • Instruction Fuzzy Hash: 9F016730940249AFEF06FBB8E951E9DBBB5EF40304F108679C508DB259EF356E4A8791
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 85438f237f8722b0d6eb073ba96d433d46ebc7dbbef95070c4bbf92004081320
                                            • Instruction ID: c2c130c981d2c6e5566a6f81e37e90a4862eb6c3f3a9b2f81dc7cc9b7a0b5678
                                            • Opcode Fuzzy Hash: 85438f237f8722b0d6eb073ba96d433d46ebc7dbbef95070c4bbf92004081320
                                            • Instruction Fuzzy Hash: 2EF02B7BA04110CFDB22ABA894911ACBF78EE9432171D40E7D846DB252D231D84BC731
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1a8a028617784568e51b92f9cb1c1dc16a4a9830e5aa667f71655f7d366ec538
                                            • Instruction ID: 075cd5ae1b429b15ade60fa1636ecd0a46d6682adda3f7b62e9c4116f10c3fa5
                                            • Opcode Fuzzy Hash: 1a8a028617784568e51b92f9cb1c1dc16a4a9830e5aa667f71655f7d366ec538
                                            • Instruction Fuzzy Hash: D7F01435B402188FC714EB64D598B6D77B2EF88315F1084A8E50ACB3A0DB35AD02CB41
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2915110019.0000000000D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d80000_zIpa.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f619981fc418b2bb64fa6a66bc4bb1a841d5b2680a8fde8c0c5b3937d35adabf
                                            • Instruction ID: f105374685dd13483c5b9e690d9fada7bd7c85a82eea6cf109d51e2563c706e5
                                            • Opcode Fuzzy Hash: f619981fc418b2bb64fa6a66bc4bb1a841d5b2680a8fde8c0c5b3937d35adabf
                                            • Instruction Fuzzy Hash: 57F03134900109AFEB05FFB8E941E9DB7B5EF40304F108679C00897259EB356E498B91