Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1515080
MD5:19b9de641a480be1236dd9712d9ccc10
SHA1:a3cbbd66a0a3fbb2618c9283d44a0855059e9e6a
SHA256:c558e126c64a89887115a45276d5a8751f90c399eb32ca103f6e50901abc7abd
Tags:exeuser-Bitsight
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected RisePro Stealer
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found API chain indicative of debugger detection
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Modifies Windows Defender protection settings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • file.exe (PID: 7068 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 19B9DE641A480BE1236DD9712D9CCC10)
    • RegAsm.exe (PID: 6320 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • conhost.exe (PID: 3540 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7196 cmdline: "powershell" Get-MpPreference -verbose MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7388 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7416 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7464 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7512 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7572 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7608 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6 MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7636 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7648 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0 MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7724 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6 MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7832 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6 MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7900 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7944 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 8044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 8088 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2 MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 8120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 8924 cmdline: "cmd.exe" /c schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHEST MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • schtasks.exe (PID: 8944 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • cmd.exe (PID: 8960 cmdline: "cmd.exe" /c schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 LG" /sc ONLOGON /rl HIGHEST MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • schtasks.exe (PID: 8976 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
  • OfficeTrackerNMP2663.exe (PID: 9032 cmdline: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • conhost.exe (PID: 9064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • OfficeTrackerNMP2663.exe (PID: 9048 cmdline: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • conhost.exe (PID: 9072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MaxLoonaFest2663.exe (PID: 5400 cmdline: "C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • conhost.exe (PID: 6916 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MaxLoonaFest2663.exe (PID: 1316 cmdline: "C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • conhost.exe (PID: 4308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • FANBooster2663.exe (PID: 6092 cmdline: "C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • conhost.exe (PID: 5792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Process Memory Space: RegAsm.exe PID: 6320JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        Process Memory Space: RegAsm.exe PID: 6320JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: RegAsm.exe PID: 6320JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Click to see the 1 entries

            System Summary

            barindex
            Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "cmd.exe" /c schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHEST, CommandLine: "cmd.exe" /c schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHEST, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentProcessId: 6320, ParentProcessName: RegAsm.exe, ProcessCommandLine: "cmd.exe" /c schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHEST, ProcessId: 8924, ProcessName: cmd.exe
            Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "cmd.exe" /c schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHEST, CommandLine: "cmd.exe" /c schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHEST, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentProcessId: 6320, ParentProcessName: RegAsm.exe, ProcessCommandLine: "cmd.exe" /c schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHEST, ProcessId: 8924, ProcessName: cmd.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true, CommandLine|base64offset|contains: I~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentProcessId: 6320, ParentProcessName: RegAsm.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true, ProcessId: 7388, ProcessName: powershell.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true, CommandLine|base64offset|contains: I~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentProcessId: 6320, ParentProcessName: RegAsm.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true, ProcessId: 7388, ProcessName: powershell.exe
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ProcessId: 6320, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest2663
            Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ProcessId: 6320, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster2663.lnk
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell" Get-MpPreference -verbose, CommandLine: "powershell" Get-MpPreference -verbose, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentProcessId: 6320, ParentProcessName: RegAsm.exe, ProcessCommandLine: "powershell" Get-MpPreference -verbose, ProcessId: 7196, ProcessName: powershell.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-21T16:17:23.746997+020020490601A Network Trojan was detected192.168.2.749708118.194.235.18750500TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: file.exeAvira: detected
            Source: file.exeReversingLabs: Detection: 83%
            Source: file.exeVirustotal: Detection: 82%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: file.exeJoe Sandbox ML: detected
            Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: Binary string: RegAsm.pdb source: OfficeTrackerNMP2663.exe, 00000029.00000000.1519174884.00000000005F2000.00000002.00000001.01000000.00000009.sdmp, OfficeTrackerNMP2663.exe.8.dr, FANBooster2663.exe.8.dr, MaxLoonaFest2663.exe.8.dr
            Source: Binary string: RegAsm.pdb4 source: OfficeTrackerNMP2663.exe, 00000029.00000000.1519174884.00000000005F2000.00000002.00000001.01000000.00000009.sdmp, OfficeTrackerNMP2663.exe.8.dr, FANBooster2663.exe.8.dr, MaxLoonaFest2663.exe.8.dr
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0085A797 FindFirstFileExW,5_2_0085A797
            Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
            Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user
            Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData\Roaming
            Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
            Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
            Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2049060 - Severity 1 - ET MALWARE RisePro TCP Heartbeat Packet : 192.168.2.7:49708 -> 118.194.235.187:50500
            Source: global trafficTCP traffic: 192.168.2.7:49708 -> 118.194.235.187:50500
            Source: Joe Sandbox ViewIP Address: 118.194.235.187 118.194.235.187
            Source: Joe Sandbox ViewASN Name: SINOYCLOUD-AS-APSinoycloudLimitedHK SINOYCLOUD-AS-APSinoycloudLimitedHK
            Source: unknownTCP traffic detected without corresponding DNS query: 118.194.235.187
            Source: unknownTCP traffic detected without corresponding DNS query: 118.194.235.187
            Source: unknownTCP traffic detected without corresponding DNS query: 118.194.235.187
            Source: unknownTCP traffic detected without corresponding DNS query: 118.194.235.187
            Source: powershell.exe, 0000000B.00000002.1432686079.00000000061AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: powershell.exe, 0000000B.00000002.1366723527.0000000005296000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: powershell.exe, 0000000B.00000002.1366723527.0000000005296000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1366723527.0000000005141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: powershell.exe, 0000000B.00000002.1366723527.0000000005296000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
            Source: powershell.exe, 0000000B.00000002.1366723527.0000000005296000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: powershell.exe, 0000000B.00000002.1366723527.0000000005141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.myip.com/
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api64.ipify.org/?format=json
            Source: powershell.exe, 0000000B.00000002.1432686079.00000000061AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 0000000B.00000002.1432686079.00000000061AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 0000000B.00000002.1432686079.00000000061AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
            Source: powershell.exe, 0000000B.00000002.1366723527.0000000005296000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: powershell.exe, 0000000B.00000002.1464831316.000000000795E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.L
            Source: powershell.exe, 0000000B.00000002.1477941420.00000000079F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ion=v4.5
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://maxmind.com/geoip/v2.1/city/me
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://maxmind.com/geoip/v2.1/city/me/https://www.maxmind.com/en/locate-my-ip-address
            Source: powershell.exe, 0000000B.00000002.1432686079.00000000061AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess Stats: CPU usage > 49%
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05126578 NtAllocateVirtualMemory,8_2_05126578
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05126C30 NtQueryVolumeInformationFile,8_2_05126C30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_051264A0 NtProtectVirtualMemory,8_2_051264A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05126CF8 NtDeviceIoControlFile,8_2_05126CF8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_051268C0 NtOpenFile,8_2_051268C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_051263F0 NtClose,8_2_051263F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05126570 NtAllocateVirtualMemory,8_2_05126570
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05126C28 NtQueryVolumeInformationFile,8_2_05126C28
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05126498 NtProtectVirtualMemory,8_2_05126498
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05126CF3 NtDeviceIoControlFile,8_2_05126CF3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_051268BB NtOpenFile,8_2_051268BB
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_051263C8 NtClose,8_2_051263C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05126CF8: NtDeviceIoControlFile,8_2_05126CF8
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0084C82C5_2_0084C82C
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_008552C05_2_008552C0
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0084CB745_2_0084CB74
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0085CDCB5_2_0085CDCB
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_008565D55_2_008565D5
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_008505305_2_00850530
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0085E74F5_2_0085E74F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EFC0A88_2_00EFC0A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EF10988_2_00EF1098
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EFD8208_2_00EFD820
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EFE0088_2_00EFE008
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EFA1CD8_2_00EFA1CD
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EF99408_2_00EF9940
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EFB3B88_2_00EFB3B8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EF8F988_2_00EF8F98
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EFA0808_2_00EFA080
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EFA0908_2_00EFA090
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EF106A8_2_00EF106A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EFF96A8_2_00EFF96A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EFF9788_2_00EFF978
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EFBAB58_2_00EFBAB5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EFD5838_2_00EFD583
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EFDEE08_2_00EFDEE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EF9E688_2_00EF9E68
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EF9E588_2_00EF9E58
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EF8F888_2_00EF8F88
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0512FD6C8_2_0512FD6C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0512093D8_2_0512093D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_051230208_2_05123020
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05122D178_2_05122D17
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_051235188_2_05123518
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0512A5408_2_0512A540
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05123C788_2_05123C78
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05123C688_2_05123C68
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05129F988_2_05129F98
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05129F8A8_2_05129F8A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05128E308_2_05128E30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05128E408_2_05128E40
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05126E908_2_05126E90
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05126EA08_2_05126EA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_051219818_2_05121981
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_051259D18_2_051259D1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_051248E88_2_051248E8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05129BF88_2_05129BF8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05123A308_2_05123A30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05123A208_2_05123A20
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_04DEA9B011_2_04DEA9B0
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exeCode function: 45_2_02CF09B045_2_02CF09B0
            Source: C:\Users\user\Desktop\file.exeCode function: String function: 00846E20 appears 51 times
            Source: file.exe, 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenamePolymodXT.exe4 vs file.exe
            Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: file.exeStatic PE information: Section: .data ZLIB complexity 0.99768195263019
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@58/62@0/1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\MaxLoonaFest2663Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7400:120:WilError_03
            Source: C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7556:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7596:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7716:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4308:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7636:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6916:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3540:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7448:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7204:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7780:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9072:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9064:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8044:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8120:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7496:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7900:120:WilError_03
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\FANBooster2663Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT name FROM sqlite_master WHERE type='table';
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT fieldname, value FROM moz_formhistory;
            Source: file.exeReversingLabs: Detection: 83%
            Source: file.exeVirustotal: Detection: 82%
            Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Get-MpPreference -verbose
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 LG" /sc ONLOGON /rl HIGHEST
            Source: unknownProcess created: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe
            Source: unknownProcess created: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe "C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe"
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe "C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe"
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exe "C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exe"
            Source: C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Get-MpPreference -verboseJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $trueJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $trueJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $trueJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $trueJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -ForceJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $trueJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msvcp140_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: linkinfo.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntshrui.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cscapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dll
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeSection loaded: mscoree.dll
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeSection loaded: kernel.appcore.dll
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeSection loaded: version.dll
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeSection loaded: mscoree.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00021401-0000-0000-C000-000000000046}\InProcServer32Jump to behavior
            Source: FANBooster2663.lnk.8.drLNK file: ..\..\..\..\..\..\Local\Temp\FANBooster2663\FANBooster2663.exe
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: file.exeStatic file information: File size 1646592 > 1048576
            Source: file.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x163400
            Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: RegAsm.pdb source: OfficeTrackerNMP2663.exe, 00000029.00000000.1519174884.00000000005F2000.00000002.00000001.01000000.00000009.sdmp, OfficeTrackerNMP2663.exe.8.dr, FANBooster2663.exe.8.dr, MaxLoonaFest2663.exe.8.dr
            Source: Binary string: RegAsm.pdb4 source: OfficeTrackerNMP2663.exe, 00000029.00000000.1519174884.00000000005F2000.00000002.00000001.01000000.00000009.sdmp, OfficeTrackerNMP2663.exe.8.dr, FANBooster2663.exe.8.dr, MaxLoonaFest2663.exe.8.dr
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_008467F1 push ecx; ret 5_2_00846804
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00EF0941 push ebx; ret 8_2_00EF0942
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0512C1BB pushfd ; iretd 8_2_0512C231
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_07CB16EB push ss; retf 11_2_07CB16F6
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_07CB161F push ss; retf 11_2_07CB162E
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_07CB0488 push es; retf 11_2_07CB06A6
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exeJump to dropped file
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exeJump to dropped file
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeJump to dropped file
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster2663.lnkJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster2663.lnkJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MaxLoonaFest2663Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MaxLoonaFest2663Jump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6320, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7196, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: EF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2BC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4BC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 5130000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 7130000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 7370000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 9370000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 5250000 memory reserve | memory write watchJump to behavior
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeMemory allocated: E70000 memory reserve | memory write watch
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeMemory allocated: 2880000 memory reserve | memory write watch
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeMemory allocated: 4880000 memory reserve | memory write watch
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeMemory allocated: 1250000 memory reserve | memory write watch
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeMemory allocated: 2CB0000 memory reserve | memory write watch
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeMemory allocated: 4CB0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exeMemory allocated: 2C50000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exeMemory allocated: 2D10000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exeMemory allocated: 2C50000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exeMemory allocated: 2DB0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exeMemory allocated: 2FA0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exeMemory allocated: 2DD0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exeMemory allocated: F40000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exeMemory allocated: 2B30000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exeMemory allocated: 28C0000 memory reserve | memory write watch
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 2198Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7220Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2478Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1201Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1447Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1271
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1483
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1231
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1655
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1631
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1874
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1210
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1467
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1100
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7268Thread sleep count: 7220 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7272Thread sleep count: 2478 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7300Thread sleep time: -5534023222112862s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7916Thread sleep count: 1201 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8492Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8352Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8544Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8124Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8172Thread sleep count: 1271 > 30
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8536Thread sleep time: -14757395258967632s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8412Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8128Thread sleep count: 1483 > 30
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8540Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8384Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7208Thread sleep count: 1231 > 30
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8552Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7860Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8424Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8548Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8468Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7784Thread sleep count: 1631 > 30
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8584Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8452Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7376Thread sleep count: 1874 > 30
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8532Thread sleep time: -12912720851596678s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8396Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8228Thread sleep count: 1210 > 30
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8564Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8484Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8308Thread sleep count: 1467 > 30
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8572Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8512Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8332Thread sleep count: 1100 > 30
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8568Thread sleep time: -11990383647911201s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8520Thread sleep time: -922337203685477s >= -30000s
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe TID: 9148Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe TID: 6836Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe TID: 1588Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0085A797 FindFirstFileExW,5_2_0085A797
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
            Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user
            Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData\Roaming
            Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
            Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
            Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VBoxGuest
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SYSTEM\CurrentControlSet\Services\VBoxGuest
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VBoxSFVBoxGuest
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: kernel32.dll(SYSTEM\CurrentControlSet\Services\vmhgfs+SYSTEM\CurrentControlSet\Services\VBoxGuest
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SYSTEM\CurrentControlSet\Services\vmhgfs+
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
            Source: RegAsm.exe, 00000008.00000002.3742181371.0000000000F76000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VBoxSF
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\file.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_5-19151
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0084E2CF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0084E2CF
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0085503C mov eax, dword ptr fs:[00000030h]5_2_0085503C
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00855080 mov eax, dword ptr fs:[00000030h]5_2_00855080
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0085196C mov ecx, dword ptr fs:[00000030h]5_2_0085196C
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0085DEE0 GetProcessHeap,5_2_0085DEE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_0084E2CF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0084E2CF
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00846BFA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00846BFA
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00846D56 SetUnhandledExceptionFilter,5_2_00846D56
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00846E65 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00846E65
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\file.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00E2018D CreateProcessA,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,5_2_00E2018D
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $trueJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $trueJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $trueJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $trueJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -ForceJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 4DC000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 536000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 538000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 69A000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 69C000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: ABF008Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Get-MpPreference -verboseJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $trueJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $trueJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $trueJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $trueJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -ForceJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $trueJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_008468EC cpuid 5_2_008468EC
            Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,5_2_0085D980
            Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,5_2_0085DAA9
            Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,5_2_0085DBAF
            Source: C:\Users\user\Desktop\file.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,5_2_0085D31A
            Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,5_2_00854476
            Source: C:\Users\user\Desktop\file.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,5_2_0085DC7E
            Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,5_2_0085D5BC
            Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,5_2_0085D6A2
            Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,5_2_0085D607
            Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,5_2_00853F10
            Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,5_2_0085D72D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeQueries volume information: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe VolumeInformation
            Source: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exeQueries volume information: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe VolumeInformation
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exeQueries volume information: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe VolumeInformation
            Source: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exeQueries volume information: C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exeQueries volume information: C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exe VolumeInformation
            Source: C:\Users\user\Desktop\file.exeCode function: 5_2_00846AF4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,5_2_00846AF4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows DefenderRegistry value created: DisableRoutinelyTakingAction 1Jump to behavior
            Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRealtimeMonitoring 1Jump to behavior
            Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableIOAVProtection 1Jump to behavior
            Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRawWriteNotification 1Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry value created: TamperProtection 0Jump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6320, type: MEMORYSTR
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Electrum\wallets
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectronCash\wallets
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: com.liberty.jaxx
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectrumLTC
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus\exodus.wallet
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum\wallets
            Source: RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: MultiDoge\multidoge.wallet
            Source: powershell.exe, 0000000B.00000002.1490752259.0000000007D70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: sqlcolumnencryptionkeystoreprovider
            Source: Yara matchFile source: 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6320, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6320, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            411
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job21
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            31
            Disable or Modify Tools
            LSASS Memory121
            Security Software Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt1
            DLL Side-Loading
            21
            Registry Run Keys / Startup Folder
            131
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            411
            Process Injection
            NTDS131
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
            Bypass User Account Control
            1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Obfuscated Files or Information
            Cached Domain Credentials3
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Software Packing
            DCSync33
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            Bypass User Account Control
            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1515080 Sample: file.exe Startdate: 21/09/2024 Architecture: WINDOWS Score: 100 69 Suricata IDS alerts for network traffic 2->69 71 Antivirus / Scanner detection for submitted sample 2->71 73 Multi AV Scanner detection for submitted file 2->73 75 8 other signatures 2->75 8 file.exe 2->8         started        11 OfficeTrackerNMP2663.exe 2->11         started        13 OfficeTrackerNMP2663.exe 2->13         started        15 3 other processes 2->15 process3 signatures4 85 Found API chain indicative of debugger detection 8->85 87 Contains functionality to inject code into remote processes 8->87 89 Writes to foreign memory regions 8->89 91 2 other signatures 8->91 17 RegAsm.exe 6 14 8->17         started        22 conhost.exe 11->22         started        24 conhost.exe 13->24         started        26 conhost.exe 15->26         started        28 conhost.exe 15->28         started        30 conhost.exe 15->30         started        process5 dnsIp6 61 118.194.235.187, 49708, 50500 SINOYCLOUD-AS-APSinoycloudLimitedHK China 17->61 55 C:\Users\user\AppData\...\FANBooster2663.exe, PE32 17->55 dropped 57 C:\Users\user\...\MaxLoonaFest2663.exe, PE32 17->57 dropped 59 C:\ProgramData\...\OfficeTrackerNMP2663.exe, PE32 17->59 dropped 77 Found many strings related to Crypto-Wallets (likely being stolen) 17->77 79 Disables Windows Defender Tamper protection 17->79 81 Modifies Windows Defender protection settings 17->81 83 Disable Windows Defender real time protection (registry) 17->83 32 powershell.exe 23 17->32         started        35 powershell.exe 23 17->35         started        37 powershell.exe 23 17->37         started        39 12 other processes 17->39 file7 signatures8 process9 signatures10 63 Found many strings related to Crypto-Wallets (likely being stolen) 32->63 65 Loading BitLocker PowerShell Module 32->65 41 conhost.exe 32->41         started        43 conhost.exe 35->43         started        45 conhost.exe 37->45         started        67 Uses schtasks.exe or at.exe to add and modify task schedules 39->67 47 conhost.exe 39->47         started        49 conhost.exe 39->49         started        51 conhost.exe 39->51         started        53 8 other processes 39->53 process11

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            file.exe83%ReversingLabsWin32.Ransomware.RedLine
            file.exe83%VirustotalBrowse
            file.exe100%AviraTR/Crypt.Agent.qmlgz
            file.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe0%ReversingLabs
            C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe0%VirustotalBrowse
            C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe0%ReversingLabs
            C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe0%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exe0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exe0%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://nuget.org/NuGet.exe0%URL Reputationsafe
            http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
            http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
            https://aka.ms/pscore6lB0%URL Reputationsafe
            http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
            https://contoso.com/0%URL Reputationsafe
            https://nuget.org/nuget.exe0%URL Reputationsafe
            https://contoso.com/License0%URL Reputationsafe
            https://contoso.com/Icon0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            https://ipinfo.io/0%Avira URL Cloudsafe
            http://www.apache.org/licenses/LICENSE-2.0.html0%Avira URL Cloudsafe
            https://api.myip.com/0%Avira URL Cloudsafe
            https://ion=v4.50%Avira URL Cloudsafe
            https://ipinfo.io/0%VirustotalBrowse
            https://www.maxmind.com/en/locate-my-ip-address0%Avira URL Cloudsafe
            https://api.myip.com/0%VirustotalBrowse
            https://www.maxmind.com/en/locate-my-ip-address0%VirustotalBrowse
            https://api64.ipify.org/?format=json0%Avira URL Cloudsafe
            https://discord.com/api/v9/users/0%Avira URL Cloudsafe
            https://api64.ipify.org/?format=json0%VirustotalBrowse
            https://db-ip.com/demo/home.php?s=0%Avira URL Cloudsafe
            https://maxmind.com/geoip/v2.1/city/me0%Avira URL Cloudsafe
            http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
            https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
            https://ipinfo.io/widget/demo/0%Avira URL Cloudsafe
            https://go.L0%Avira URL Cloudsafe
            https://github.com/Pester/Pester0%Avira URL Cloudsafe
            https://maxmind.com/geoip/v2.1/city/me/https://www.maxmind.com/en/locate-my-ip-address0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORT0%VirustotalBrowse
            https://discord.com/api/v9/users/0%VirustotalBrowse
            https://github.com/Pester/Pester1%VirustotalBrowse
            https://maxmind.com/geoip/v2.1/city/me/https://www.maxmind.com/en/locate-my-ip-address0%VirustotalBrowse
            https://ipinfo.io/widget/demo/0%VirustotalBrowse
            https://db-ip.com/demo/home.php?s=0%VirustotalBrowse
            https://maxmind.com/geoip/v2.1/city/me0%VirustotalBrowse
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://nuget.org/NuGet.exepowershell.exe, 0000000B.00000002.1432686079.00000000061AB000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000000B.00000002.1366723527.0000000005296000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://ipinfo.io/RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 0000000B.00000002.1366723527.0000000005296000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://aka.ms/pscore6lBpowershell.exe, 0000000B.00000002.1366723527.0000000005141000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://api.myip.com/RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000000B.00000002.1366723527.0000000005296000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://ion=v4.5powershell.exe, 0000000B.00000002.1477941420.00000000079F6000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.maxmind.com/en/locate-my-ip-addressRegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://api64.ipify.org/?format=jsonRegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/wsdl/powershell.exe, 0000000B.00000002.1366723527.0000000005296000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://contoso.com/powershell.exe, 0000000B.00000002.1432686079.00000000061AB000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://nuget.org/nuget.exepowershell.exe, 0000000B.00000002.1432686079.00000000061AB000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://contoso.com/Licensepowershell.exe, 0000000B.00000002.1432686079.00000000061AB000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://discord.com/api/v9/users/RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://contoso.com/Iconpowershell.exe, 0000000B.00000002.1432686079.00000000061AB000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://db-ip.com/demo/home.php?s=RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://maxmind.com/geoip/v2.1/city/meRegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORTRegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/widget/demo/RegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1366723527.0000000005141000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://go.Lpowershell.exe, 0000000B.00000002.1464831316.000000000795E000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://github.com/Pester/Pesterpowershell.exe, 0000000B.00000002.1366723527.0000000005296000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://maxmind.com/geoip/v2.1/city/me/https://www.maxmind.com/en/locate-my-ip-addressRegAsm.exe, 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            118.194.235.187
            unknownChina
            134700SINOYCLOUD-AS-APSinoycloudLimitedHKtrue
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1515080
            Start date and time:2024-09-21 16:16:04 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 11m 11s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:56
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:file.exe
            Detection:MAL
            Classification:mal100.troj.spyw.evad.winEXE@58/62@0/1
            EGA Information:
            • Successful, ratio: 25%
            HCA Information:
            • Successful, ratio: 99%
            • Number of executed functions: 188
            • Number of non-executed functions: 60
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
            • Execution Graph export aborted for target FANBooster2663.exe, PID 6092 because it is empty
            • Execution Graph export aborted for target MaxLoonaFest2663.exe, PID 1316 because it is empty
            • Execution Graph export aborted for target MaxLoonaFest2663.exe, PID 5400 because it is empty
            • Execution Graph export aborted for target OfficeTrackerNMP2663.exe, PID 9032 because it is empty
            • Execution Graph export aborted for target OfficeTrackerNMP2663.exe, PID 9048 because it is empty
            • Execution Graph export aborted for target powershell.exe, PID 7196 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size getting too big, too many NtCreateKey calls found.
            • Report size getting too big, too many NtDeviceIoControlFile calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            TimeTypeDescription
            10:17:06API Interceptor345x Sleep call for process: powershell.exe modified
            11:34:33API Interceptor2328788x Sleep call for process: RegAsm.exe modified
            17:33:28Task SchedulerRun new task: OfficeTrackerNMP2663 HR path: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe
            17:33:28Task SchedulerRun new task: OfficeTrackerNMP2663 LG path: C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe
            17:33:28AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run MaxLoonaFest2663 C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe
            17:33:36AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run MaxLoonaFest2663 C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe
            17:33:45AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster2663.lnk
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            118.194.235.187file.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro StealerBrowse
              cb67a188bafea0fd5f5e9725881c88a1c494763c094f76df73914bd8cadce170_dump.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro StealerBrowse
                f8cbaeb306d1b88f79680d5abaa871541cdaecbe8f28fe6e7b4d1c6e808a97de_payload.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro StealerBrowse
                  file.exeGet hashmaliciousRisePro StealerBrowse
                    SecuriteInfo.com.Win64.Evo-gen.4435.12354.exeGet hashmaliciousCryptOne, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                      file.exeGet hashmaliciousRisePro StealerBrowse
                        file.exeGet hashmaliciousRisePro StealerBrowse
                          file.exeGet hashmaliciousRisePro StealerBrowse
                            7uQQ6rKGkN.exeGet hashmaliciousRisePro StealerBrowse
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              SINOYCLOUD-AS-APSinoycloudLimitedHKarm.elfGet hashmaliciousMiraiBrowse
                              • 118.194.235.45
                              gErAvW63Ax.elfGet hashmaliciousMiraiBrowse
                              • 114.114.221.137
                              5klOcqqL2D.elfGet hashmaliciousMiraiBrowse
                              • 114.114.156.51
                              file.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro StealerBrowse
                              • 118.194.235.187
                              cb67a188bafea0fd5f5e9725881c88a1c494763c094f76df73914bd8cadce170_dump.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro StealerBrowse
                              • 118.194.235.187
                              f8cbaeb306d1b88f79680d5abaa871541cdaecbe8f28fe6e7b4d1c6e808a97de_payload.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro StealerBrowse
                              • 118.194.235.187
                              file.exeGet hashmaliciousRisePro StealerBrowse
                              • 118.194.235.187
                              SecuriteInfo.com.Win64.Evo-gen.4435.12354.exeGet hashmaliciousCryptOne, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                              • 118.194.235.187
                              file.exeGet hashmaliciousRisePro StealerBrowse
                              • 118.194.235.187
                              file.exeGet hashmaliciousRisePro StealerBrowse
                              • 118.194.235.187
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exelgnasdfnds.exeGet hashmaliciousLummaCBrowse
                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                  rhTHyegj6G.exeGet hashmaliciousLummaCBrowse
                                    Gn7YytVoCM.exeGet hashmaliciousUnknownBrowse
                                      Gn7YytVoCM.exeGet hashmaliciousUnknownBrowse
                                        Y666Gn09a1.exeGet hashmaliciousXWormBrowse
                                          file.exeGet hashmaliciousLummaC, VidarBrowse
                                            file.exeGet hashmaliciousLummaC, VidarBrowse
                                              file.exeGet hashmaliciousLummaC, VidarBrowse
                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                  File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):65440
                                                  Entropy (8bit):6.049806962480652
                                                  Encrypted:false
                                                  SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                  MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                  SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                  SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                  SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                  Joe Sandbox View:
                                                  • Filename: lgnasdfnds.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: rhTHyegj6G.exe, Detection: malicious, Browse
                                                  • Filename: Gn7YytVoCM.exe, Detection: malicious, Browse
                                                  • Filename: Gn7YytVoCM.exe, Detection: malicious, Browse
                                                  • Filename: Y666Gn09a1.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                  File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):65440
                                                  Entropy (8bit):6.049806962480652
                                                  Encrypted:false
                                                  SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                  MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                  SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                  SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                  SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                  Process:C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:modified
                                                  Size (bytes):42
                                                  Entropy (8bit):4.0050635535766075
                                                  Encrypted:false
                                                  SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                                                  MD5:84CFDB4B995B1DBF543B26B86C863ADC
                                                  SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                                                  SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                                                  SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                                                  Malicious:false
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                                                  Process:C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:modified
                                                  Size (bytes):42
                                                  Entropy (8bit):4.0050635535766075
                                                  Encrypted:false
                                                  SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                                                  MD5:84CFDB4B995B1DBF543B26B86C863ADC
                                                  SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                                                  SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                                                  SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                                                  Malicious:false
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                                                  Process:C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:modified
                                                  Size (bytes):42
                                                  Entropy (8bit):4.0050635535766075
                                                  Encrypted:false
                                                  SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                                                  MD5:84CFDB4B995B1DBF543B26B86C863ADC
                                                  SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                                                  SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                                                  SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                                                  Malicious:false
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:data
                                                  Category:modified
                                                  Size (bytes):2228
                                                  Entropy (8bit):5.374359297407224
                                                  Encrypted:false
                                                  SSDEEP:48:PWSU4y4RQmFoUeWmfgZ9tK8NPdYm7u1iMugeC/ZaOUyu0lhV:PLHyIFKL3IZ2KlROugg01
                                                  MD5:EFDBF9F789D1CD2451259700F2C09E64
                                                  SHA1:A354A17AEC8D67A69B47DF1D30D3B236B83607D0
                                                  SHA-256:2DAFB3EDDDC599D1158394CC51336347C30FCCD1666A3DF9DFB6962695EE4122
                                                  SHA-512:F24F2BADA78E52311009965871EE94652E4C82B9A3D7F77325BED2C137B3850A1B6AD48D3E69FA35E9C366CE925A7D1E948D37FB8C88FE44BC572EABCB22A079
                                                  Malicious:false
                                                  Preview:@...e................................................@..........P................1]...E.....m.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                  File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):65440
                                                  Entropy (8bit):6.049806962480652
                                                  Encrypted:false
                                                  SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                  MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                  SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                  SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                  SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):13
                                                  Entropy (8bit):2.5654483718208256
                                                  Encrypted:false
                                                  SSDEEP:3:LDcXVRPSn:vsMn
                                                  MD5:AC365E1B4C8F1824667085B0A689A7BD
                                                  SHA1:651E55C0F0927EE34903F4D27903B6E1E1451337
                                                  SHA-256:FD01C16824E654C23CE66B6D2023AFF079E84624B31BEE4338E0B655EF80A85A
                                                  SHA-512:BE39F797ED3177507058A194A2A638EC2832B276BC33037918F08A5BB031C881DFD934FFB81CA84A4122B2DA3382EC7C540FCD52179F1E5019228B7249AA3C79
                                                  Malicious:false
                                                  Preview:1726928242887
                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Archive, ctime=Sat Sep 21 14:33:26 2024, mtime=Sat Sep 21 14:33:26 2024, atime=Sat Dec 7 08:10:47 2019, length=65440, window=hide
                                                  Category:dropped
                                                  Size (bytes):1254
                                                  Entropy (8bit):4.965238669960066
                                                  Encrypted:false
                                                  SSDEEP:24:8dRw24ZRvlgKw85olTAM0vt4m0JgJUwqygm:8dy24ZR9Gl0M0vtCJgJmyg
                                                  MD5:D3FE37DFC6ED7437ED327E064C48A432
                                                  SHA1:8A7D2144EC0EB3975DF46C4433A038E987B75B47
                                                  SHA-256:4C3326357A123DE7E2D3EEA939FB12E5616FC19777EC4062DE340FFB32112422
                                                  SHA-512:18D308D1A515A179F4A852206B475A5D052C9FBE8D032D99914C171FAA22BE5D63F6FBE4B156BFDCEFD389DC981FBBF8FA6FD248190DDE502A9ADCCA104A3D8B
                                                  Malicious:false
                                                  Preview:L..................F.... ...W..;...W..;...m..6...........................4.:..DG..Yr?.D..U..k0.&...&......Qg.*_...^...0....!.;.......t...CFSF..1.....EW.=..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW.=5Y.r..........................3*N.A.p.p.D.a.t.a...B.P.1.....5Y.r..Local.<......EW.=5Y.r..........................-Q..L.o.c.a.l.....N.1.....5Y)r..Temp..:......EW.=5Y)r............................".T.e.m.p.....f.1.....5Y.|..FANBOO~1..N......5Y.|5Y.|............................,.F.A.N.B.o.o.s.t.e.r.2.6.6.3.....r.2......OXI .FANBOO~1.EXE..V......5Y.|5Y.|....3...........p...........R.F.A.N.B.o.o.s.t.e.r.2.6.6.3...e.x.e.......v...............-.......u....................C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exe....F.A.N.B.o.o.s.t.e.r.2.6.6.3.>.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.F.A.N.B.o.o.s.t.e.r.2.6.6.3.\.F.A.N.B.o.o.s.t.e.r.2.6.6.3...e.x.e.........|....I.J.H..K..:...`.......X.......302494...........hT..CrF.f4... .<../Tc..
                                                  Process:C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1049
                                                  Entropy (8bit):4.286073681226177
                                                  Encrypted:false
                                                  SSDEEP:24:z3d3+DO/0XZd3Wo3opQ5ZKBQFYVgt7ovrNOYlK:zNODBXZxo4ABV+SrUYE
                                                  MD5:402278578416001C915480C7040F2964
                                                  SHA1:B4833865ECE3609EC213509D4AB7D7A195C00753
                                                  SHA-256:86E0747C9B54AA9AACB788589E70E19279DF13F1393795E689342AF3302912E1
                                                  SHA-512:473600FBC051B22E9E7A6FBE1694ED736CF90DE5A8DF92AF1FA9A85DDD97379CFF0E8A5DF89937AE083BEBEFC81C407A907D0FB5ED9019BEDF6FB4703838321B
                                                  Malicious:false
                                                  Preview:Microsoft .NET Framework Assembly Registration Utility version 4.8.4084.0..for Microsoft .NET Framework version 4.8.4084.0..Copyright (C) Microsoft Corporation. All rights reserved.....Syntax: RegAsm AssemblyName [Options]..Options:.. /unregister Unregister types.. /tlb[:FileName] Export the assembly to the specified type library.. and register it.. /regfile[:FileName] Generate a reg file with the specified name.. instead of registering the types. This option.. cannot be used with the /u or /tlb options.. /codebase Set the code base in the registry.. /registered Only refer to already registered type libraries.. /asmpath:Directory Look for assembly references here.. /nologo Prevents RegAsm from displaying logo.. /silent Silent mode. Prevents displaying of success messages.. /verbose Displays extra information..
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):7.948523262290906
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:file.exe
                                                  File size:1'646'592 bytes
                                                  MD5:19b9de641a480be1236dd9712d9ccc10
                                                  SHA1:a3cbbd66a0a3fbb2618c9283d44a0855059e9e6a
                                                  SHA256:c558e126c64a89887115a45276d5a8751f90c399eb32ca103f6e50901abc7abd
                                                  SHA512:7c86fa655d20e23bb67761367b8dd0512902c0f2d3c0801f480a63bd7d8287f16e8314f43de7a202495b17aab52f7ae2b4bc71b3f0973b4e3810c4ade4462010
                                                  SSDEEP:49152:LzL+zEqvftsAyChHQTTu7XIP+WQ55KGRK04TYS:LzLYVdiCh6Cdb7RD4T
                                                  TLSH:5F75230139D48072D5633A350DF2A6B54A3FF8710B266E9FA3941F7B8F74582D321A6B
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......a),.%HB.%HB.%HB..:A.)HB..:G..HB..:F.0HB...F.7HB...A.0HB..:C. HB.%HC.ZHB...G.pHB...K.$HB...@.$HB.Rich%HB.................PE..L..
                                                  Icon Hash:00928e8e8686b000
                                                  Entrypoint:0x406516
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x66598236 [Fri May 31 07:54:30 2024 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:6
                                                  OS Version Minor:0
                                                  File Version Major:6
                                                  File Version Minor:0
                                                  Subsystem Version Major:6
                                                  Subsystem Version Minor:0
                                                  Import Hash:fec98778e46bf1d6aed3f9ad74a5bb8d
                                                  Instruction
                                                  call 00007F1EE4EAD9BBh
                                                  jmp 00007F1EE4EAD209h
                                                  cmp ecx, dword ptr [00430040h]
                                                  jne 00007F1EE4EAD393h
                                                  ret
                                                  jmp 00007F1EE4EADCF4h
                                                  jmp 00007F1EE4EADEC7h
                                                  push ebp
                                                  mov ebp, esp
                                                  jmp 00007F1EE4EAD39Fh
                                                  push dword ptr [ebp+08h]
                                                  call 00007F1EE4EBA0B7h
                                                  pop ecx
                                                  test eax, eax
                                                  je 00007F1EE4EAD3A1h
                                                  push dword ptr [ebp+08h]
                                                  call 00007F1EE4EB693Bh
                                                  pop ecx
                                                  test eax, eax
                                                  je 00007F1EE4EAD378h
                                                  pop ebp
                                                  ret
                                                  cmp dword ptr [ebp+08h], FFFFFFFFh
                                                  je 00007F1EE4EA8041h
                                                  jmp 00007F1EE4EAB0E9h
                                                  push ebp
                                                  mov ebp, esp
                                                  push dword ptr [ebp+08h]
                                                  call 00007F1EE4EADE8Ch
                                                  pop ecx
                                                  pop ebp
                                                  ret
                                                  push ebp
                                                  mov ebp, esp
                                                  test byte ptr [ebp+08h], 00000001h
                                                  push esi
                                                  mov esi, ecx
                                                  mov dword ptr [esi], 004261D8h
                                                  je 00007F1EE4EAD39Ch
                                                  push 0000000Ch
                                                  push esi
                                                  call 00007F1EE4EAD36Dh
                                                  pop ecx
                                                  pop ecx
                                                  mov eax, esi
                                                  pop esi
                                                  pop ebp
                                                  retn 0004h
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  push ebp
                                                  mov ebp, esp
                                                  mov eax, dword ptr [ebp+08h]
                                                  push esi
                                                  mov ecx, dword ptr [eax+3Ch]
                                                  add ecx, eax
                                                  movzx eax, word ptr [ecx+14h]
                                                  lea edx, dword ptr [ecx+18h]
                                                  add edx, eax
                                                  movzx eax, word ptr [ecx+06h]
                                                  imul esi, eax, 28h
                                                  add esi, edx
                                                  cmp edx, esi
                                                  je 00007F1EE4EAD3ABh
                                                  mov ecx, dword ptr [ebp+0Ch]
                                                  cmp ecx, dword ptr [edx+0Ch]
                                                  jc 00007F1EE4EAD39Ch
                                                  mov eax, dword ptr [edx+08h]
                                                  add eax, dword ptr [edx+0Ch]
                                                  cmp ecx, eax
                                                  jc 00007F1EE4EAD39Eh
                                                  add edx, 28h
                                                  cmp edx, esi
                                                  jne 00007F1EE4EAD37Ch
                                                  xor eax, eax
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x2ea580x3c.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1950000x1bf8.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x2ce180x1c.rdata
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2cd580x40.rdata
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x250000x164.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x221e70x222002ffb860bc06cfe917ea7ed7bf7ddf324False0.5788332760989011data6.636821659901964IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .BSS0x240000x4590x600b4c2a1beaf0c0765ad1632a0898bbd69False0.615234375data5.346821656834738IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x250000xa2820xa400b3b9f7782c2d7f6a3967f05534ee11aaFalse0.4330935594512195data4.952696529071435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x300000x1642080x1634000196b6dbbf14dc5b193f07dc2ca77590False0.99768195263019data7.999250559624117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .reloc0x1950000x1bf80x1c0079fc0e2ad9363ceedd9a95d5c7d12fdfFalse0.7586495535714286data6.536443289277378IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  DLLImport
                                                  ADVAPI32.dllGetNumberOfEventLogRecords
                                                  KERNEL32.dllVirtualAlloc, WaitForSingleObjectEx, CloseHandle, FreeConsole, CreateThread, QueryPerformanceCounter, QueryPerformanceFrequency, WideCharToMultiByte, GetCurrentThreadId, ReleaseSRWLockExclusive, Sleep, GetExitCodeThread, InitializeCriticalSectionEx, GetSystemTimeAsFileTime, GetModuleHandleW, GetProcAddress, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, EncodePointer, DecodePointer, MultiByteToWideChar, LCMapStringEx, WakeAllConditionVariable, GetStringTypeW, GetCPInfo, IsProcessorFeaturePresent, GetCurrentProcessId, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess, CreateFileW, RaiseException, RtlUnwind, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitThread, FreeLibraryAndExitThread, GetModuleHandleExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, GetFileSizeEx, SetFilePointerEx, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetProcessHeap, HeapSize, WriteConsoleW
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2024-09-21T16:17:23.746997+02002049060ET MALWARE RisePro TCP Heartbeat Packet1192.168.2.749708118.194.235.18750500TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Sep 21, 2024 16:17:23.647083044 CEST4970850500192.168.2.7118.194.235.187
                                                  Sep 21, 2024 16:17:23.652306080 CEST5050049708118.194.235.187192.168.2.7
                                                  Sep 21, 2024 16:17:23.652596951 CEST4970850500192.168.2.7118.194.235.187
                                                  Sep 21, 2024 16:17:23.746997118 CEST4970850500192.168.2.7118.194.235.187
                                                  Sep 21, 2024 16:17:23.752032995 CEST5050049708118.194.235.187192.168.2.7
                                                  Sep 21, 2024 16:17:45.034359932 CEST5050049708118.194.235.187192.168.2.7
                                                  Sep 21, 2024 16:17:45.034591913 CEST4970850500192.168.2.7118.194.235.187

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:5
                                                  Start time:10:17:00
                                                  Start date:21/09/2024
                                                  Path:C:\Users\user\Desktop\file.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\file.exe"
                                                  Imagebase:0x840000
                                                  File size:1'646'592 bytes
                                                  MD5 hash:19B9DE641A480BE1236DD9712D9CCC10
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:8
                                                  Start time:10:17:01
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                  Imagebase:0x110000
                                                  File size:65'440 bytes
                                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.3743374835.0000000002BF5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:high
                                                  Has exited:false

                                                  Target ID:9
                                                  Start time:10:17:02
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:false

                                                  Target ID:11
                                                  Start time:10:17:06
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"powershell" Get-MpPreference -verbose
                                                  Imagebase:0x570000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:12
                                                  Start time:10:17:06
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:14
                                                  Start time:10:17:08
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true
                                                  Imagebase:0x570000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:15
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:16
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
                                                  Imagebase:0x570000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:17
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:18
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true
                                                  Imagebase:0x570000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:19
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:20
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
                                                  Imagebase:0x570000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:21
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:22
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
                                                  Imagebase:0x570000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:23
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:24
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
                                                  Imagebase:0x570000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:25
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:26
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
                                                  Imagebase:0x570000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:27
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:28
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
                                                  Imagebase:0x570000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:29
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:30
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
                                                  Imagebase:0x570000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:31
                                                  Start time:10:17:09
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:32
                                                  Start time:10:17:10
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
                                                  Imagebase:0x570000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:33
                                                  Start time:10:17:10
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:34
                                                  Start time:10:17:10
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
                                                  Imagebase:0x570000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:35
                                                  Start time:10:17:10
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:37
                                                  Start time:11:33:26
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"cmd.exe" /c schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHEST
                                                  Imagebase:0x410000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:38
                                                  Start time:11:33:26
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 HR" /sc HOURLY /rl HIGHEST
                                                  Imagebase:0x990000
                                                  File size:187'904 bytes
                                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:39
                                                  Start time:11:33:26
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"cmd.exe" /c schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 LG" /sc ONLOGON /rl HIGHEST
                                                  Imagebase:0x410000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:40
                                                  Start time:11:33:26
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe" /tn "OfficeTrackerNMP2663 LG" /sc ONLOGON /rl HIGHEST
                                                  Imagebase:0x990000
                                                  File size:187'904 bytes
                                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:41
                                                  Start time:11:33:28
                                                  Start date:21/09/2024
                                                  Path:C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe
                                                  Imagebase:0x5f0000
                                                  File size:65'440 bytes
                                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 0%, ReversingLabs
                                                  • Detection: 0%, Virustotal, Browse
                                                  Has exited:true

                                                  Target ID:42
                                                  Start time:11:33:28
                                                  Start date:21/09/2024
                                                  Path:C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\ProgramData\OfficeTrackerNMP2663\OfficeTrackerNMP2663.exe
                                                  Imagebase:0xb10000
                                                  File size:65'440 bytes
                                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:43
                                                  Start time:11:33:28
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:44
                                                  Start time:11:33:28
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:45
                                                  Start time:11:33:36
                                                  Start date:21/09/2024
                                                  Path:C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe"
                                                  Imagebase:0xb50000
                                                  File size:65'440 bytes
                                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 0%, ReversingLabs
                                                  • Detection: 0%, Virustotal, Browse
                                                  Has exited:true

                                                  Target ID:46
                                                  Start time:11:33:36
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:47
                                                  Start time:11:33:45
                                                  Start date:21/09/2024
                                                  Path:C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\MaxLoonaFest2663\MaxLoonaFest2663.exe"
                                                  Imagebase:0xdc0000
                                                  File size:65'440 bytes
                                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:48
                                                  Start time:11:33:45
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:50
                                                  Start time:11:34:03
                                                  Start date:21/09/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\FANBooster2663\FANBooster2663.exe"
                                                  Imagebase:0x6b0000
                                                  File size:65'440 bytes
                                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 0%, ReversingLabs
                                                  • Detection: 0%, Virustotal, Browse
                                                  Has exited:true

                                                  Target ID:51
                                                  Start time:11:34:03
                                                  Start date:21/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:2.9%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:5.1%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:53
                                                    execution_graph 21513 854987 21514 854993 ___scrt_is_nonwritable_in_current_image 21513->21514 21525 84e56d EnterCriticalSection 21514->21525 21516 85499a 21526 85b9c2 21516->21526 21519 8549b8 21550 8549de 21519->21550 21525->21516 21527 85b9ce ___scrt_is_nonwritable_in_current_image 21526->21527 21528 85b9d7 21527->21528 21529 85b9f8 21527->21529 21530 85048e __dosmaperr 14 API calls 21528->21530 21553 84e56d EnterCriticalSection 21529->21553 21532 85b9dc 21530->21532 21533 84e4cb __strnicoll 43 API calls 21532->21533 21534 8549a9 21533->21534 21534->21519 21539 854821 GetStartupInfoW 21534->21539 21535 85ba30 21561 85ba57 21535->21561 21537 85ba04 21537->21535 21554 85b912 21537->21554 21540 85483e 21539->21540 21542 8548d2 21539->21542 21541 85b9c2 44 API calls 21540->21541 21540->21542 21543 854866 21541->21543 21545 8548d7 21542->21545 21543->21542 21544 854896 GetFileType 21543->21544 21544->21543 21546 8548de 21545->21546 21547 854921 GetStdHandle 21546->21547 21548 854983 21546->21548 21549 854934 GetFileType 21546->21549 21547->21546 21548->21519 21549->21546 21565 84e5b5 LeaveCriticalSection 21550->21565 21552 8549c9 21553->21537 21555 8538e2 __dosmaperr 14 API calls 21554->21555 21557 85b924 21555->21557 21556 85b931 21558 853ec9 ___free_lconv_mon 14 API calls 21556->21558 21557->21556 21559 8544f1 6 API calls 21557->21559 21560 85b986 21558->21560 21559->21557 21560->21537 21564 84e5b5 LeaveCriticalSection 21561->21564 21563 85ba5e 21563->21534 21564->21563 21565->21552 19137 843b81 19141 843b8e _swprintf __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 19137->19141 19139 843c09 19140 843bfd Sleep 19140->19141 19141->19139 19141->19140 19142 843bf1 Sleep 19141->19142 19143 841985 19141->19143 19142->19141 19148 843f59 19143->19148 19147 84199f _swprintf __alldvrm __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 19147->19141 19149 841996 19148->19149 19150 843f73 QueryPerformanceFrequency 19148->19150 19151 843f42 QueryPerformanceCounter 19149->19151 19150->19149 19151->19147 17373 846394 17374 8463a0 ___scrt_is_nonwritable_in_current_image 17373->17374 17399 846616 17374->17399 17376 8463a7 17377 846500 17376->17377 17387 8463d1 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock std::locale::_Setgloballocale 17376->17387 17452 846bfa IsProcessorFeaturePresent 17377->17452 17379 846507 17433 851a79 17379->17433 17384 8463f0 17385 846471 17407 8516b7 17385->17407 17387->17384 17387->17385 17436 851a53 17387->17436 17389 846477 17411 864363 FreeConsole 17389->17411 17394 84649c 17395 8464a5 17394->17395 17443 851a2e 17394->17443 17446 846787 17395->17446 17400 84661f 17399->17400 17459 8468ec IsProcessorFeaturePresent 17400->17459 17404 846630 17405 846634 17404->17405 17469 84966d 17404->17469 17405->17376 17408 8516c0 17407->17408 17410 8516c5 17407->17410 17529 851411 17408->17529 17410->17389 18182 846533 17411->18182 17413 864377 18192 84adaa 17413->18192 17415 864391 17416 8643b2 17415->17416 17417 8643a8 GetCurrentThreadId 17415->17417 18230 844166 17416->18230 17417->17416 17419 8643b9 17417->17419 18207 845df0 WaitForSingleObjectEx 17419->18207 17420 864453 18236 84d772 17420->18236 17424 864458 17425 8643d0 GetNumberOfEventLogRecords 17428 8643f5 17425->17428 17426 8643cc 17426->17416 17429 864423 17428->17429 18213 843c11 17428->18213 17430 864439 17429->17430 18226 843798 17429->18226 17430->17420 17432 84648e 17430->17432 17441 846d14 GetModuleHandleW 17432->17441 18453 851861 17433->18453 17437 851a69 std::_Locinfo::_Locinfo_ctor 17436->17437 17440 84d772 ___scrt_is_nonwritable_in_current_image 17436->17440 17437->17385 17438 854d51 __Getctype 43 API calls 17438->17440 17439 84e5e3 __FrameHandler3::FrameUnwindToState 43 API calls 17439->17440 17440->17436 17440->17438 17440->17439 17442 846498 17441->17442 17442->17379 17442->17394 17444 851861 std::locale::_Setgloballocale 23 API calls 17443->17444 17445 851a39 17444->17445 17445->17395 17447 846793 17446->17447 17449 8464ae 17447->17449 18530 85373a 17447->18530 17449->17384 17450 8467a1 17451 84966d ___scrt_uninitialize_crt 7 API calls 17450->17451 17451->17449 17453 846c10 __fread_nolock std::locale::_Setgloballocale 17452->17453 17454 846cbb IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 17453->17454 17455 846cff std::locale::_Setgloballocale 17454->17455 17455->17379 17456 851a3d 17457 851861 std::locale::_Setgloballocale 23 API calls 17456->17457 17458 846515 17457->17458 17460 84662b 17459->17460 17461 84964e 17460->17461 17475 84a727 17461->17475 17464 849657 17464->17404 17466 84965f 17467 84966a 17466->17467 17489 84a763 17466->17489 17467->17404 17470 849676 17469->17470 17471 849680 17469->17471 17472 8497e6 ___vcrt_uninitialize_ptd 6 API calls 17470->17472 17471->17405 17473 84967b 17472->17473 17474 84a763 ___vcrt_uninitialize_locks DeleteCriticalSection 17473->17474 17474->17471 17476 84a730 17475->17476 17478 84a759 17476->17478 17479 849653 17476->17479 17493 84a96c 17476->17493 17480 84a763 ___vcrt_uninitialize_locks DeleteCriticalSection 17478->17480 17479->17464 17481 8497b3 17479->17481 17480->17479 17510 84a87d 17481->17510 17484 8497c8 17484->17466 17487 8497e3 17487->17466 17490 84a76e 17489->17490 17492 84a78d 17489->17492 17491 84a778 DeleteCriticalSection 17490->17491 17491->17491 17491->17492 17492->17464 17498 84a792 17493->17498 17496 84a9a4 InitializeCriticalSectionAndSpinCount 17497 84a98f 17496->17497 17497->17476 17499 84a7af 17498->17499 17502 84a7b3 17498->17502 17499->17496 17499->17497 17500 84a81b GetProcAddress 17500->17499 17502->17499 17502->17500 17503 84a80c 17502->17503 17505 84a832 LoadLibraryExW 17502->17505 17503->17500 17504 84a814 FreeLibrary 17503->17504 17504->17500 17506 84a849 GetLastError 17505->17506 17507 84a879 17505->17507 17506->17507 17508 84a854 ___vcrt_FlsGetValue 17506->17508 17507->17502 17508->17507 17509 84a86a LoadLibraryExW 17508->17509 17509->17502 17511 84a792 ___vcrt_FlsGetValue 5 API calls 17510->17511 17512 84a897 17511->17512 17513 84a8b0 TlsAlloc 17512->17513 17514 8497bd 17512->17514 17514->17484 17515 84a92e 17514->17515 17516 84a792 ___vcrt_FlsGetValue 5 API calls 17515->17516 17517 84a948 17516->17517 17518 84a963 TlsSetValue 17517->17518 17519 8497d6 17517->17519 17518->17519 17519->17487 17520 8497e6 17519->17520 17521 8497f0 17520->17521 17522 8497f6 17520->17522 17524 84a8b8 17521->17524 17522->17484 17525 84a792 ___vcrt_FlsGetValue 5 API calls 17524->17525 17526 84a8d2 17525->17526 17527 84a8ea TlsFree 17526->17527 17528 84a8de 17526->17528 17527->17528 17528->17522 17530 85141a 17529->17530 17533 851430 17529->17533 17530->17533 17535 85143d 17530->17535 17532 851427 17532->17533 17552 8515a8 17532->17552 17533->17410 17536 851446 17535->17536 17537 851449 17535->17537 17536->17532 17560 85b1e8 17537->17560 17542 851466 17593 851497 17542->17593 17543 85145a 17587 853ec9 17543->17587 17548 853ec9 ___free_lconv_mon 14 API calls 17549 85148a 17548->17549 17550 853ec9 ___free_lconv_mon 14 API calls 17549->17550 17551 851490 17550->17551 17551->17532 17553 851619 17552->17553 17555 8515b7 17552->17555 17553->17533 17554 85a138 WideCharToMultiByte std::_Locinfo::_Locinfo_ctor 17554->17555 17555->17553 17555->17554 17556 8538e2 __dosmaperr 14 API calls 17555->17556 17558 85161d 17555->17558 17559 853ec9 ___free_lconv_mon 14 API calls 17555->17559 17556->17555 17557 853ec9 ___free_lconv_mon 14 API calls 17557->17553 17558->17557 17559->17555 17561 85b1f1 17560->17561 17565 85144f 17560->17565 17615 854e0c 17561->17615 17566 85b4ea GetEnvironmentStringsW 17565->17566 17567 851454 17566->17567 17568 85b502 17566->17568 17567->17542 17567->17543 17569 85a138 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 17568->17569 17570 85b51f 17569->17570 17571 85b534 17570->17571 17572 85b529 FreeEnvironmentStringsW 17570->17572 17573 8550b1 __strnicoll 15 API calls 17571->17573 17572->17567 17574 85b53b 17573->17574 17575 85b554 17574->17575 17576 85b543 17574->17576 17578 85a138 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 17575->17578 17577 853ec9 ___free_lconv_mon 14 API calls 17576->17577 17579 85b548 FreeEnvironmentStringsW 17577->17579 17580 85b564 17578->17580 17579->17567 17581 85b573 17580->17581 17582 85b56b 17580->17582 17584 853ec9 ___free_lconv_mon 14 API calls 17581->17584 17583 853ec9 ___free_lconv_mon 14 API calls 17582->17583 17585 85b571 FreeEnvironmentStringsW 17583->17585 17584->17585 17585->17567 17588 853ed4 HeapFree 17587->17588 17592 851460 17587->17592 17589 853ee9 GetLastError 17588->17589 17588->17592 17590 853ef6 __dosmaperr 17589->17590 17591 85048e __dosmaperr 12 API calls 17590->17591 17591->17592 17592->17532 17594 8514ac 17593->17594 17595 8538e2 __dosmaperr 14 API calls 17594->17595 17596 8514d3 17595->17596 17597 8514db 17596->17597 17603 8514e5 17596->17603 17598 853ec9 ___free_lconv_mon 14 API calls 17597->17598 17599 85146d 17598->17599 17599->17548 17600 851542 17601 853ec9 ___free_lconv_mon 14 API calls 17600->17601 17601->17599 17602 8538e2 __dosmaperr 14 API calls 17602->17603 17603->17600 17603->17602 17604 851551 17603->17604 17609 85156c 17603->17609 17611 853ec9 ___free_lconv_mon 14 API calls 17603->17611 18163 8537c9 17603->18163 18172 851579 17604->18172 17608 853ec9 ___free_lconv_mon 14 API calls 17610 85155e 17608->17610 18178 84e4f8 IsProcessorFeaturePresent 17609->18178 17614 853ec9 ___free_lconv_mon 14 API calls 17610->17614 17611->17603 17613 851578 17614->17599 17616 854e17 17615->17616 17617 854e1d 17615->17617 17663 8543f5 17616->17663 17638 854e23 17617->17638 17668 854434 17617->17668 17625 854e28 17640 85aff3 17625->17640 17626 854e64 17629 854434 __dosmaperr 6 API calls 17626->17629 17627 854e4f 17628 854434 __dosmaperr 6 API calls 17627->17628 17630 854e5b 17628->17630 17631 854e70 17629->17631 17635 853ec9 ___free_lconv_mon 14 API calls 17630->17635 17632 854e74 17631->17632 17633 854e83 17631->17633 17636 854434 __dosmaperr 6 API calls 17632->17636 17680 854b7f 17633->17680 17635->17638 17636->17630 17638->17625 17685 84e5e3 17638->17685 17639 853ec9 ___free_lconv_mon 14 API calls 17639->17625 17968 85b148 17640->17968 17645 85b036 17645->17565 17647 85b047 17648 85b05d 17647->17648 17649 85b04f 17647->17649 17993 85b243 17648->17993 17650 853ec9 ___free_lconv_mon 14 API calls 17649->17650 17650->17645 17653 85b095 17654 85048e __dosmaperr 14 API calls 17653->17654 17655 85b09a 17654->17655 17659 853ec9 ___free_lconv_mon 14 API calls 17655->17659 17656 85b0b0 17658 85b0dc 17656->17658 17660 853ec9 ___free_lconv_mon 14 API calls 17656->17660 17657 85b125 17662 853ec9 ___free_lconv_mon 14 API calls 17657->17662 17658->17657 18004 85ac65 17658->18004 17659->17645 17660->17658 17662->17645 17696 8541a4 17663->17696 17666 85442c TlsGetValue 17667 85441a 17667->17617 17669 8541a4 std::_Locinfo::_Locinfo_ctor 5 API calls 17668->17669 17670 854450 17669->17670 17671 85446e TlsSetValue 17670->17671 17672 854459 17670->17672 17672->17638 17673 8538e2 17672->17673 17678 8538ef __dosmaperr 17673->17678 17674 85392f 17714 85048e 17674->17714 17675 85391a RtlAllocateHeap 17676 85392d 17675->17676 17675->17678 17676->17626 17676->17627 17678->17674 17678->17675 17711 853262 17678->17711 17751 854a13 17680->17751 17853 856ce9 17685->17853 17688 84e5f3 17690 84e5fd IsProcessorFeaturePresent 17688->17690 17691 84e61c 17688->17691 17692 84e609 17690->17692 17693 851a3d std::locale::_Setgloballocale 23 API calls 17691->17693 17883 84e2cf 17692->17883 17695 84e626 17693->17695 17697 8541d2 17696->17697 17701 8541ce 17696->17701 17697->17701 17703 8540d9 17697->17703 17700 8541ec GetProcAddress 17700->17701 17702 8541fc std::_Locinfo::_Locinfo_ctor 17700->17702 17701->17666 17701->17667 17702->17701 17709 8540ea ___vcrt_FlsGetValue 17703->17709 17704 854180 17704->17700 17704->17701 17705 854108 LoadLibraryExW 17706 854187 17705->17706 17707 854123 GetLastError 17705->17707 17706->17704 17708 854199 FreeLibrary 17706->17708 17707->17709 17708->17704 17709->17704 17709->17705 17710 854156 LoadLibraryExW 17709->17710 17710->17706 17710->17709 17717 85328f 17711->17717 17728 854ea2 GetLastError 17714->17728 17716 850493 17716->17676 17718 85329b ___scrt_is_nonwritable_in_current_image 17717->17718 17723 84e56d EnterCriticalSection 17718->17723 17720 8532a6 17724 8532e2 17720->17724 17723->17720 17727 84e5b5 LeaveCriticalSection 17724->17727 17726 85326d 17726->17678 17727->17726 17729 854ebe 17728->17729 17730 854eb8 17728->17730 17732 854434 __dosmaperr 6 API calls 17729->17732 17750 854ec2 SetLastError 17729->17750 17731 8543f5 __dosmaperr 6 API calls 17730->17731 17731->17729 17733 854eda 17732->17733 17735 8538e2 __dosmaperr 12 API calls 17733->17735 17733->17750 17736 854eef 17735->17736 17737 854ef7 17736->17737 17738 854f08 17736->17738 17739 854434 __dosmaperr 6 API calls 17737->17739 17740 854434 __dosmaperr 6 API calls 17738->17740 17741 854f05 17739->17741 17742 854f14 17740->17742 17746 853ec9 ___free_lconv_mon 12 API calls 17741->17746 17743 854f2f 17742->17743 17744 854f18 17742->17744 17747 854b7f __dosmaperr 12 API calls 17743->17747 17745 854434 __dosmaperr 6 API calls 17744->17745 17745->17741 17746->17750 17748 854f3a 17747->17748 17749 853ec9 ___free_lconv_mon 12 API calls 17748->17749 17749->17750 17750->17716 17752 854a1f ___scrt_is_nonwritable_in_current_image 17751->17752 17765 84e56d EnterCriticalSection 17752->17765 17754 854a29 17766 854a59 17754->17766 17757 854b25 17758 854b31 ___scrt_is_nonwritable_in_current_image 17757->17758 17770 84e56d EnterCriticalSection 17758->17770 17760 854b3b 17771 854d06 17760->17771 17762 854b53 17775 854b73 17762->17775 17765->17754 17769 84e5b5 LeaveCriticalSection 17766->17769 17768 854a47 17768->17757 17769->17768 17770->17760 17772 854d3c __Getctype 17771->17772 17773 854d15 __Getctype 17771->17773 17772->17762 17773->17772 17778 85c901 17773->17778 17852 84e5b5 LeaveCriticalSection 17775->17852 17777 854b61 17777->17639 17779 85c917 17778->17779 17781 85c981 17778->17781 17779->17781 17784 85c94a 17779->17784 17789 853ec9 ___free_lconv_mon 14 API calls 17779->17789 17782 853ec9 ___free_lconv_mon 14 API calls 17781->17782 17805 85c9cf 17781->17805 17783 85c9a3 17782->17783 17785 853ec9 ___free_lconv_mon 14 API calls 17783->17785 17786 85c96c 17784->17786 17791 853ec9 ___free_lconv_mon 14 API calls 17784->17791 17788 853ec9 ___free_lconv_mon 14 API calls 17786->17788 17794 85c93f 17789->17794 17796 85c961 17791->17796 17806 85bbb7 17794->17806 17846 85ca72 17805->17846 17847 85ca7f 17846->17847 17851 85ca9e 17846->17851 17847->17851 17852->17777 17889 856c1b 17853->17889 17856 856d2e 17857 856d3a ___scrt_is_nonwritable_in_current_image 17856->17857 17858 854ea2 __dosmaperr 14 API calls 17857->17858 17861 856d67 std::locale::_Setgloballocale 17857->17861 17863 856d61 std::locale::_Setgloballocale 17857->17863 17858->17863 17859 856dae 17860 85048e __dosmaperr 14 API calls 17859->17860 17862 856db3 17860->17862 17865 856dda 17861->17865 17903 84e56d EnterCriticalSection 17861->17903 17900 84e4cb 17862->17900 17863->17859 17863->17861 17882 856d98 17863->17882 17868 856f0d 17865->17868 17869 856e1c 17865->17869 17879 856e4b 17865->17879 17871 856f18 17868->17871 17935 84e5b5 LeaveCriticalSection 17868->17935 17869->17879 17904 854d51 GetLastError 17869->17904 17872 851a3d std::locale::_Setgloballocale 23 API calls 17871->17872 17874 856f20 17872->17874 17876 854d51 __Getctype 43 API calls 17880 856ea0 17876->17880 17878 854d51 __Getctype 43 API calls 17878->17879 17931 856eba 17879->17931 17881 854d51 __Getctype 43 API calls 17880->17881 17880->17882 17881->17882 17882->17688 17884 84e2eb __fread_nolock std::locale::_Setgloballocale 17883->17884 17885 84e317 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 17884->17885 17888 84e3e8 std::locale::_Setgloballocale 17885->17888 17887 84e406 17887->17691 17960 846520 17888->17960 17890 856c27 ___scrt_is_nonwritable_in_current_image 17889->17890 17895 84e56d EnterCriticalSection 17890->17895 17892 856c35 17896 856c73 17892->17896 17895->17892 17899 84e5b5 LeaveCriticalSection 17896->17899 17898 84e5e8 17898->17688 17898->17856 17899->17898 17936 84e417 17900->17936 17903->17865 17905 854d67 17904->17905 17906 854d6d 17904->17906 17908 8543f5 __dosmaperr 6 API calls 17905->17908 17907 854434 __dosmaperr 6 API calls 17906->17907 17910 854d71 SetLastError 17906->17910 17909 854d89 17907->17909 17908->17906 17909->17910 17912 8538e2 __dosmaperr 14 API calls 17909->17912 17914 854e06 17910->17914 17915 854e01 17910->17915 17913 854d9e 17912->17913 17916 854db7 17913->17916 17917 854da6 17913->17917 17918 84e5e3 __FrameHandler3::FrameUnwindToState 41 API calls 17914->17918 17915->17878 17920 854434 __dosmaperr 6 API calls 17916->17920 17919 854434 __dosmaperr 6 API calls 17917->17919 17921 854e0b 17918->17921 17929 854db4 17919->17929 17922 854dc3 17920->17922 17923 854dc7 17922->17923 17924 854dde 17922->17924 17927 854434 __dosmaperr 6 API calls 17923->17927 17926 854b7f __dosmaperr 14 API calls 17924->17926 17925 853ec9 ___free_lconv_mon 14 API calls 17925->17910 17928 854de9 17926->17928 17927->17929 17930 853ec9 ___free_lconv_mon 14 API calls 17928->17930 17929->17925 17930->17910 17932 856ec0 17931->17932 17933 856e91 17931->17933 17959 84e5b5 LeaveCriticalSection 17932->17959 17933->17876 17933->17880 17933->17882 17935->17871 17937 84e429 _Fputc 17936->17937 17942 84e44e 17937->17942 17939 84e441 17953 84bc70 17939->17953 17943 84e45e 17942->17943 17945 84e465 17942->17945 17944 84bec0 _Deallocate 16 API calls 17943->17944 17944->17945 17946 84e2a6 _Deallocate GetLastError SetLastError 17945->17946 17949 84e473 17945->17949 17947 84e49a 17946->17947 17948 84e4f8 __Getctype 11 API calls 17947->17948 17947->17949 17950 84e4ca 17948->17950 17949->17939 17951 84e417 _Deallocate 43 API calls 17950->17951 17952 84e4d7 17951->17952 17952->17939 17954 84bc7c 17953->17954 17955 84bc93 17954->17955 17956 84bf10 _Fputc 43 API calls 17954->17956 17957 84bca6 17955->17957 17958 84bf10 _Fputc 43 API calls 17955->17958 17956->17955 17957->17882 17958->17957 17959->17933 17961 846528 17960->17961 17962 846529 IsProcessorFeaturePresent 17960->17962 17961->17887 17964 846ea2 17962->17964 17967 846e65 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17964->17967 17966 846f85 17966->17887 17967->17966 17969 85b154 ___scrt_is_nonwritable_in_current_image 17968->17969 17970 85b16e 17969->17970 18012 84e56d EnterCriticalSection 17969->18012 17973 85b01d 17970->17973 17974 84e5e3 __FrameHandler3::FrameUnwindToState 43 API calls 17970->17974 17972 85b17e 17977 853ec9 ___free_lconv_mon 14 API calls 17972->17977 17978 85b1aa 17972->17978 17979 85ad73 17973->17979 17976 85b1e7 17974->17976 17977->17978 18013 85b1c7 17978->18013 18017 8504a1 17979->18017 17982 85ad94 GetOEMCP 17984 85adbd 17982->17984 17983 85ada6 17983->17984 17985 85adab GetACP 17983->17985 17984->17645 17986 8550b1 17984->17986 17985->17984 17987 8550ef 17986->17987 17992 8550bf __dosmaperr 17986->17992 17989 85048e __dosmaperr 14 API calls 17987->17989 17988 8550da HeapAlloc 17990 8550ed 17988->17990 17988->17992 17989->17990 17990->17647 17991 853262 std::_Facet_Register 2 API calls 17991->17992 17992->17987 17992->17988 17992->17991 17994 85ad73 45 API calls 17993->17994 17995 85b263 17994->17995 17997 85b2a0 IsValidCodePage 17995->17997 18001 85b2dc __fread_nolock 17995->18001 17996 846520 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 17998 85b08a 17996->17998 17999 85b2b2 17997->17999 17997->18001 17998->17653 17998->17656 18000 85b2e1 GetCPInfo 17999->18000 18003 85b2bb __fread_nolock 17999->18003 18000->18001 18000->18003 18001->17996 18059 85ae47 18003->18059 18005 85ac71 ___scrt_is_nonwritable_in_current_image 18004->18005 18137 84e56d EnterCriticalSection 18005->18137 18007 85ac7b 18138 85acb2 18007->18138 18012->17972 18016 84e5b5 LeaveCriticalSection 18013->18016 18015 85b1ce 18015->17970 18016->18015 18018 8504bf 18017->18018 18024 8504b8 18017->18024 18019 854d51 __Getctype 43 API calls 18018->18019 18018->18024 18020 8504e0 18019->18020 18025 8550ff 18020->18025 18024->17982 18024->17983 18026 855112 18025->18026 18027 8504f6 18025->18027 18026->18027 18033 85cb4d 18026->18033 18029 85515d 18027->18029 18030 855170 18029->18030 18032 855185 18029->18032 18030->18032 18054 85b230 18030->18054 18032->18024 18034 85cb59 ___scrt_is_nonwritable_in_current_image 18033->18034 18035 854d51 __Getctype 43 API calls 18034->18035 18036 85cb62 18035->18036 18037 85cba8 18036->18037 18046 84e56d EnterCriticalSection 18036->18046 18037->18027 18039 85cb80 18047 85cbce 18039->18047 18044 84e5e3 __FrameHandler3::FrameUnwindToState 43 API calls 18045 85cbcd 18044->18045 18046->18039 18048 85cbdc __Getctype 18047->18048 18050 85cb91 18047->18050 18049 85c901 __Getctype 14 API calls 18048->18049 18048->18050 18049->18050 18051 85cbad 18050->18051 18052 84e5b5 std::_Lockit::~_Lockit LeaveCriticalSection 18051->18052 18053 85cba4 18052->18053 18053->18037 18053->18044 18055 854d51 __Getctype 43 API calls 18054->18055 18056 85b235 18055->18056 18057 85b148 __strnicoll 43 API calls 18056->18057 18058 85b240 18057->18058 18058->18032 18060 85ae6f GetCPInfo 18059->18060 18069 85af38 18059->18069 18061 85ae87 18060->18061 18060->18069 18070 859ca2 18061->18070 18062 846520 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 18064 85aff1 18062->18064 18064->18001 18069->18062 18071 8504a1 __strnicoll 43 API calls 18070->18071 18072 859cc2 18071->18072 18090 85a0bc 18072->18090 18137->18007 18164 8537d7 18163->18164 18165 8537e5 18163->18165 18164->18165 18167 8537fd 18164->18167 18166 85048e __dosmaperr 14 API calls 18165->18166 18171 8537ed 18166->18171 18169 8537f7 18167->18169 18170 85048e __dosmaperr 14 API calls 18167->18170 18168 84e4cb __strnicoll 43 API calls 18168->18169 18169->17603 18170->18171 18171->18168 18173 851586 18172->18173 18177 851557 18172->18177 18174 85159d 18173->18174 18175 853ec9 ___free_lconv_mon 14 API calls 18173->18175 18176 853ec9 ___free_lconv_mon 14 API calls 18174->18176 18175->18173 18176->18177 18177->17608 18179 84e504 18178->18179 18180 84e2cf std::locale::_Setgloballocale 8 API calls 18179->18180 18181 84e519 GetCurrentProcess TerminateProcess 18180->18181 18181->17613 18183 846538 ___std_exception_copy 18182->18183 18184 846552 18183->18184 18185 853262 std::_Facet_Register 2 API calls 18183->18185 18187 841209 Concurrency::cancel_current_task 18183->18187 18184->17413 18185->18183 18186 84655e 18186->18186 18187->18186 18241 84783a 18187->18241 18189 841225 18244 84117f 18189->18244 18193 84adb7 18192->18193 18194 84adcb 18192->18194 18195 85048e __dosmaperr 14 API calls 18193->18195 18253 84ad5a 18194->18253 18198 84adbc 18195->18198 18200 84e4cb __strnicoll 43 API calls 18198->18200 18199 84ade0 CreateThread 18201 84adff GetLastError 18199->18201 18202 84ae0b 18199->18202 18278 84ac4e 18199->18278 18203 84adc7 18200->18203 18262 850434 18201->18262 18267 84accc 18202->18267 18203->17415 18208 845e07 18207->18208 18211 845e39 18207->18211 18209 845e24 CloseHandle 18208->18209 18210 845e0e GetExitCodeThread 18208->18210 18209->18211 18210->18211 18212 845e1f 18210->18212 18211->17425 18211->17426 18212->18209 18214 843c1d __EH_prolog3_catch 18213->18214 18215 843d20 18214->18215 18216 843c3a 18214->18216 18326 843ef0 18215->18326 18218 843c57 18216->18218 18219 843d25 18216->18219 18318 843e92 18218->18318 18333 841209 18219->18333 18223 843c6d ctype 18224 843cec std::ios_base::_Init 18223->18224 18225 843798 _Deallocate 43 API calls 18223->18225 18224->17428 18225->18224 18227 8437a5 18226->18227 18228 8437b2 messages 18226->18228 18364 841256 18227->18364 18228->17430 18231 84417c std::_Throw_Cpp_error 18230->18231 18371 844052 18231->18371 18239 84d77e ___scrt_is_nonwritable_in_current_image 18236->18239 18237 854d51 __Getctype 43 API calls 18237->18239 18238 84e5e3 __FrameHandler3::FrameUnwindToState 43 API calls 18238->18239 18239->18236 18239->18237 18239->18238 18240 851a69 std::_Locinfo::_Locinfo_ctor 18239->18240 18240->17424 18242 847854 18241->18242 18243 847881 RaiseException 18241->18243 18242->18243 18243->18189 18247 8470ab 18244->18247 18248 8470b8 ___std_exception_copy 18247->18248 18252 8411a0 18247->18252 18249 8537c9 ___std_exception_copy 43 API calls 18248->18249 18251 8470e5 18248->18251 18248->18252 18249->18251 18250 84d86b numpunct 14 API calls 18250->18252 18251->18250 18252->17413 18254 8538e2 __dosmaperr 14 API calls 18253->18254 18255 84ad6b 18254->18255 18256 853ec9 ___free_lconv_mon 14 API calls 18255->18256 18257 84ad78 18256->18257 18258 84ad9c 18257->18258 18259 84ad7f GetModuleHandleExW 18257->18259 18260 84accc 16 API calls 18258->18260 18259->18258 18261 84ada4 18260->18261 18261->18199 18261->18202 18275 85047b 18262->18275 18264 85043f __dosmaperr 18265 85048e __dosmaperr 14 API calls 18264->18265 18266 850452 18265->18266 18266->18202 18268 84acfc 18267->18268 18269 84acd8 18267->18269 18268->17415 18270 84ace7 18269->18270 18271 84acde CloseHandle 18269->18271 18272 84acf6 18270->18272 18273 84aced FreeLibrary 18270->18273 18271->18270 18274 853ec9 ___free_lconv_mon 14 API calls 18272->18274 18273->18272 18274->18268 18276 854ea2 __dosmaperr 14 API calls 18275->18276 18277 850480 18276->18277 18277->18264 18279 84ac5a ___scrt_is_nonwritable_in_current_image 18278->18279 18280 84ac61 GetLastError ExitThread 18279->18280 18281 84ac6e 18279->18281 18282 854d51 __Getctype 43 API calls 18281->18282 18283 84ac73 18282->18283 18292 85503c 18283->18292 18286 84ac8a 18297 84ae2d 18286->18297 18293 85504e GetPEB 18292->18293 18294 84ac7e 18292->18294 18293->18294 18295 855061 18293->18295 18294->18286 18300 854641 18294->18300 18303 854267 18295->18303 18306 84ad03 18297->18306 18301 8541a4 std::_Locinfo::_Locinfo_ctor 5 API calls 18300->18301 18302 85465d 18301->18302 18302->18286 18304 8541a4 std::_Locinfo::_Locinfo_ctor 5 API calls 18303->18304 18305 854283 18304->18305 18305->18294 18307 854ea2 __dosmaperr 14 API calls 18306->18307 18309 84ad0e 18307->18309 18308 84ad50 ExitThread 18309->18308 18311 84ad27 18309->18311 18315 85467c 18309->18315 18312 84ad3a 18311->18312 18313 84ad33 CloseHandle 18311->18313 18312->18308 18314 84ad46 FreeLibraryAndExitThread 18312->18314 18313->18312 18314->18308 18316 8541a4 std::_Locinfo::_Locinfo_ctor 5 API calls 18315->18316 18317 854695 18316->18317 18317->18311 18319 843e9d 18318->18319 18322 843ea5 18318->18322 18339 843f17 18319->18339 18321 843eb1 18321->18223 18322->18321 18324 846533 std::_Facet_Register 44 API calls 18322->18324 18323 843ea3 18323->18223 18325 843eaf 18324->18325 18325->18223 18353 8442d4 18326->18353 18334 841217 Concurrency::cancel_current_task 18333->18334 18335 84783a Concurrency::cancel_current_task RaiseException 18334->18335 18336 841225 18335->18336 18337 84117f std::bad_exception::bad_exception 43 API calls 18336->18337 18338 841232 18337->18338 18340 843f26 18339->18340 18341 841209 Concurrency::cancel_current_task 18339->18341 18342 846533 std::_Facet_Register 44 API calls 18340->18342 18344 84783a Concurrency::cancel_current_task RaiseException 18341->18344 18343 843f2c 18342->18343 18345 843f33 18343->18345 18348 84e417 _Deallocate 43 API calls 18343->18348 18346 841225 18344->18346 18345->18323 18347 84117f std::bad_exception::bad_exception 43 API calls 18346->18347 18349 841232 18347->18349 18350 84e4ea 18348->18350 18349->18323 18351 84e4f8 __Getctype 11 API calls 18350->18351 18352 84e4f7 18351->18352 18358 8441f7 18353->18358 18356 84783a Concurrency::cancel_current_task RaiseException 18357 8442f3 18356->18357 18361 84114a 18358->18361 18362 8470ab ___std_exception_copy 43 API calls 18361->18362 18363 841176 18362->18363 18363->18356 18365 841270 18364->18365 18366 841273 18364->18366 18365->18228 18367 84e417 _Deallocate 43 API calls 18366->18367 18368 84e4ea 18367->18368 18369 84e4f8 __Getctype 11 API calls 18368->18369 18370 84e4f7 18369->18370 18372 84405e __EH_prolog3_GS 18371->18372 18381 841d09 18372->18381 18382 841d26 _strlen 18381->18382 18403 843227 18382->18403 18384 841d33 18385 8413c7 18384->18385 18413 841d62 18385->18413 18404 843292 18403->18404 18406 843238 std::_Throw_Cpp_error 18403->18406 18410 841278 18404->18410 18408 84323f std::_Throw_Cpp_error 18406->18408 18409 843e92 std::_Throw_Cpp_error 44 API calls 18406->18409 18408->18384 18409->18408 18411 8442d4 std::_Throw_Cpp_error 44 API calls 18410->18411 18412 841282 18411->18412 18414 841d82 18413->18414 18433 843298 18414->18433 18416 8413e8 18417 841345 18416->18417 18418 841376 18417->18418 18419 841360 _strlen 18417->18419 18421 842640 std::_Throw_Cpp_error 44 API calls 18418->18421 18440 842640 18419->18440 18422 84139c 18421->18422 18423 84261a std::_Throw_Cpp_error 43 API calls 18422->18423 18424 8413a4 std::_Throw_Cpp_error 18423->18424 18425 84261a std::_Throw_Cpp_error 43 API calls 18424->18425 18426 8413b7 18425->18426 18434 8432fa 18433->18434 18436 8432a9 std::_Throw_Cpp_error 18433->18436 18435 841278 std::_Throw_Cpp_error 44 API calls 18434->18435 18437 8432ff 18435->18437 18438 843e92 std::_Throw_Cpp_error 44 API calls 18436->18438 18439 8432b0 std::_Throw_Cpp_error ctype 18436->18439 18438->18439 18439->18416 18441 842680 18440->18441 18443 842656 std::_Throw_Cpp_error 18440->18443 18444 8436e4 18441->18444 18443->18418 18445 843792 18444->18445 18447 843701 std::_Throw_Cpp_error 18444->18447 18446 841278 std::_Throw_Cpp_error 44 API calls 18445->18446 18448 843797 18446->18448 18449 843e92 std::_Throw_Cpp_error 44 API calls 18447->18449 18450 843720 std::_Throw_Cpp_error 18449->18450 18454 8518a0 18453->18454 18455 85188e 18453->18455 18465 851729 18454->18465 18480 851929 GetModuleHandleW 18455->18480 18458 84650d 18458->17456 18466 851735 ___scrt_is_nonwritable_in_current_image 18465->18466 18488 84e56d EnterCriticalSection 18466->18488 18468 85173f 18489 851776 18468->18489 18470 85174c 18493 85176a 18470->18493 18473 8518f8 18518 85196c 18473->18518 18476 851916 18478 85198e std::locale::_Setgloballocale 3 API calls 18476->18478 18477 851906 GetCurrentProcess TerminateProcess 18477->18476 18479 85191e ExitProcess 18478->18479 18481 851893 18480->18481 18481->18454 18482 85198e GetModuleHandleExW 18481->18482 18483 8519cd GetProcAddress 18482->18483 18484 8519ee 18482->18484 18483->18484 18485 8519e1 18483->18485 18486 8519f4 FreeLibrary 18484->18486 18487 85189f 18484->18487 18485->18484 18486->18487 18487->18454 18488->18468 18490 851782 ___scrt_is_nonwritable_in_current_image 18489->18490 18492 8517e9 std::locale::_Setgloballocale 18490->18492 18496 853593 18490->18496 18492->18470 18517 84e5b5 LeaveCriticalSection 18493->18517 18495 851758 18495->18458 18495->18473 18497 85359f __EH_prolog3 18496->18497 18500 8532eb 18497->18500 18499 8535c6 std::ios_base::_Init 18499->18492 18501 8532f7 ___scrt_is_nonwritable_in_current_image 18500->18501 18508 84e56d EnterCriticalSection 18501->18508 18503 853305 18509 8534a3 18503->18509 18508->18503 18510 8534c2 18509->18510 18511 853312 18509->18511 18510->18511 18512 853ec9 ___free_lconv_mon 14 API calls 18510->18512 18513 85333a 18511->18513 18512->18511 18516 84e5b5 LeaveCriticalSection 18513->18516 18515 853323 18515->18499 18516->18515 18517->18495 18523 855080 GetPEB 18518->18523 18521 851976 GetPEB 18522 851902 18521->18522 18522->18476 18522->18477 18524 851971 18523->18524 18525 85509a 18523->18525 18524->18521 18524->18522 18527 854227 18525->18527 18528 8541a4 std::_Locinfo::_Locinfo_ctor 5 API calls 18527->18528 18529 854243 18528->18529 18529->18524 18531 853745 18530->18531 18532 853757 ___scrt_uninitialize_crt 18530->18532 18533 853753 18531->18533 18535 84ea87 18531->18535 18532->17450 18533->17450 18538 84e914 18535->18538 18541 84e808 18538->18541 18542 84e814 ___scrt_is_nonwritable_in_current_image 18541->18542 18549 84e56d EnterCriticalSection 18542->18549 18544 84e88a 18558 84e8a8 18544->18558 18546 84e81e ___scrt_uninitialize_crt 18546->18544 18550 84e77c 18546->18550 18549->18546 18551 84e788 ___scrt_is_nonwritable_in_current_image 18550->18551 18561 84ac26 EnterCriticalSection 18551->18561 18674 84e5b5 LeaveCriticalSection 18558->18674 19245 841094 19248 8467dc 19245->19248 19251 8467af 19248->19251 19252 8467c5 19251->19252 19253 8467be 19251->19253 19260 8535fa 19252->19260 19257 85357d 19253->19257 19256 841099 19258 8535fa 46 API calls 19257->19258 19259 85358f 19258->19259 19259->19256 19263 853346 19260->19263 19264 853352 ___scrt_is_nonwritable_in_current_image 19263->19264 19271 84e56d EnterCriticalSection 19264->19271 19266 853360 19272 8533a1 19266->19272 19268 85336d 19282 853395 19268->19282 19271->19266 19273 8533bc 19272->19273 19281 85342f std::_Locinfo::_Locinfo_ctor 19272->19281 19280 85340f 19273->19280 19273->19281 19285 85de73 19273->19285 19275 85de73 46 API calls 19277 853425 19275->19277 19276 853405 19278 853ec9 ___free_lconv_mon 14 API calls 19276->19278 19279 853ec9 ___free_lconv_mon 14 API calls 19277->19279 19278->19280 19279->19281 19280->19275 19280->19281 19281->19268 19313 84e5b5 LeaveCriticalSection 19282->19313 19284 85337e 19284->19256 19286 85de80 19285->19286 19287 85de9b 19285->19287 19286->19287 19289 85de8c 19286->19289 19288 85deaa 19287->19288 19294 860c2f 19287->19294 19301 85a046 19288->19301 19291 85048e __dosmaperr 14 API calls 19289->19291 19293 85de91 __fread_nolock 19291->19293 19293->19276 19295 860c4f HeapSize 19294->19295 19296 860c3a 19294->19296 19295->19288 19297 85048e __dosmaperr 14 API calls 19296->19297 19298 860c3f 19297->19298 19299 84e4cb __strnicoll 43 API calls 19298->19299 19300 860c4a 19299->19300 19300->19288 19302 85a053 19301->19302 19303 85a05e 19301->19303 19304 8550b1 __strnicoll 15 API calls 19302->19304 19305 85a066 19303->19305 19311 85a06f __dosmaperr 19303->19311 19309 85a05b 19304->19309 19306 853ec9 ___free_lconv_mon 14 API calls 19305->19306 19306->19309 19307 85a074 19310 85048e __dosmaperr 14 API calls 19307->19310 19308 85a099 HeapReAlloc 19308->19309 19308->19311 19309->19293 19310->19309 19311->19307 19311->19308 19312 853262 std::_Facet_Register 2 API calls 19311->19312 19312->19311 19313->19284 21825 84ab94 21826 84ea87 ___scrt_uninitialize_crt 72 API calls 21825->21826 21827 84ab9c 21826->21827 21835 854736 21827->21835 21829 84aba1 21830 8547e1 14 API calls 21829->21830 21831 84abb0 DeleteCriticalSection 21830->21831 21831->21829 21832 84abcb 21831->21832 21833 853ec9 ___free_lconv_mon 14 API calls 21832->21833 21834 84abd6 21833->21834 21836 854742 ___scrt_is_nonwritable_in_current_image 21835->21836 21845 84e56d EnterCriticalSection 21836->21845 21838 8547b9 21852 8547d8 21838->21852 21841 85478d DeleteCriticalSection 21842 853ec9 ___free_lconv_mon 14 API calls 21841->21842 21844 85474d 21842->21844 21844->21838 21844->21841 21846 84e74c 21844->21846 21845->21844 21847 84e75f _Fputc 21846->21847 21855 84e627 21847->21855 21849 84e76b 21850 84bc70 _Fputc 43 API calls 21849->21850 21851 84e777 21850->21851 21851->21844 21927 84e5b5 LeaveCriticalSection 21852->21927 21854 8547c5 21854->21829 21856 84e633 ___scrt_is_nonwritable_in_current_image 21855->21856 21857 84e660 21856->21857 21858 84e63d 21856->21858 21860 84e658 21857->21860 21866 84ac26 EnterCriticalSection 21857->21866 21859 84e44e _Deallocate 43 API calls 21858->21859 21859->21860 21860->21849 21862 84e67e 21867 84e6be 21862->21867 21864 84e68b 21881 84e6b6 21864->21881 21866->21862 21868 84e6ee 21867->21868 21869 84e6cb 21867->21869 21871 84e6e6 21868->21871 21872 84e9b9 ___scrt_uninitialize_crt 68 API calls 21868->21872 21870 84e44e _Deallocate 43 API calls 21869->21870 21870->21871 21871->21864 21873 84e706 21872->21873 21874 8547e1 14 API calls 21873->21874 21875 84e70e 21874->21875 21876 855fa2 __fread_nolock 43 API calls 21875->21876 21877 84e71a 21876->21877 21884 856fb2 21877->21884 21880 853ec9 ___free_lconv_mon 14 API calls 21880->21871 21926 84ac3a LeaveCriticalSection 21881->21926 21883 84e6bc 21883->21860 21886 84e721 21884->21886 21887 856fdb 21884->21887 21885 85702a 21888 84e44e _Deallocate 43 API calls 21885->21888 21886->21871 21886->21880 21887->21885 21889 857002 21887->21889 21888->21886 21891 856f21 21889->21891 21892 856f2d ___scrt_is_nonwritable_in_current_image 21891->21892 21899 85ba60 EnterCriticalSection 21892->21899 21894 856f3b 21895 856f6c 21894->21895 21900 857055 21894->21900 21913 856fa6 21895->21913 21899->21894 21901 85bb37 __fread_nolock 43 API calls 21900->21901 21904 857065 21901->21904 21902 85706b 21916 85baa6 21902->21916 21904->21902 21905 85bb37 __fread_nolock 43 API calls 21904->21905 21912 85709d 21904->21912 21907 857094 21905->21907 21906 85bb37 __fread_nolock 43 API calls 21908 8570a9 CloseHandle 21906->21908 21911 85bb37 __fread_nolock 43 API calls 21907->21911 21908->21902 21909 8570b5 GetLastError 21908->21909 21909->21902 21910 8570c3 __fread_nolock 21910->21895 21911->21912 21912->21902 21912->21906 21925 85ba83 LeaveCriticalSection 21913->21925 21915 856f8f 21915->21886 21917 85bb1c 21916->21917 21920 85bab5 21916->21920 21918 85048e __dosmaperr 14 API calls 21917->21918 21919 85bb21 21918->21919 21921 85047b __dosmaperr 14 API calls 21919->21921 21920->21917 21924 85badf 21920->21924 21922 85bb0c 21921->21922 21922->21910 21923 85bb06 SetStdHandle 21923->21922 21924->21922 21924->21923 21925->21915 21926->21883 21927->21854 19341 844c9b 19344 844428 19341->19344 19343 844ca9 19345 844434 __EH_prolog3 19344->19345 19360 843fc3 19345->19360 19349 844455 19350 844468 19349->19350 19372 84499c 19349->19372 19383 84401b 19350->19383 19353 844478 19355 8444b7 19353->19355 19356 84447f 19353->19356 19354 8444af std::ios_base::_Init 19354->19343 19390 84155a 19355->19390 19380 8457f8 19356->19380 19361 843fd2 19360->19361 19362 843fd9 19360->19362 19396 84e5cc 19361->19396 19365 843fd7 19362->19365 19401 845ea7 EnterCriticalSection 19362->19401 19366 841684 19365->19366 19367 8416b4 19366->19367 19368 841690 19366->19368 19367->19349 19369 843fc3 std::_Lockit::_Lockit 7 API calls 19368->19369 19370 84169a 19369->19370 19371 84401b std::_Lockit::~_Lockit 2 API calls 19370->19371 19371->19367 19374 8449a8 __EH_prolog3 19372->19374 19373 8449fb std::ios_base::_Init 19373->19353 19374->19373 19375 846533 std::_Facet_Register 44 API calls 19374->19375 19377 8449bf codecvt 19375->19377 19376 8449dd 19376->19373 19462 841607 19376->19462 19377->19376 19453 8415af 19377->19453 19381 846533 std::_Facet_Register 44 API calls 19380->19381 19382 845803 19381->19382 19382->19350 19384 844025 19383->19384 19385 84e5da 19383->19385 19389 844038 19384->19389 19639 845eb5 LeaveCriticalSection 19384->19639 19640 84e5b5 LeaveCriticalSection 19385->19640 19388 84e5e1 19388->19354 19389->19354 19391 841568 Concurrency::cancel_current_task 19390->19391 19392 84783a Concurrency::cancel_current_task RaiseException 19391->19392 19393 841576 19392->19393 19394 84117f std::bad_exception::bad_exception 43 API calls 19393->19394 19395 841583 19394->19395 19402 8546b5 19396->19402 19401->19365 19423 853fbb 19402->19423 19422 8546e7 19422->19422 19424 8541a4 std::_Locinfo::_Locinfo_ctor 5 API calls 19423->19424 19425 853fd1 19424->19425 19426 853fd5 19425->19426 19427 8541a4 std::_Locinfo::_Locinfo_ctor 5 API calls 19426->19427 19428 853feb 19427->19428 19429 853fef 19428->19429 19430 8541a4 std::_Locinfo::_Locinfo_ctor 5 API calls 19429->19430 19431 854005 19430->19431 19432 854009 19431->19432 19433 8541a4 std::_Locinfo::_Locinfo_ctor 5 API calls 19432->19433 19434 85401f 19433->19434 19435 854023 19434->19435 19436 8541a4 std::_Locinfo::_Locinfo_ctor 5 API calls 19435->19436 19437 854039 19436->19437 19438 85403d 19437->19438 19439 8541a4 std::_Locinfo::_Locinfo_ctor 5 API calls 19438->19439 19440 854053 19439->19440 19441 854057 19440->19441 19442 8541a4 std::_Locinfo::_Locinfo_ctor 5 API calls 19441->19442 19443 85406d 19442->19443 19444 854071 19443->19444 19445 8541a4 std::_Locinfo::_Locinfo_ctor 5 API calls 19444->19445 19446 854087 19445->19446 19447 8540a5 19446->19447 19448 8541a4 std::_Locinfo::_Locinfo_ctor 5 API calls 19447->19448 19449 8540bb 19448->19449 19450 85408b 19449->19450 19451 8541a4 std::_Locinfo::_Locinfo_ctor 5 API calls 19450->19451 19452 8540a1 19451->19452 19452->19422 19454 843fc3 std::_Lockit::_Lockit 7 API calls 19453->19454 19455 8415bb 19454->19455 19456 8415fc 19455->19456 19457 8415e9 19455->19457 19486 844314 19456->19486 19477 845928 19457->19477 19635 845973 19462->19635 19465 84d86b numpunct 14 API calls 19467 841620 19465->19467 19466 84d86b numpunct 14 API calls 19468 841633 19466->19468 19467->19466 19467->19468 19469 84d86b numpunct 14 API calls 19468->19469 19471 841644 19468->19471 19469->19471 19470 841655 19473 841666 19470->19473 19475 84d86b numpunct 14 API calls 19470->19475 19471->19470 19472 84d86b numpunct 14 API calls 19471->19472 19472->19470 19474 841677 19473->19474 19476 84d86b numpunct 14 API calls 19473->19476 19475->19473 19476->19474 19491 84fd53 19477->19491 19481 84594c 19482 84fd53 std::_Locinfo::_Locinfo_ctor 70 API calls 19481->19482 19483 84595c 19481->19483 19482->19483 19484 845782 _Yarn 14 API calls 19483->19484 19485 8415f3 19484->19485 19485->19376 19632 84426b 19486->19632 19489 84783a Concurrency::cancel_current_task RaiseException 19490 844333 19489->19490 19492 8546b5 std::_Locinfo::_Locinfo_ctor 5 API calls 19491->19492 19493 84fd60 19492->19493 19500 84fafe 19493->19500 19496 845782 19497 845790 19496->19497 19499 84579c ___std_exception_copy ctype 19496->19499 19498 84d86b numpunct 14 API calls 19497->19498 19497->19499 19498->19499 19499->19481 19501 84fb0a ___scrt_is_nonwritable_in_current_image 19500->19501 19508 84e56d EnterCriticalSection 19501->19508 19503 84fb18 19509 84fb59 19503->19509 19508->19503 19534 84fcb8 19509->19534 19511 84fb74 19512 854d51 __Getctype 43 API calls 19511->19512 19528 84fb25 19511->19528 19513 84fb81 19512->19513 19558 8599cd 19513->19558 19516 84fbad 19519 84e4f8 __Getctype 11 API calls 19516->19519 19516->19528 19517 8550b1 __strnicoll 15 API calls 19518 84fbd2 19517->19518 19521 8599cd std::_Locinfo::_Locinfo_ctor 45 API calls 19518->19521 19518->19528 19520 84fcb7 19519->19520 19522 84fbee 19521->19522 19523 84fbf5 19522->19523 19524 84fc10 19522->19524 19523->19516 19525 84fc07 19523->19525 19526 853ec9 ___free_lconv_mon 14 API calls 19524->19526 19529 84fc3b 19524->19529 19527 853ec9 ___free_lconv_mon 14 API calls 19525->19527 19526->19529 19527->19528 19531 84fb4d 19528->19531 19529->19528 19530 853ec9 ___free_lconv_mon 14 API calls 19529->19530 19530->19528 19631 84e5b5 LeaveCriticalSection 19531->19631 19533 845934 19533->19496 19535 84fcc4 19534->19535 19536 84fcd2 19534->19536 19564 852536 19535->19564 19579 85960b 19536->19579 19539 84fcce 19539->19511 19541 8538e2 __dosmaperr 14 API calls 19544 84fd04 19541->19544 19542 84fd48 19543 84e4f8 __Getctype 11 API calls 19542->19543 19545 84fd52 19543->19545 19546 85960b std::_Locinfo::_Locinfo_ctor 45 API calls 19544->19546 19557 84fd2c 19544->19557 19548 8546b5 std::_Locinfo::_Locinfo_ctor 5 API calls 19545->19548 19549 84fd1b 19546->19549 19547 853ec9 ___free_lconv_mon 14 API calls 19550 84fd41 19547->19550 19551 84fd60 19548->19551 19552 84fd2e 19549->19552 19554 84fd22 19549->19554 19550->19511 19553 84fafe std::_Locinfo::_Locinfo_ctor 70 API calls 19551->19553 19555 852536 std::_Locinfo::_Locinfo_ctor 67 API calls 19552->19555 19556 84fd89 19553->19556 19554->19542 19554->19557 19555->19557 19556->19511 19557->19547 19559 8599e1 _Fputc 19558->19559 19598 859648 19559->19598 19562 84bc70 _Fputc 43 API calls 19563 84fba6 19562->19563 19563->19516 19563->19517 19565 852560 19564->19565 19566 85254c 19564->19566 19567 854d51 __Getctype 43 API calls 19565->19567 19568 85048e __dosmaperr 14 API calls 19566->19568 19570 852565 19567->19570 19569 852551 19568->19569 19571 84e4cb __strnicoll 43 API calls 19569->19571 19572 8546b5 std::_Locinfo::_Locinfo_ctor 5 API calls 19570->19572 19573 85255c 19571->19573 19574 85256d 19572->19574 19573->19539 19575 85cb4d __Getctype 43 API calls 19574->19575 19576 852572 19575->19576 19585 851b3e 19576->19585 19578 8525b4 19578->19539 19580 85961e _Fputc 19579->19580 19589 859360 19580->19589 19583 84bc70 _Fputc 43 API calls 19584 84fce9 19583->19584 19584->19541 19584->19542 19586 851b4a ___scrt_is_nonwritable_in_current_image 19585->19586 19587 851c6b std::_Locinfo::_Locinfo_ctor 67 API calls 19586->19587 19588 851b56 std::_Locinfo::_Locinfo_ctor 19587->19588 19588->19578 19590 859373 19589->19590 19591 859377 19590->19591 19592 85939f 19590->19592 19593 84e44e _Deallocate 43 API calls 19591->19593 19594 859440 std::_Locinfo::_Locinfo_ctor 45 API calls 19592->19594 19597 8593c4 19592->19597 19596 859395 19593->19596 19594->19597 19595 84e44e _Deallocate 43 API calls 19595->19596 19596->19583 19597->19595 19597->19596 19599 85965f 19598->19599 19600 859663 19599->19600 19601 85968b 19599->19601 19602 84e44e _Deallocate 43 API calls 19600->19602 19606 8596ad 19601->19606 19607 859726 19601->19607 19605 859681 19602->19605 19604 84e44e _Deallocate 43 API calls 19604->19605 19605->19562 19606->19604 19606->19605 19608 859756 19607->19608 19609 859765 19608->19609 19610 859783 19608->19610 19628 85975a 19608->19628 19611 84e44e _Deallocate 43 API calls 19609->19611 19612 859790 19610->19612 19613 84d350 _swprintf 43 API calls 19610->19613 19611->19628 19615 8597c8 19612->19615 19616 8597aa 19612->19616 19613->19612 19614 846520 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 19617 8599cb 19614->19617 19619 8597dc 19615->19619 19620 859958 19615->19620 19618 85ff50 std::_Locinfo::_Locinfo_ctor 5 API calls 19616->19618 19617->19606 19618->19628 19621 859876 19619->19621 19627 859820 19619->19627 19619->19628 19622 85a138 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 19620->19622 19620->19628 19623 85a138 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 19621->19623 19622->19628 19624 859889 19623->19624 19626 8598a2 GetLastError 19624->19626 19624->19628 19625 85a138 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 19625->19628 19626->19628 19630 8598b1 19626->19630 19627->19625 19628->19614 19629 85a138 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 19629->19630 19630->19628 19630->19629 19631->19533 19633 84114a std::exception::exception 43 API calls 19632->19633 19634 84427d 19633->19634 19634->19489 19636 84597f 19635->19636 19637 841611 19635->19637 19638 84fd53 std::_Locinfo::_Locinfo_ctor 70 API calls 19636->19638 19637->19465 19637->19467 19638->19637 19639->19389 19640->19388 20054 851eb7 20057 851b83 20054->20057 20058 851b8f ___scrt_is_nonwritable_in_current_image 20057->20058 20065 84e56d EnterCriticalSection 20058->20065 20060 851bc7 20066 851be5 20060->20066 20061 851b99 20061->20060 20063 85cbce __Getctype 14 API calls 20061->20063 20063->20061 20065->20061 20069 84e5b5 LeaveCriticalSection 20066->20069 20068 851bd3 20069->20068 20189 8450c3 20190 8450fb 20189->20190 20191 8450cc 20189->20191 20191->20190 20194 84ea90 20191->20194 20193 8450ee 20195 84eaa2 20194->20195 20197 84eaab ___scrt_uninitialize_crt 20194->20197 20196 84e914 ___scrt_uninitialize_crt 72 API calls 20195->20196 20198 84eaa8 20196->20198 20199 84eabc 20197->20199 20202 84e8b4 20197->20202 20198->20193 20199->20193 20203 84e8c0 ___scrt_is_nonwritable_in_current_image 20202->20203 20210 84ac26 EnterCriticalSection 20203->20210 20205 84e8ce 20206 84ea22 ___scrt_uninitialize_crt 72 API calls 20205->20206 20207 84e8df 20206->20207 20211 84e908 20207->20211 20210->20205 20214 84ac3a LeaveCriticalSection 20211->20214 20213 84e8f1 20213->20193 20214->20213 19152 8464cf 19153 846d14 GetModuleHandleW 19152->19153 19154 8464d7 19153->19154 19155 84650d 19154->19155 19156 8464db 19154->19156 19157 851a3d std::locale::_Setgloballocale 23 API calls 19155->19157 19158 8464e6 19156->19158 19161 851a1f 19156->19161 19159 846515 19157->19159 19162 851861 std::locale::_Setgloballocale 23 API calls 19161->19162 19163 851a2a 19162->19163 19163->19158 19164 8584cb 19165 855fa2 __fread_nolock 43 API calls 19164->19165 19168 8584d8 19165->19168 19166 8584e4 19167 858530 19167->19166 19170 858592 19167->19170 19172 855fde 43 API calls 19167->19172 19168->19166 19168->19167 19181 858693 19168->19181 19189 8585c1 19170->19189 19174 858585 19172->19174 19174->19170 19176 859304 19174->19176 19177 8538e2 __dosmaperr 14 API calls 19176->19177 19178 859321 19177->19178 19179 853ec9 ___free_lconv_mon 14 API calls 19178->19179 19180 85932b 19179->19180 19180->19170 19182 8586ad 19181->19182 19183 8586a9 19181->19183 19184 85bb37 __fread_nolock 43 API calls 19182->19184 19185 8586fc 19182->19185 19183->19167 19186 8586ce 19184->19186 19185->19167 19186->19185 19187 8586d6 SetFilePointerEx 19186->19187 19187->19185 19188 8586ed GetFileSizeEx 19187->19188 19188->19185 19190 855fa2 __fread_nolock 43 API calls 19189->19190 19191 8585d0 19190->19191 19192 858676 19191->19192 19193 8585e3 19191->19193 19194 8579fd ___scrt_uninitialize_crt 68 API calls 19192->19194 19195 858600 19193->19195 19198 858627 19193->19198 19197 8585a3 19194->19197 19196 8579fd ___scrt_uninitialize_crt 68 API calls 19195->19196 19196->19197 19198->19197 19200 859248 19198->19200 19201 85925c _Fputc 19200->19201 19206 85909f 19201->19206 19204 84bc70 _Fputc 43 API calls 19205 859280 19204->19205 19205->19197 19207 8590ab ___scrt_is_nonwritable_in_current_image 19206->19207 19208 859189 19207->19208 19210 859107 19207->19210 19216 8590b3 19207->19216 19209 84e44e _Deallocate 43 API calls 19208->19209 19209->19216 19217 85ba60 EnterCriticalSection 19210->19217 19212 85910d 19213 859132 19212->19213 19218 8591c5 19212->19218 19224 859181 19213->19224 19216->19204 19217->19212 19219 85bb37 __fread_nolock 43 API calls 19218->19219 19220 8591d7 19219->19220 19221 8591f3 SetFilePointerEx 19220->19221 19223 8591df __fread_nolock 19220->19223 19222 85920b GetLastError 19221->19222 19221->19223 19222->19223 19223->19213 19227 85ba83 LeaveCriticalSection 19224->19227 19226 859187 19226->19216 19227->19226 20352 844edc 20353 844ef0 20352->20353 20359 844f4b 20353->20359 20360 844899 20353->20360 20356 844f38 20356->20359 20372 84ec2d 20356->20372 20361 844902 20360->20361 20364 8448b3 20360->20364 20362 846520 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 20361->20362 20363 844919 20362->20363 20363->20356 20363->20359 20366 84f44d 20363->20366 20364->20361 20386 84f74f 20364->20386 20367 84f460 _Fputc 20366->20367 20429 84f1ec 20367->20429 20370 84bc70 _Fputc 43 API calls 20371 84f482 20370->20371 20371->20356 20373 84ec4d 20372->20373 20374 84ec38 20372->20374 20376 84ec55 20373->20376 20377 84ec6a 20373->20377 20375 85048e __dosmaperr 14 API calls 20374->20375 20379 84ec3d 20375->20379 20380 85048e __dosmaperr 14 API calls 20376->20380 20467 85848a 20377->20467 20383 84e4cb __strnicoll 43 API calls 20379->20383 20381 84ec5a 20380->20381 20384 84e4cb __strnicoll 43 API calls 20381->20384 20382 84ec65 20382->20359 20385 84ec48 20383->20385 20384->20382 20385->20359 20387 84f762 _Fputc 20386->20387 20392 84f52e 20387->20392 20389 84f777 20390 84bc70 _Fputc 43 API calls 20389->20390 20391 84f784 20390->20391 20391->20361 20393 84f53c 20392->20393 20399 84f564 20392->20399 20394 84f549 20393->20394 20395 84f56b 20393->20395 20393->20399 20396 84e44e _Deallocate 43 API calls 20394->20396 20400 84f487 20395->20400 20396->20399 20399->20389 20401 84f493 ___scrt_is_nonwritable_in_current_image 20400->20401 20408 84ac26 EnterCriticalSection 20401->20408 20403 84f4a1 20409 84f4e2 20403->20409 20408->20403 20410 856019 44 API calls 20409->20410 20411 84f4fa 20410->20411 20419 84f5a5 20411->20419 20414 8560c5 68 API calls 20415 84f4ae 20414->20415 20416 84f4d6 20415->20416 20428 84ac3a LeaveCriticalSection 20416->20428 20418 84f4bf 20418->20389 20421 84f5b7 20419->20421 20423 84f518 20419->20423 20420 84f5c5 20422 84e44e _Deallocate 43 API calls 20420->20422 20421->20420 20421->20423 20426 84f5fb ctype _Fputc 20421->20426 20422->20423 20423->20414 20424 84e9b9 ___scrt_uninitialize_crt 68 API calls 20424->20426 20425 855fa2 __fread_nolock 43 API calls 20425->20426 20426->20423 20426->20424 20426->20425 20427 8579fd ___scrt_uninitialize_crt 68 API calls 20426->20427 20427->20426 20428->20418 20430 84f1f8 ___scrt_is_nonwritable_in_current_image 20429->20430 20431 84f1fe 20430->20431 20433 84f232 20430->20433 20432 84e44e _Deallocate 43 API calls 20431->20432 20434 84f219 20432->20434 20440 84ac26 EnterCriticalSection 20433->20440 20434->20370 20436 84f23e 20441 84f361 20436->20441 20438 84f255 20450 84f27e 20438->20450 20440->20436 20442 84f374 20441->20442 20443 84f387 20441->20443 20442->20438 20453 84f288 20443->20453 20445 84f3aa 20446 84e9b9 ___scrt_uninitialize_crt 68 API calls 20445->20446 20449 84f438 20445->20449 20447 84f3d8 20446->20447 20457 8592e6 20447->20457 20449->20438 20466 84ac3a LeaveCriticalSection 20450->20466 20452 84f286 20452->20434 20454 84f299 20453->20454 20456 84f2f1 20453->20456 20454->20456 20460 8592a6 20454->20460 20456->20445 20458 8591c5 __fread_nolock 45 API calls 20457->20458 20459 8592ff 20458->20459 20459->20449 20461 8592ba _Fputc 20460->20461 20462 8591c5 __fread_nolock 45 API calls 20461->20462 20463 8592cf 20462->20463 20464 84bc70 _Fputc 43 API calls 20463->20464 20465 8592de 20464->20465 20465->20456 20466->20452 20468 85849e _Fputc 20467->20468 20473 857e9f 20468->20473 20471 84bc70 _Fputc 43 API calls 20472 8584b8 20471->20472 20472->20382 20474 857eab ___scrt_is_nonwritable_in_current_image 20473->20474 20475 857ed5 20474->20475 20476 857eb2 20474->20476 20484 84ac26 EnterCriticalSection 20475->20484 20477 84e44e _Deallocate 43 API calls 20476->20477 20481 857ecb 20477->20481 20479 857ee3 20485 857f2e 20479->20485 20481->20471 20482 857ef2 20498 857f24 20482->20498 20484->20479 20486 857f65 20485->20486 20487 857f3d 20485->20487 20489 855fa2 __fread_nolock 43 API calls 20486->20489 20488 84e44e _Deallocate 43 API calls 20487->20488 20496 857f58 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20488->20496 20490 857f6e 20489->20490 20501 859288 20490->20501 20493 858018 20504 85828e 20493->20504 20495 85802f 20495->20496 20516 8580cf 20495->20516 20496->20482 20523 84ac3a LeaveCriticalSection 20498->20523 20500 857f2c 20500->20481 20502 85909f 47 API calls 20501->20502 20503 857f8c 20502->20503 20503->20493 20503->20495 20503->20496 20505 85829d ___scrt_uninitialize_crt 20504->20505 20506 855fa2 __fread_nolock 43 API calls 20505->20506 20508 8582b9 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20506->20508 20507 846520 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 20509 858437 20507->20509 20510 859288 47 API calls 20508->20510 20515 8582c5 20508->20515 20509->20496 20511 858319 20510->20511 20512 85834b ReadFile 20511->20512 20511->20515 20513 858372 20512->20513 20512->20515 20514 859288 47 API calls 20513->20514 20514->20515 20515->20507 20517 855fa2 __fread_nolock 43 API calls 20516->20517 20518 8580e2 20517->20518 20519 859288 47 API calls 20518->20519 20522 85812a __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20518->20522 20520 85817d 20519->20520 20521 859288 47 API calls 20520->20521 20520->20522 20521->20522 20522->20496 20523->20500 19228 e2018d 19229 e201c5 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 19228->19229 19231 e203a2 WriteProcessMemory 19229->19231 19232 e203e7 19231->19232 19233 e20429 WriteProcessMemory Wow64SetThreadContext ResumeThread 19232->19233 19234 e203ec WriteProcessMemory 19232->19234 19234->19232 18675 843ef0 18676 8442d4 std::_Throw_Cpp_error 44 API calls 18675->18676 18677 843efa 18676->18677 18682 8410d6 18677->18682 18680 843f07 messages 18683 8410e2 _swprintf 18682->18683 18694 84d646 18683->18694 18686 845c51 GetCurrentThreadId 19125 84403a 18686->19125 18688 845cce 19132 844046 18688->19132 18692 845c6a 18692->18688 19128 84629d 18692->19128 19131 8462bb WakeAllConditionVariable 18692->19131 18695 84d65a _Fputc 18694->18695 18696 84d67c 18695->18696 18698 84d6a3 18695->18698 18697 84e44e _Deallocate 43 API calls 18696->18697 18699 84d697 18697->18699 18703 84ae86 18698->18703 18701 84bc70 _Fputc 43 API calls 18699->18701 18702 8410fb 18701->18702 18702->18686 18704 84ae92 ___scrt_is_nonwritable_in_current_image 18703->18704 18711 84ac26 EnterCriticalSection 18704->18711 18706 84aea0 18712 84bcea 18706->18712 18711->18706 18726 856019 18712->18726 18714 84bd11 _swprintf 18735 84bfe4 18714->18735 18721 846520 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 18722 84aead 18721->18722 18723 84aed5 18722->18723 19124 84ac3a LeaveCriticalSection 18723->19124 18725 84aebe 18725->18699 18757 855fde 18726->18757 18728 85602a 18729 8560a3 18728->18729 18730 85607a 18728->18730 18729->18714 18731 8550b1 __strnicoll 15 API calls 18730->18731 18732 856084 18731->18732 18733 853ec9 ___free_lconv_mon 14 API calls 18732->18733 18734 85608d 18733->18734 18734->18729 18772 84d3c6 18735->18772 18738 84c00d 18739 84e44e _Deallocate 43 API calls 18738->18739 18740 84bd58 18739->18740 18750 84bcac 18740->18750 18745 84c038 _swprintf 18745->18740 18746 84c215 18745->18746 18778 84d350 18745->18778 18785 84bf6c 18745->18785 18788 84c570 18745->18788 18822 84c82c 18745->18822 18747 84e44e _Deallocate 43 API calls 18746->18747 18748 84c231 18747->18748 18749 84e44e _Deallocate 43 API calls 18748->18749 18749->18740 18751 853ec9 ___free_lconv_mon 14 API calls 18750->18751 18752 84bcbc 18751->18752 18753 8560c5 18752->18753 18754 84bd72 18753->18754 18755 8560d0 18753->18755 18754->18721 18755->18754 18756 84e9b9 ___scrt_uninitialize_crt 68 API calls 18755->18756 18756->18754 18758 855fea 18757->18758 18759 855fa2 __fread_nolock 43 API calls 18758->18759 18762 85600b 18758->18762 18760 856005 18759->18760 18763 85feaf 18760->18763 18762->18728 18764 85febc 18763->18764 18765 85fec9 18763->18765 18766 85048e __dosmaperr 14 API calls 18764->18766 18767 85fed5 18765->18767 18768 85048e __dosmaperr 14 API calls 18765->18768 18769 85fec1 18766->18769 18767->18762 18770 85fef6 18768->18770 18769->18762 18771 84e4cb __strnicoll 43 API calls 18770->18771 18771->18769 18773 84d3d1 18772->18773 18774 84d3f3 18772->18774 18775 84e44e _Deallocate 43 API calls 18773->18775 18851 84d42f 18774->18851 18777 84bfff 18775->18777 18777->18738 18777->18740 18777->18745 18859 84bf10 18778->18859 18898 84b1ef 18785->18898 18787 84bfa7 18787->18745 18789 84c577 18788->18789 18790 84c58e 18788->18790 18792 84c850 18789->18792 18793 84c8c1 18789->18793 18803 84c5cd 18789->18803 18791 84e44e _Deallocate 43 API calls 18790->18791 18790->18803 18796 84c5c2 18791->18796 18797 84c856 18792->18797 18798 84c8ee 18792->18798 18794 84c914 18793->18794 18795 84c8c6 18793->18795 18794->18798 18806 84c893 18794->18806 18820 84c878 _swprintf 18794->18820 18799 84c908 18795->18799 18800 84c8c8 18795->18800 18796->18745 18797->18806 18808 84c85c 18797->18808 18940 84b599 18798->18940 18957 84d270 18799->18957 18801 84c86a 18800->18801 18802 84c8cd 18800->18802 18801->18820 18821 84c88c 18801->18821 18947 84cfb0 18801->18947 18802->18798 18807 84c8d2 18802->18807 18803->18745 18806->18821 18921 84b716 18806->18921 18811 84c8e5 18807->18811 18812 84c8d7 18807->18812 18808->18801 18810 84c8a8 18808->18810 18808->18820 18810->18821 18928 84d13a 18810->18928 18936 84d1cf 18811->18936 18812->18821 18932 84d253 18812->18932 18815 846520 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 18817 84cb72 18815->18817 18817->18745 18820->18821 18960 855d05 18820->18960 18821->18815 18823 84c850 18822->18823 18824 84c8c1 18822->18824 18827 84c856 18823->18827 18828 84c8ee 18823->18828 18825 84c914 18824->18825 18826 84c8c6 18824->18826 18825->18828 18835 84c893 18825->18835 18849 84c878 _swprintf 18825->18849 18829 84c908 18826->18829 18830 84c8c8 18826->18830 18827->18835 18836 84c85c 18827->18836 18831 84b599 _swprintf 44 API calls 18828->18831 18834 84d270 _swprintf 44 API calls 18829->18834 18832 84c86a 18830->18832 18833 84c8cd 18830->18833 18831->18849 18837 84cfb0 _swprintf 46 API calls 18832->18837 18839 84c88c 18832->18839 18832->18849 18833->18828 18838 84c8d2 18833->18838 18834->18849 18835->18839 18841 84b716 _swprintf 44 API calls 18835->18841 18836->18832 18840 84c8a8 18836->18840 18836->18849 18837->18849 18842 84c8e5 18838->18842 18843 84c8d7 18838->18843 18846 846520 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 18839->18846 18840->18839 18845 84d13a _swprintf 45 API calls 18840->18845 18841->18849 18844 84d1cf _swprintf 43 API calls 18842->18844 18843->18839 18848 84d253 _swprintf 44 API calls 18843->18848 18844->18849 18845->18849 18847 84cb72 18846->18847 18847->18745 18848->18849 18849->18839 18850 855d05 _swprintf 45 API calls 18849->18850 18850->18849 18852 84d443 18851->18852 18858 84d4ad 18851->18858 18853 855fa2 __fread_nolock 43 API calls 18852->18853 18854 84d44a 18853->18854 18855 85048e __dosmaperr 14 API calls 18854->18855 18854->18858 18856 84d4a2 18855->18856 18857 84e4cb __strnicoll 43 API calls 18856->18857 18857->18858 18858->18777 18860 84bf1e GetLastError 18859->18860 18861 84bf5f 18859->18861 18862 84bf2d 18860->18862 18868 85512c 18861->18868 18876 854f53 18862->18876 18865 84bf66 18866 84e5e3 __FrameHandler3::FrameUnwindToState 41 API calls 18865->18866 18867 84bf6b 18866->18867 18869 855143 18868->18869 18870 84d37d 18868->18870 18869->18870 18871 85cb4d __Getctype 43 API calls 18869->18871 18872 85518a 18870->18872 18871->18870 18873 8551a1 18872->18873 18874 84d38a 18872->18874 18873->18874 18875 85b230 __strnicoll 43 API calls 18873->18875 18874->18745 18875->18874 18877 854f66 18876->18877 18878 854f6c 18876->18878 18879 8543f5 __dosmaperr 6 API calls 18877->18879 18880 854434 __dosmaperr 6 API calls 18878->18880 18882 84bf4a SetLastError 18878->18882 18879->18878 18881 854f86 18880->18881 18881->18882 18883 8538e2 __dosmaperr 14 API calls 18881->18883 18882->18861 18882->18865 18884 854f96 18883->18884 18885 854fb3 18884->18885 18886 854f9e 18884->18886 18888 854434 __dosmaperr 6 API calls 18885->18888 18887 854434 __dosmaperr 6 API calls 18886->18887 18895 854faa 18887->18895 18889 854fbf 18888->18889 18890 854fc3 18889->18890 18891 854fd2 18889->18891 18893 854434 __dosmaperr 6 API calls 18890->18893 18894 854b7f __dosmaperr 14 API calls 18891->18894 18892 853ec9 ___free_lconv_mon 14 API calls 18892->18882 18893->18895 18896 854fdd 18894->18896 18895->18892 18897 853ec9 ___free_lconv_mon 14 API calls 18896->18897 18897->18882 18908 84d3ab 18898->18908 18900 84b216 18902 84e44e _Deallocate 43 API calls 18900->18902 18901 84b201 18901->18900 18904 84b249 18901->18904 18907 84b231 _swprintf 18901->18907 18902->18907 18903 84b2e0 18905 84d2f7 _swprintf 43 API calls 18903->18905 18904->18903 18915 84d2f7 18904->18915 18905->18907 18907->18787 18909 84d3b0 18908->18909 18910 84d3c3 18908->18910 18911 85048e __dosmaperr 14 API calls 18909->18911 18910->18901 18912 84d3b5 18911->18912 18913 84e4cb __strnicoll 43 API calls 18912->18913 18914 84d3c0 18913->18914 18914->18901 18916 84d31c 18915->18916 18917 84d308 18915->18917 18916->18903 18917->18916 18918 85048e __dosmaperr 14 API calls 18917->18918 18919 84d311 18918->18919 18920 84e4cb __strnicoll 43 API calls 18919->18920 18920->18916 18922 84b72a _swprintf 18921->18922 18923 84b74c 18922->18923 18926 84b773 18922->18926 18924 84e44e _Deallocate 43 API calls 18923->18924 18925 84b769 _swprintf 18924->18925 18925->18820 18926->18925 18970 84b10c 18926->18970 18929 84d155 _swprintf 18928->18929 18930 84d18c 18929->18930 18931 855d05 _swprintf 45 API calls 18929->18931 18930->18820 18931->18930 18933 84d25f 18932->18933 18984 84b41c 18933->18984 18935 84d26f 18935->18820 18939 84d1e4 _swprintf 18936->18939 18937 84e44e _Deallocate 43 API calls 18938 84d205 18937->18938 18938->18820 18939->18937 18939->18938 18941 84b5ad _swprintf 18940->18941 18942 84b5cf 18941->18942 18943 84b5f6 18941->18943 18944 84e44e _Deallocate 43 API calls 18942->18944 18945 84b10c _swprintf 15 API calls 18943->18945 18946 84b5ec _swprintf 18943->18946 18944->18946 18945->18946 18946->18820 18948 84cfca 18947->18948 18949 84b10c _swprintf 15 API calls 18948->18949 18950 84d00b _swprintf 18949->18950 18991 855b84 18950->18991 18953 84d350 _swprintf 43 API calls 18954 84d0b9 _swprintf 18953->18954 18955 84d350 _swprintf 43 API calls 18954->18955 18956 84d0ec _swprintf 18954->18956 18955->18956 18956->18820 18956->18956 18958 84b716 _swprintf 44 API calls 18957->18958 18959 84d285 18958->18959 18959->18820 18961 855d1a 18960->18961 18963 84d350 _swprintf 43 API calls 18961->18963 18964 855d5b 18961->18964 18968 855d1e _swprintf __fread_nolock 18961->18968 18969 855d47 __fread_nolock 18961->18969 18962 84e44e _Deallocate 43 API calls 18962->18968 18963->18964 18965 85a138 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 18964->18965 18964->18968 18964->18969 18966 855e16 18965->18966 18967 855e2c GetLastError 18966->18967 18966->18968 18967->18968 18967->18969 18968->18820 18969->18962 18969->18968 18971 84b133 18970->18971 18972 84b121 18970->18972 18971->18972 18973 8550b1 __strnicoll 15 API calls 18971->18973 18972->18925 18974 84b157 18973->18974 18975 84b15f 18974->18975 18976 84b16a 18974->18976 18977 853ec9 ___free_lconv_mon 14 API calls 18975->18977 18981 84bcc6 18976->18981 18977->18972 18980 853ec9 ___free_lconv_mon 14 API calls 18980->18972 18982 853ec9 ___free_lconv_mon 14 API calls 18981->18982 18983 84b175 18982->18983 18983->18980 18985 84b430 _swprintf 18984->18985 18986 84b452 18985->18986 18988 84b479 18985->18988 18987 84e44e _Deallocate 43 API calls 18986->18987 18989 84b46f _swprintf 18987->18989 18988->18989 18990 84b10c _swprintf 15 API calls 18988->18990 18989->18935 18990->18989 18992 855bb9 18991->18992 18993 855b95 18991->18993 18992->18993 18996 855bec _swprintf 18992->18996 18994 84e44e _Deallocate 43 API calls 18993->18994 18995 84d095 18994->18995 18995->18953 18995->18954 18997 855c54 18996->18997 18998 855c25 18996->18998 18999 855c7d 18997->18999 19000 855c82 18997->19000 19010 855a28 18998->19010 19002 855ce4 18999->19002 19003 855caa 18999->19003 19018 8552c0 19000->19018 19045 8555ec 19002->19045 19005 855caf 19003->19005 19006 855cca 19003->19006 19028 855959 19005->19028 19038 8557d5 19006->19038 19011 855a3e 19010->19011 19012 855a49 19010->19012 19011->18995 19013 8537c9 ___std_exception_copy 43 API calls 19012->19013 19014 855aa4 19013->19014 19015 855aae 19014->19015 19016 84e4f8 __Getctype 11 API calls 19014->19016 19015->18995 19017 855abc 19016->19017 19019 8552d3 19018->19019 19020 855304 19019->19020 19021 8552e2 19019->19021 19023 85531e 19020->19023 19025 855373 19020->19025 19022 84e44e _Deallocate 43 API calls 19021->19022 19027 8552fa _swprintf __alldvrm __fread_nolock _strrchr 19022->19027 19024 8555ec _swprintf 45 API calls 19023->19024 19024->19027 19026 84d350 _swprintf 43 API calls 19025->19026 19025->19027 19026->19027 19027->18995 19052 85e74f 19028->19052 19039 85e74f _swprintf 45 API calls 19038->19039 19040 855804 19039->19040 19041 85e655 _swprintf 43 API calls 19040->19041 19042 855845 19041->19042 19043 85584c 19042->19043 19044 85586b _swprintf 43 API calls 19042->19044 19043->18995 19044->19043 19046 85e74f _swprintf 45 API calls 19045->19046 19047 855616 19046->19047 19048 85e655 _swprintf 43 API calls 19047->19048 19049 855664 19048->19049 19050 855690 _swprintf 43 API calls 19049->19050 19051 85566b 19049->19051 19050->19051 19051->18995 19053 85e783 _swprintf 19052->19053 19054 85376a _swprintf 43 API calls 19053->19054 19056 85e7ec _swprintf 19054->19056 19055 85e818 19057 8537c9 ___std_exception_copy 43 API calls 19055->19057 19056->19055 19058 85e8a8 19056->19058 19060 85e885 19056->19060 19061 85e845 19056->19061 19059 85e875 19057->19059 19065 860d20 _swprintf 21 API calls 19058->19065 19062 85fc7b 19059->19062 19070 85e880 _swprintf 19059->19070 19063 8537c9 ___std_exception_copy 43 API calls 19060->19063 19061->19055 19061->19058 19064 84e4f8 __Getctype 11 API calls 19062->19064 19063->19059 19067 85fc87 19064->19067 19066 85e92e 19065->19066 19068 860e30 __floor_pentium4 21 API calls 19066->19068 19072 85e938 19068->19072 19069 846520 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 19071 855989 19069->19071 19070->19069 19102 85e655 19071->19102 19073 85eb97 _swprintf 19072->19073 19077 85e9d7 _swprintf 19072->19077 19082 85ec34 19072->19082 19076 84f0b6 __fread_nolock 43 API calls 19073->19076 19073->19082 19074 85ee4c 19075 84f0b6 __fread_nolock 43 API calls 19074->19075 19084 85edc0 __fread_nolock 19074->19084 19075->19084 19076->19082 19081 84f0b6 __fread_nolock 43 API calls 19077->19081 19086 85ea74 19077->19086 19078 85ed79 19079 84f0b6 __fread_nolock 43 API calls 19078->19079 19078->19084 19079->19084 19080 84f0b6 __fread_nolock 43 API calls 19083 85eb8f 19080->19083 19081->19086 19082->19074 19082->19078 19084->19080 19085 84f0b6 __fread_nolock 43 API calls 19085->19083 19086->19085 19103 85e666 19102->19103 19105 85e688 19102->19105 19104 84e44e _Deallocate 43 API calls 19103->19104 19107 85e67e _swprintf ctype 19104->19107 19106 84e44e _Deallocate 43 API calls 19105->19106 19105->19107 19106->19107 19124->18725 19135 845ea7 EnterCriticalSection 19125->19135 19127 844044 19127->18692 19129 8462b7 19128->19129 19130 8462a9 ReleaseSRWLockExclusive 19128->19130 19129->18692 19130->19129 19131->18692 19136 845eb5 LeaveCriticalSection 19132->19136 19134 844050 19134->18680 19135->19127 19136->19134 22696 845102 22697 84510e __EH_prolog3_GS 22696->22697 22700 845174 22697->22700 22701 84515b 22697->22701 22704 845125 22697->22704 22698 846805 std::_Throw_Cpp_error 5 API calls 22699 84528f 22698->22699 22715 84eb21 22700->22715 22712 844334 22701->22712 22704->22698 22706 84261a std::_Throw_Cpp_error 43 API calls 22706->22704 22707 845233 22707->22706 22708 84fa80 45 API calls 22710 84524c 22708->22710 22709 845193 22709->22707 22709->22710 22711 84eb21 45 API calls 22709->22711 22735 844e95 22709->22735 22710->22707 22710->22708 22711->22709 22713 84eb21 45 API calls 22712->22713 22714 84433f 22713->22714 22714->22704 22716 84eb2d ___scrt_is_nonwritable_in_current_image 22715->22716 22717 84eb37 22716->22717 22718 84eb4f 22716->22718 22719 85048e __dosmaperr 14 API calls 22717->22719 22739 84ac26 EnterCriticalSection 22718->22739 22721 84eb3c 22719->22721 22723 84e4cb __strnicoll 43 API calls 22721->22723 22722 84eb59 22724 84ebf5 22722->22724 22725 855fa2 __fread_nolock 43 API calls 22722->22725 22734 84eb47 _Fputc 22723->22734 22740 84eae5 22724->22740 22729 84eb76 22725->22729 22727 84ebfb 22747 84ec25 22727->22747 22729->22724 22730 84ebcd 22729->22730 22731 85048e __dosmaperr 14 API calls 22730->22731 22732 84ebd2 22731->22732 22733 84e4cb __strnicoll 43 API calls 22732->22733 22733->22734 22734->22709 22736 844ea5 22735->22736 22737 844ec9 22735->22737 22736->22709 22751 84436e 22737->22751 22739->22722 22741 84eaf1 22740->22741 22743 84eb06 __fread_nolock 22740->22743 22742 85048e __dosmaperr 14 API calls 22741->22742 22744 84eaf6 22742->22744 22743->22727 22745 84e4cb __strnicoll 43 API calls 22744->22745 22746 84eb01 22745->22746 22746->22727 22750 84ac3a LeaveCriticalSection 22747->22750 22749 84ec2b 22749->22734 22750->22749 22752 844422 22751->22752 22753 844392 std::_Throw_Cpp_error 22751->22753 22754 841278 std::_Throw_Cpp_error 44 API calls 22752->22754 22756 843e92 std::_Throw_Cpp_error 44 API calls 22753->22756 22755 844427 22754->22755 22757 8443af ctype 22756->22757 22758 843798 _Deallocate 43 API calls 22757->22758 22759 8443f0 ctype 22757->22759 22758->22759 22759->22736 22760 844d03 22764 844d26 22760->22764 22768 844d1f 22760->22768 22761 846520 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 22762 844e09 22761->22762 22765 844dcc 22764->22765 22766 844d6f 22764->22766 22764->22768 22767 84f74f 71 API calls 22765->22767 22765->22768 22766->22768 22769 844354 22766->22769 22767->22768 22768->22761 22772 84ede2 22769->22772 22773 84edf5 _Fputc 22772->22773 22778 84ec88 22773->22778 22775 84ee04 22776 84bc70 _Fputc 43 API calls 22775->22776 22777 844364 22776->22777 22777->22768 22779 84ec94 ___scrt_is_nonwritable_in_current_image 22778->22779 22780 84ecc1 22779->22780 22781 84ec9d 22779->22781 22792 84ac26 EnterCriticalSection 22780->22792 22782 84e44e _Deallocate 43 API calls 22781->22782 22791 84ecb6 _Fputc 22782->22791 22784 84ecca 22785 84ed75 _Fputc 22784->22785 22786 855fa2 __fread_nolock 43 API calls 22784->22786 22793 84edad 22785->22793 22789 84ece3 22786->22789 22788 84ed44 22790 84e44e _Deallocate 43 API calls 22788->22790 22789->22785 22789->22788 22790->22791 22791->22775 22792->22784 22796 84ac3a LeaveCriticalSection 22793->22796 22795 84edb3 22795->22791 22796->22795 22820 845317 22821 845329 ctype 22820->22821 22822 84532f 22821->22822 22823 8453d9 22821->22823 22826 84effc 22821->22826 22823->22822 22825 84effc __fread_nolock 57 API calls 22823->22825 22825->22822 22829 84f019 22826->22829 22830 84f025 ___scrt_is_nonwritable_in_current_image 22829->22830 22831 84f06f 22830->22831 22837 84f038 __fread_nolock 22830->22837 22841 84f014 22830->22841 22842 84ac26 EnterCriticalSection 22831->22842 22833 85048e __dosmaperr 14 API calls 22835 84f052 22833->22835 22834 84f079 22843 84ee16 22834->22843 22838 84e4cb __strnicoll 43 API calls 22835->22838 22837->22833 22838->22841 22841->22821 22842->22834 22847 84ee27 __fread_nolock 22843->22847 22855 84ee43 22843->22855 22844 84ee33 22845 85048e __dosmaperr 14 API calls 22844->22845 22846 84ee38 22845->22846 22848 84e4cb __strnicoll 43 API calls 22846->22848 22847->22844 22850 84ee85 __fread_nolock 22847->22850 22847->22855 22848->22855 22849 84efac __fread_nolock 22853 85048e __dosmaperr 14 API calls 22849->22853 22850->22849 22851 84f0b6 __fread_nolock 43 API calls 22850->22851 22852 855fa2 __fread_nolock 43 API calls 22850->22852 22854 858d00 __fread_nolock 55 API calls 22850->22854 22850->22855 22851->22850 22852->22850 22853->22846 22854->22850 22856 84f0ae 22855->22856 22859 84ac3a LeaveCriticalSection 22856->22859 22858 84f0b4 22858->22841 22859->22858 20964 844e13 20965 844e26 20964->20965 20967 844e3a 20965->20967 20968 84fa80 20965->20968 20969 84fa8c ___scrt_is_nonwritable_in_current_image 20968->20969 20970 84fa93 20969->20970 20971 84faa8 20969->20971 20972 85048e __dosmaperr 14 API calls 20970->20972 20981 84ac26 EnterCriticalSection 20971->20981 20974 84fa98 20972->20974 20977 84e4cb __strnicoll 43 API calls 20974->20977 20975 84fab2 20982 84f987 20975->20982 20979 84faa3 20977->20979 20979->20967 20981->20975 20983 84f99f 20982->20983 20985 84fa0f 20982->20985 20984 855fa2 __fread_nolock 43 API calls 20983->20984 20989 84f9a5 20984->20989 20986 859304 14 API calls 20985->20986 20987 84fa07 20985->20987 20986->20987 20993 84faeb 20987->20993 20988 84f9f7 20990 85048e __dosmaperr 14 API calls 20988->20990 20989->20985 20989->20988 20991 84f9fc 20990->20991 20992 84e4cb __strnicoll 43 API calls 20991->20992 20992->20987 20996 84ac3a LeaveCriticalSection 20993->20996 20995 84faf1 20995->20979 20996->20995 21011 854c18 21012 854c33 21011->21012 21013 854c23 21011->21013 21017 854c39 21013->21017 21016 853ec9 ___free_lconv_mon 14 API calls 21016->21012 21018 854c4e 21017->21018 21019 854c54 21017->21019 21020 853ec9 ___free_lconv_mon 14 API calls 21018->21020 21021 853ec9 ___free_lconv_mon 14 API calls 21019->21021 21020->21019 21022 854c60 21021->21022 21023 853ec9 ___free_lconv_mon 14 API calls 21022->21023 21024 854c6b 21023->21024 21025 853ec9 ___free_lconv_mon 14 API calls 21024->21025 21026 854c76 21025->21026 21027 853ec9 ___free_lconv_mon 14 API calls 21026->21027 21028 854c81 21027->21028 21029 853ec9 ___free_lconv_mon 14 API calls 21028->21029 21030 854c8c 21029->21030 21031 853ec9 ___free_lconv_mon 14 API calls 21030->21031 21032 854c97 21031->21032 21033 853ec9 ___free_lconv_mon 14 API calls 21032->21033 21034 854ca2 21033->21034 21035 853ec9 ___free_lconv_mon 14 API calls 21034->21035 21036 854cad 21035->21036 21037 853ec9 ___free_lconv_mon 14 API calls 21036->21037 21038 854cbb 21037->21038 21043 854a65 21038->21043 21044 854a71 ___scrt_is_nonwritable_in_current_image 21043->21044 21059 84e56d EnterCriticalSection 21044->21059 21047 854a7b 21049 853ec9 ___free_lconv_mon 14 API calls 21047->21049 21050 854aa5 21047->21050 21049->21050 21060 854ac4 21050->21060 21051 854ad0 21052 854adc ___scrt_is_nonwritable_in_current_image 21051->21052 21064 84e56d EnterCriticalSection 21052->21064 21054 854ae6 21055 854d06 __dosmaperr 14 API calls 21054->21055 21056 854af9 21055->21056 21065 854b19 21056->21065 21059->21047 21063 84e5b5 LeaveCriticalSection 21060->21063 21062 854ab2 21062->21051 21063->21062 21064->21054 21068 84e5b5 LeaveCriticalSection 21065->21068 21067 854b07 21067->21016 21068->21067 23000 844b56 23001 844b5d 23000->23001 23002 844ba9 23000->23002 23005 84ac26 EnterCriticalSection 23001->23005 23004 844b62 23005->23004 21343 84506b 21344 845077 21343->21344 21345 8450ae 21344->21345 21349 84f94d 21344->21349 21348 844a04 43 API calls 21348->21345 21350 84f960 _Fputc 21349->21350 21355 84f884 21350->21355 21352 84f975 21353 84bc70 _Fputc 43 API calls 21352->21353 21354 84509b 21353->21354 21354->21345 21354->21348 21356 84f896 21355->21356 21357 84f8b9 21355->21357 21358 84e44e _Deallocate 43 API calls 21356->21358 21357->21356 21360 84f8e0 21357->21360 21359 84f8b1 21358->21359 21359->21352 21363 84f789 21360->21363 21364 84f795 ___scrt_is_nonwritable_in_current_image 21363->21364 21371 84ac26 EnterCriticalSection 21364->21371 21366 84f7a3 21372 84f7e4 21366->21372 21368 84f7b0 21381 84f7d8 21368->21381 21371->21366 21373 84e9b9 ___scrt_uninitialize_crt 68 API calls 21372->21373 21374 84f7ff 21373->21374 21384 8547e1 21374->21384 21377 84f824 21377->21368 21378 8538e2 __dosmaperr 14 API calls 21379 84f848 21378->21379 21380 853ec9 ___free_lconv_mon 14 API calls 21379->21380 21380->21377 21388 84ac3a LeaveCriticalSection 21381->21388 21383 84f7c1 21383->21352 21385 84f809 21384->21385 21386 8547f8 21384->21386 21385->21377 21385->21378 21386->21385 21387 853ec9 ___free_lconv_mon 14 API calls 21386->21387 21387->21385 21388->21383

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00E202FC
                                                    • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00E2030F
                                                    • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00E2032D
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00E20351
                                                    • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 00E2037C
                                                    • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?), ref: 00E203D4
                                                    • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000,?,00000028), ref: 00E2041F
                                                    • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00E2045D
                                                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 00E20499
                                                    • ResumeThread.KERNELBASE(?), ref: 00E204A8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1293150889.0000000000E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_e20000_file.jbxd
                                                    Similarity
                                                    • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                    • String ID: GetP$Load$aryA$ress
                                                    • API String ID: 2687962208-977067982
                                                    • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                                    • Instruction ID: c328f4c28e41ef8e39e517d03f178177459d8191a2896582562c032126e4d23c
                                                    • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                                    • Instruction Fuzzy Hash: 2EB1F67260024AAFDB60CF68CC80BDA77A5FF88714F158524EA0CEB342D774FA518B94
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8ec6fce6b7bd29b454c69d8250e9f5f10a3b32f08736243a7260ed219140a07f
                                                    • Instruction ID: e1c2c72b3dd214c2de1866e6441de46d83c6e440cd799e7312316c595ce0eef1
                                                    • Opcode Fuzzy Hash: 8ec6fce6b7bd29b454c69d8250e9f5f10a3b32f08736243a7260ed219140a07f
                                                    • Instruction Fuzzy Hash: 80F06531665B24DFCB26D78CD405A5973ACFB45B52F114056F901E7291C770DD44CBD1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 23 8540d9-8540e5 24 854177-85417a 23->24 25 854180 24->25 26 8540ea-8540fb 24->26 27 854182-854186 25->27 28 8540fd-854100 26->28 29 854108-854121 LoadLibraryExW 26->29 30 854106 28->30 31 8541a0-8541a2 28->31 32 854187-854197 29->32 33 854123-85412c GetLastError 29->33 35 854174 30->35 31->27 32->31 34 854199-85419a FreeLibrary 32->34 36 854165-854172 33->36 37 85412e-854140 call 8538a8 33->37 34->31 35->24 36->35 37->36 40 854142-854154 call 8538a8 37->40 40->36 43 854156-854163 LoadLibraryExW 40->43 43->32 43->36
                                                    APIs
                                                    • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,CE39C80F,?,008541E6,?,?,?,00000000), ref: 0085419A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary
                                                    • String ID: api-ms-$ext-ms-
                                                    • API String ID: 3664257935-537541572
                                                    • Opcode ID: c8ac6923dd1fee947cd9d9548ca9036315a0a3ad0ab6baf1dcbab7eb0c5dc2fe
                                                    • Instruction ID: 1f7f98448f1f6da92db4320d83e43d00bc18fd356f80691535d54f5866965b4d
                                                    • Opcode Fuzzy Hash: c8ac6923dd1fee947cd9d9548ca9036315a0a3ad0ab6baf1dcbab7eb0c5dc2fe
                                                    • Instruction Fuzzy Hash: 12213D71A81A11BBDB229B24EC44A5A3768FF513BAF251110FD15E72D0DB70EEC8CAD1

                                                    Control-flow Graph

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ConsoleCpp_errorCurrentFreeThreadThrow_std::_
                                                    • String ID:
                                                    • API String ID: 1679527187-0
                                                    • Opcode ID: 10169c2a3d4a997d9c33debdc522537eaa55b4bd342c93136637336d1cd97fc3
                                                    • Instruction ID: 03cba825695c7cdffcacca3b979972df62acdab97e69e6b77fc4a69829a58d49
                                                    • Opcode Fuzzy Hash: 10169c2a3d4a997d9c33debdc522537eaa55b4bd342c93136637336d1cd97fc3
                                                    • Instruction Fuzzy Hash: 6D3181B1E0120DAFDB149FA88D87BAEBB78FF04314F115139E501E6681DA715A44CA62

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 78 843b81-843b8a 79 843b8e-843ba0 call 841985 78->79 82 843ba2 79->82 83 843c09-843c10 79->83 84 843ba4-843ba8 82->84 85 843baa-843bb8 82->85 84->83 84->85 86 843bfd-843c07 Sleep 85->86 87 843bba 85->87 86->79 88 843bc4-843be6 call 862960 call 846ac0 87->88 89 843bbc-843bc2 87->89 94 843bf1-843bfb Sleep 88->94 95 843be8 88->95 89->86 89->88 94->79 96 843bee 95->96 97 843bea-843bec 95->97 96->94 97->94 97->96
                                                    APIs
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00843BCD
                                                    • Sleep.KERNEL32(00000000,00000000,?,000F4240,00000000,?,?,000F4240,00000000,05265C00,00000000,00000000,?,00000000), ref: 00843BF2
                                                    • Sleep.KERNEL32(05265C00,00000000,00000000,?,00000000), ref: 00843C02
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: Sleep$Unothrow_t@std@@@__ehfuncinfo$??2@
                                                    • String ID:
                                                    • API String ID: 240202187-0
                                                    • Opcode ID: 3a25587fb190b88d63c181b04fc118112d0198d79b84116f7d42701c8895d46e
                                                    • Instruction ID: 74dd0fc540e8561afad8c49baa6fd57278dfa0a981c5ddb687d6af61e3351f8b
                                                    • Opcode Fuzzy Hash: 3a25587fb190b88d63c181b04fc118112d0198d79b84116f7d42701c8895d46e
                                                    • Instruction Fuzzy Hash: DC01B53264470C5AD610FE0D8CC3B2E7655FB91330F95082EF540E61A7E5626F4846A7

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 98 84adaa-84adb5 99 84adb7-84adca call 85048e call 84e4cb 98->99 100 84adcb-84adde call 84ad5a 98->100 105 84ade0-84adfd CreateThread 100->105 106 84ae0c 100->106 108 84adff-84ae0b GetLastError call 850434 105->108 109 84ae1b-84ae20 105->109 110 84ae0e-84ae1a call 84accc 106->110 108->106 114 84ae27-84ae2b 109->114 115 84ae22-84ae25 109->115 114->110 115->114
                                                    APIs
                                                    • CreateThread.KERNELBASE(?,?,Function_0000AC4E,00000000,?,?), ref: 0084ADF3
                                                    • GetLastError.KERNEL32 ref: 0084ADFF
                                                    • __dosmaperr.LIBCMT ref: 0084AE06
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: CreateErrorLastThread__dosmaperr
                                                    • String ID:
                                                    • API String ID: 2744730728-0
                                                    • Opcode ID: 3527433ea6c6cc8ab6ad38ec52d356c8ee0a1d78af5891e43f55fa432c4cd898
                                                    • Instruction ID: cd909e2c0bc1538b077feb4effc125e318cfe7e361a400077f55b85b5327d14c
                                                    • Opcode Fuzzy Hash: 3527433ea6c6cc8ab6ad38ec52d356c8ee0a1d78af5891e43f55fa432c4cd898
                                                    • Instruction Fuzzy Hash: A7019A7294121DAFCF19AFA4DC06AEE3BA4FF00365F014028F811DA190EB70CA50DBE2

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 118 84ad03-84ad10 call 854ea2 121 84ad50-84ad53 ExitThread 118->121 122 84ad12-84ad1a 118->122 122->121 123 84ad1c-84ad20 122->123 124 84ad27-84ad2d 123->124 125 84ad22 call 85467c 123->125 127 84ad2f-84ad31 124->127 128 84ad3a-84ad40 124->128 125->124 127->128 129 84ad33-84ad34 CloseHandle 127->129 128->121 130 84ad42-84ad44 128->130 129->128 130->121 131 84ad46-84ad4a FreeLibraryAndExitThread 130->131 131->121
                                                    APIs
                                                      • Part of subcall function 00854EA2: GetLastError.KERNEL32(00000000,?,00850493,00853934,?,?,00854D9E,00000001,00000364,?,00000003,000000FF,?,0084AC73,0086E368,0000000C), ref: 00854EA6
                                                      • Part of subcall function 00854EA2: SetLastError.KERNEL32(00000000), ref: 00854F48
                                                    • CloseHandle.KERNEL32(?,?,?,0084AE3A,?,?,0084ACAC,00000000), ref: 0084AD34
                                                    • FreeLibraryAndExitThread.KERNELBASE(?,?,?,?,0084AE3A,?,?,0084ACAC,00000000), ref: 0084AD4A
                                                    • ExitThread.KERNEL32 ref: 0084AD53
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
                                                    • String ID:
                                                    • API String ID: 1991824761-0
                                                    • Opcode ID: 4ba0cc406cc8a27edb8d68a2b0e195d89e1dbf089c0522812cdd0beb1bc6af1b
                                                    • Instruction ID: 323f730aa846fae8cab70be98c673863fc5f26e03c42b4c3645fb23516311ed0
                                                    • Opcode Fuzzy Hash: 4ba0cc406cc8a27edb8d68a2b0e195d89e1dbf089c0522812cdd0beb1bc6af1b
                                                    • Instruction Fuzzy Hash: 3AF0BE30900A086BEB381F798C08B1A7A98FF01322F084A00F825CB9B0CB31DC848693

                                                    Control-flow Graph

                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000002,?,008518F2,0084E626,0084E626,?,00000002,CE39C80F,0084E626,00000002), ref: 00851909
                                                    • TerminateProcess.KERNEL32(00000000,?,008518F2,0084E626,0084E626,?,00000002,CE39C80F,0084E626,00000002), ref: 00851910
                                                    • ExitProcess.KERNEL32 ref: 00851922
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: Process$CurrentExitTerminate
                                                    • String ID:
                                                    • API String ID: 1703294689-0
                                                    • Opcode ID: 7ede0f665c43d09c77d3f6f63e7f3bd682b8adaa372e5b98b80bac5ded6ee6e0
                                                    • Instruction ID: e895ea8ce01958c4cab9e155d9deb07017b5b8963adbb7ed58cbba698b23e6ae
                                                    • Opcode Fuzzy Hash: 7ede0f665c43d09c77d3f6f63e7f3bd682b8adaa372e5b98b80bac5ded6ee6e0
                                                    • Instruction Fuzzy Hash: 07D06C32400948AFCF112F64DC2DA5D7F2AFA40382B959114F9099A136CBB1D9969AA2

                                                    Control-flow Graph

                                                    APIs
                                                    • GetLastError.KERNEL32(0086E368,0000000C), ref: 0084AC61
                                                    • ExitThread.KERNEL32 ref: 0084AC68
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorExitLastThread
                                                    • String ID:
                                                    • API String ID: 1611280651-0
                                                    • Opcode ID: 751fbbf9080e9028eea1cee10ee9b14d95436876792fe39e85fc28237ecb92bd
                                                    • Instruction ID: 153fb9661576e81f715b9f1e09f1de8c8fd425cc2491ea8c98e3de4d799df737
                                                    • Opcode Fuzzy Hash: 751fbbf9080e9028eea1cee10ee9b14d95436876792fe39e85fc28237ecb92bd
                                                    • Instruction Fuzzy Hash: 73F0C271940A08EFDB05AF74C99AA6E3B75FF01712F210049F811DB2A2CB749940CFA3

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 158 8541a4-8541cc 159 8541d2-8541d4 158->159 160 8541ce-8541d0 158->160 162 8541d6-8541d8 159->162 163 8541da-8541e1 call 8540d9 159->163 161 854223-854226 160->161 162->161 165 8541e6-8541ea 163->165 166 8541ec-8541fa GetProcAddress 165->166 167 854209-854220 165->167 166->167 169 8541fc-854207 call 851079 166->169 168 854222 167->168 168->161 169->168
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0987bb34f47e410090caf84004cc9c5d52d348cd8e94fda42a3e848c9a62f305
                                                    • Instruction ID: 807a107e38d26bafa91ec84111f90e3998214668c7f02331ae855fb14e703acb
                                                    • Opcode Fuzzy Hash: 0987bb34f47e410090caf84004cc9c5d52d348cd8e94fda42a3e848c9a62f305
                                                    • Instruction Fuzzy Hash: 8C014533700925AF9F258E29FC00A5A33D6FB8133AB249020FE19CB088DA31C8C98790

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 172 8538e2-8538ed 173 8538ef-8538f9 172->173 174 8538fb-853901 172->174 173->174 175 85392f-85393a call 85048e 173->175 176 853903-853904 174->176 177 85391a-85392b RtlAllocateHeap 174->177 182 85393c-85393e 175->182 176->177 178 853906-85390d call 853217 177->178 179 85392d 177->179 178->175 185 85390f-853918 call 853262 178->185 179->182 185->175 185->177
                                                    APIs
                                                    • RtlAllocateHeap.NTDLL(00000008,?,?,?,00854D9E,00000001,00000364,?,00000003,000000FF,?,0084AC73,0086E368,0000000C), ref: 00853923
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap
                                                    • String ID:
                                                    • API String ID: 1279760036-0
                                                    • Opcode ID: 60bfcfa127c912f844571e7e2429d7835c9a75288f612e9f000ff68b2ad1094d
                                                    • Instruction ID: 453e7135c3734bad60b33e00bbce47a1805bf6742a071a1bbfe916c3cb8f7fb9
                                                    • Opcode Fuzzy Hash: 60bfcfa127c912f844571e7e2429d7835c9a75288f612e9f000ff68b2ad1094d
                                                    • Instruction Fuzzy Hash: C7F0B471109A2467DF225A6A9C01B5A7F48FF427E3F148021FC09E6194DAA0DF0886E1
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: __floor_pentium4
                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                    • API String ID: 4168288129-2761157908
                                                    • Opcode ID: 0eb4d24e66b39a10acc3f64d3b5a5eb6065ebbec514b583b5a77367332db5c30
                                                    • Instruction ID: d76513cd9a93ee442968fbd42441db8c5a71c5ac89716f0fe51bb16d45ceef92
                                                    • Opcode Fuzzy Hash: 0eb4d24e66b39a10acc3f64d3b5a5eb6065ebbec514b583b5a77367332db5c30
                                                    • Instruction Fuzzy Hash: 97D23A72E086288FDB25CE28CD407EAB7B5FB44306F1441EAD94DE7241E738AE858F41
                                                    APIs
                                                    • GetLocaleInfoW.KERNEL32(?,2000000B,0085DDC7,00000002,00000000,?,?,?,0085DDC7,?,00000000), ref: 0085DB42
                                                    • GetLocaleInfoW.KERNEL32(?,20001004,0085DDC7,00000002,00000000,?,?,?,0085DDC7,?,00000000), ref: 0085DB6B
                                                    • GetACP.KERNEL32(?,?,0085DDC7,?,00000000), ref: 0085DB80
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID: ACP$OCP
                                                    • API String ID: 2299586839-711371036
                                                    • Opcode ID: da00cb37360d43dfa749605c5b47f6ef09fc4f0f8e07bcff1c6434360ee2fa59
                                                    • Instruction ID: 0ea38df198bc760e7072e2891805097c41d509b55492ae84d4e724645de76699
                                                    • Opcode Fuzzy Hash: da00cb37360d43dfa749605c5b47f6ef09fc4f0f8e07bcff1c6434360ee2fa59
                                                    • Instruction Fuzzy Hash: A6219A76A00205EADB358F64C901A9773A7FB50B76B578464EE0ADB110F732DE49C392
                                                    APIs
                                                      • Part of subcall function 00854D51: GetLastError.KERNEL32(?,?,0084AC73,0086E368,0000000C), ref: 00854D55
                                                      • Part of subcall function 00854D51: SetLastError.KERNEL32(00000000), ref: 00854DF7
                                                    • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 0085DD8A
                                                    • IsValidCodePage.KERNEL32(00000000), ref: 0085DDD3
                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 0085DDE2
                                                    • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 0085DE2A
                                                    • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0085DE49
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                    • String ID:
                                                    • API String ID: 415426439-0
                                                    • Opcode ID: 6f2fa3afef536c68bbcf428c20e090ced67ff51288cf344efbc5ab8e2d37cb9f
                                                    • Instruction ID: 3b7d437474da47f1d056ba947322be2e228057d4dbfcb64fc50d703063658946
                                                    • Opcode Fuzzy Hash: 6f2fa3afef536c68bbcf428c20e090ced67ff51288cf344efbc5ab8e2d37cb9f
                                                    • Instruction Fuzzy Hash: 38518E71A00709ABDB20DFA9CC45ABE77B8FF04702F154429FD15E7190EBB09948CB61
                                                    APIs
                                                      • Part of subcall function 00854D51: GetLastError.KERNEL32(?,?,0084AC73,0086E368,0000000C), ref: 00854D55
                                                      • Part of subcall function 00854D51: SetLastError.KERNEL32(00000000), ref: 00854DF7
                                                    • GetACP.KERNEL32(?,?,?,?,?,?,008522AB,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 0085D3DB
                                                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,008522AB,?,?,?,00000055,?,-00000050,?,?), ref: 0085D406
                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 0085D569
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$CodeInfoLocalePageValid
                                                    • String ID: utf8
                                                    • API String ID: 607553120-905460609
                                                    • Opcode ID: 391f8f61c10e0b99a8ded0ce93def72660657cca1169650700f7b1ec74597428
                                                    • Instruction ID: 215f918ccc2121c9c64ef983d73171ed0f9f6e3dfac6221b8c998d89136e6dd0
                                                    • Opcode Fuzzy Hash: 391f8f61c10e0b99a8ded0ce93def72660657cca1169650700f7b1ec74597428
                                                    • Instruction Fuzzy Hash: 62710771600706AAEB34AB78CC86FAA77A8FF44716F144029FD05D7281FB71E949C762
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: _strrchr
                                                    • String ID:
                                                    • API String ID: 3213747228-0
                                                    • Opcode ID: 1072c5e6e1c16b752ba31c9af8bb0539825a8b68ef300b8e92e05e0def2a22cc
                                                    • Instruction ID: 7ad3aef1f7a2183a0a59e3e64f2b4d7fc21162a864cd2035d5496893c8940ac3
                                                    • Opcode Fuzzy Hash: 1072c5e6e1c16b752ba31c9af8bb0539825a8b68ef300b8e92e05e0def2a22cc
                                                    • Instruction Fuzzy Hash: 35B18A72900A499FDB11CF28C8A17FEBBA6FF55341F1481AAEC05EB341D2749D49CBA1
                                                    APIs
                                                    • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00846C06
                                                    • IsDebuggerPresent.KERNEL32 ref: 00846CD2
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00846CEB
                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 00846CF5
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                    • String ID:
                                                    • API String ID: 254469556-0
                                                    • Opcode ID: fc47e0e41605fef286645b1c8662e86f8af9532a2bf34d2018df020102a9ac40
                                                    • Instruction ID: 7fbf864eba07ac5e71450a15451d729072535f04153d1d1981f765d08d7b9389
                                                    • Opcode Fuzzy Hash: fc47e0e41605fef286645b1c8662e86f8af9532a2bf34d2018df020102a9ac40
                                                    • Instruction Fuzzy Hash: 5831F7B5D0561C9BDF20DFA4D9497CDBBB8FF18700F1041AAE50DAB250EB719A848F46
                                                    APIs
                                                      • Part of subcall function 00854D51: GetLastError.KERNEL32(?,?,0084AC73,0086E368,0000000C), ref: 00854D55
                                                      • Part of subcall function 00854D51: SetLastError.KERNEL32(00000000), ref: 00854DF7
                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0085D781
                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0085D7CB
                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0085D891
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale$ErrorLast
                                                    • String ID:
                                                    • API String ID: 661929714-0
                                                    • Opcode ID: 349bfeb22cd50de029176eb4fb7bd137fe652abd04563b777361eb1e861a3c47
                                                    • Instruction ID: 7b188435c8cfe9b429fd4775493b1fd8cf99f742511da2bbf2f04cf2452b7da4
                                                    • Opcode Fuzzy Hash: 349bfeb22cd50de029176eb4fb7bd137fe652abd04563b777361eb1e861a3c47
                                                    • Instruction Fuzzy Hash: 1461AD7190031B9BDB389F28CC82BAA77A8FF04316F1441B9ED15D7285EB35D989CB51
                                                    APIs
                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000010), ref: 0084E3C7
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000010), ref: 0084E3D1
                                                    • UnhandledExceptionFilter.KERNEL32(0086E0A0,?,?,?,?,?,00000010), ref: 0084E3DE
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                    • String ID:
                                                    • API String ID: 3906539128-0
                                                    • Opcode ID: 81e70d00954ed7a55623428bfe8a342b83e7be0e4c4251e63334f17b401f023a
                                                    • Instruction ID: 335761e71e6ff4c4445e35a743951b59b49d05642ede20d47f16989fe9ed0141
                                                    • Opcode Fuzzy Hash: 81e70d00954ed7a55623428bfe8a342b83e7be0e4c4251e63334f17b401f023a
                                                    • Instruction Fuzzy Hash: 1731A27490162CABCB21DF68D889B8DBBB8FF18710F5041EAE41CA7250EB749B858F55
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a5f16e2d6336bb1e657f2e6f78f4751b26da7cdb430e08984ee6e89854f7e844
                                                    • Instruction ID: 5e17e634f7ff2758c6d71b7c1b086ce2bb34b01a8a8d99c82b227aa10e4ee003
                                                    • Opcode Fuzzy Hash: a5f16e2d6336bb1e657f2e6f78f4751b26da7cdb430e08984ee6e89854f7e844
                                                    • Instruction Fuzzy Hash: 3EF12B71E012199FDF14CFA8C980AAEBBB1FF88325F158269E815E7385D731A905CF90
                                                    APIs
                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,008565D0,?,?,00000008,?,?,00862545,00000000), ref: 00856802
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ExceptionRaise
                                                    • String ID:
                                                    • API String ID: 3997070919-0
                                                    • Opcode ID: 11e5e4a1061e7220f749593fba1cff8814956371988a28249184a69696084bf6
                                                    • Instruction ID: f649af41e8aee1f70d0607165fbca8a0d9720dfebf5fb3077720dbddf32f3fc1
                                                    • Opcode Fuzzy Hash: 11e5e4a1061e7220f749593fba1cff8814956371988a28249184a69696084bf6
                                                    • Instruction Fuzzy Hash: 5CB16F35610609CFDB18CF28C486B647BE0FF04369F658668E899CF2A1D335E9A5CB40
                                                    APIs
                                                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00846902
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: FeaturePresentProcessor
                                                    • String ID:
                                                    • API String ID: 2325560087-0
                                                    • Opcode ID: b8bd462c9ba284fa3526c093c24d9ee066b0b3cb435198e95998d636f0770046
                                                    • Instruction ID: 54c44b8c6a06a440402bc3201513c652bd213a7fba03eb849d916423b0c49e49
                                                    • Opcode Fuzzy Hash: b8bd462c9ba284fa3526c093c24d9ee066b0b3cb435198e95998d636f0770046
                                                    • Instruction Fuzzy Hash: 6451CBB1A11A19CFEB14CFA8D9857AABBF0FB59310F14C02AC505EB251E374D950CF92
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 78ecfd2e0fa523f0bde800bca0dc4795e44f4018b460d57d146de96bb73850e2
                                                    • Instruction ID: 0af89481755027e47209f7ea8e655b4998f03994e7e8c188bf3e95e72a983e77
                                                    • Opcode Fuzzy Hash: 78ecfd2e0fa523f0bde800bca0dc4795e44f4018b460d57d146de96bb73850e2
                                                    • Instruction Fuzzy Hash: 8B41C4B5800218AEDB24DF69CCC9AAABBB9FF45305F1442D9E848E3201D6319E898F11
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0
                                                    • API String ID: 0-4108050209
                                                    • Opcode ID: 5255fe73dc041f9d78705bba9afc736d452d52d3a4dd3443421545d5089ba935
                                                    • Instruction ID: 57ac67455ffca524a710389861db806ee1b0233ab7c4b88c05fe659f504867b9
                                                    • Opcode Fuzzy Hash: 5255fe73dc041f9d78705bba9afc736d452d52d3a4dd3443421545d5089ba935
                                                    • Instruction Fuzzy Hash: BEC1FF70A0264E8FCBA4CF68C4916BABBB9FF05314F244A1DD856DB291C730ED45CB51
                                                    APIs
                                                      • Part of subcall function 00854D51: GetLastError.KERNEL32(?,?,0084AC73,0086E368,0000000C), ref: 00854D55
                                                      • Part of subcall function 00854D51: SetLastError.KERNEL32(00000000), ref: 00854DF7
                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0085D9D4
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$InfoLocale
                                                    • String ID:
                                                    • API String ID: 3736152602-0
                                                    • Opcode ID: 0c37c0491bf6de6014d467ba2c2b001820e91ed9fc9f862675c4dcbbcb7162b3
                                                    • Instruction ID: 54fc9fc201ea5721dd531650020f6835200e363ba978a8dfc6cf203191c207c1
                                                    • Opcode Fuzzy Hash: 0c37c0491bf6de6014d467ba2c2b001820e91ed9fc9f862675c4dcbbcb7162b3
                                                    • Instruction Fuzzy Hash: 4721CF32619226ABDF29DA29CC82ABB73ACFF44316F10007AFD05D7145EB74ED488B51
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0
                                                    • API String ID: 0-4108050209
                                                    • Opcode ID: eff21bea70c5507a757a54ba7f30cd75e48617a96796ca5763eccc7ac6e0c55c
                                                    • Instruction ID: 11f1fca904f2e5f7275e14c7fd47be3ad1c909e7da7d4228f66b6db21d96f1f3
                                                    • Opcode Fuzzy Hash: eff21bea70c5507a757a54ba7f30cd75e48617a96796ca5763eccc7ac6e0c55c
                                                    • Instruction Fuzzy Hash: 54B1E370A0270E9BCFA8CF68C4916BEBBA9FF44314F14062ED492E7691D731E941CB56
                                                    APIs
                                                      • Part of subcall function 00854D51: GetLastError.KERNEL32(?,?,0084AC73,0086E368,0000000C), ref: 00854D55
                                                      • Part of subcall function 00854D51: SetLastError.KERNEL32(00000000), ref: 00854DF7
                                                    • EnumSystemLocalesW.KERNEL32(0085D72D,00000001,00000000,?,-00000050,?,0085DD5E,00000000,?,?,?,00000055,?), ref: 0085D679
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$EnumLocalesSystem
                                                    • String ID:
                                                    • API String ID: 2417226690-0
                                                    • Opcode ID: eb6c510bae352066d623d943181a41ccd3b229577c0d0be3022c9341a49e72d7
                                                    • Instruction ID: 63fec953a830a573e1573ffd2f3b235ab8d4647a3a8e98d717457feb29259e56
                                                    • Opcode Fuzzy Hash: eb6c510bae352066d623d943181a41ccd3b229577c0d0be3022c9341a49e72d7
                                                    • Instruction Fuzzy Hash: B311C23A2007019FDB289F3988916BAB792FB9435AB15442CED9A87B40D775A947CB80
                                                    APIs
                                                      • Part of subcall function 00854D51: GetLastError.KERNEL32(?,?,0084AC73,0086E368,0000000C), ref: 00854D55
                                                      • Part of subcall function 00854D51: SetLastError.KERNEL32(00000000), ref: 00854DF7
                                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0085D949,00000000,00000000,?), ref: 0085DBDB
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$InfoLocale
                                                    • String ID:
                                                    • API String ID: 3736152602-0
                                                    • Opcode ID: edec29c577274f612adb40a45e1e5c5afcf1c8d84e15d5c980275a44f54cb051
                                                    • Instruction ID: b449b6574708cc66dd069fa7ad4aee23cea959f684b42357369ffdce8b0721ce
                                                    • Opcode Fuzzy Hash: edec29c577274f612adb40a45e1e5c5afcf1c8d84e15d5c980275a44f54cb051
                                                    • Instruction Fuzzy Hash: 9FF02D36900322BBDB385B65CC46BFA7768FB40395F150424EC16E3280EAB0FD85C5D0
                                                    APIs
                                                      • Part of subcall function 00854D51: GetLastError.KERNEL32(?,?,0084AC73,0086E368,0000000C), ref: 00854D55
                                                      • Part of subcall function 00854D51: SetLastError.KERNEL32(00000000), ref: 00854DF7
                                                    • EnumSystemLocalesW.KERNEL32(0085D980,00000001,?,?,-00000050,?,0085DD22,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 0085D6EC
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$EnumLocalesSystem
                                                    • String ID:
                                                    • API String ID: 2417226690-0
                                                    • Opcode ID: 406e8161f0d60aeca8202356306d02f0ab9c21d11bb5c8a69ce36e9b7b406ee7
                                                    • Instruction ID: fc3d6df4e1ae3cf575eb870bd9e0d30f30bb158eaf7156afa24e9299f19a5516
                                                    • Opcode Fuzzy Hash: 406e8161f0d60aeca8202356306d02f0ab9c21d11bb5c8a69ce36e9b7b406ee7
                                                    • Instruction Fuzzy Hash: FAF0F6362003045FDB245F3998D1A7A7BD1FF80769F16842CFD49CB690D6B1AC46CA90
                                                    APIs
                                                      • Part of subcall function 0084E56D: EnterCriticalSection.KERNEL32(?,?,00854A29,?,0086E6D8,00000008,00854BED,?,?,?), ref: 0084E57C
                                                    • EnumSystemLocalesW.KERNEL32(00853F03,00000001,0086E678,0000000C,00854372,00000000), ref: 00853F48
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                    • String ID:
                                                    • API String ID: 1272433827-0
                                                    • Opcode ID: 9cd3c36ad9f4d286fcef9f356f2f509a26ecfccbf542b8a36943f9ae1a7af9f9
                                                    • Instruction ID: 355f44f751ffee74a1de4b38e2912b38a282c6805fa0ff1b433c078e5d9ceb68
                                                    • Opcode Fuzzy Hash: 9cd3c36ad9f4d286fcef9f356f2f509a26ecfccbf542b8a36943f9ae1a7af9f9
                                                    • Instruction Fuzzy Hash: DDF03C76A50204DFDB00DFA8E842B5977F1FB15721F10411AF415DB2E0DBB54A44CF51
                                                    APIs
                                                      • Part of subcall function 00854D51: GetLastError.KERNEL32(?,?,0084AC73,0086E368,0000000C), ref: 00854D55
                                                      • Part of subcall function 00854D51: SetLastError.KERNEL32(00000000), ref: 00854DF7
                                                    • EnumSystemLocalesW.KERNEL32(0085D515,00000001,?,?,?,0085DD80,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 0085D5F3
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$EnumLocalesSystem
                                                    • String ID:
                                                    • API String ID: 2417226690-0
                                                    • Opcode ID: 96b7a3f4817ca91d9c76799065e954578027f1cc2c7f0d1c17751ca664a25feb
                                                    • Instruction ID: f0e0adc51612dce0cca676d2744408ebc079a15e5fb3e7f51e963c3a7f8ca779
                                                    • Opcode Fuzzy Hash: 96b7a3f4817ca91d9c76799065e954578027f1cc2c7f0d1c17751ca664a25feb
                                                    • Instruction Fuzzy Hash: 22F0553630030457CB14AF39C84576A7FA0FFC1716F060058EE09CB650DAB1D846C790
                                                    APIs
                                                    • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00852E11,?,20001004,00000000,00000002,?,?,00852413), ref: 008544AA
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: d0c1229b9f6f1f55fdf031c30a2d26bf5adc52578aef3cd6fb17bc938b7d5f23
                                                    • Instruction ID: 4af0caca4facbea46b54ea37a955a8356423be5caa3479161796f6f6c0b1b2f5
                                                    • Opcode Fuzzy Hash: d0c1229b9f6f1f55fdf031c30a2d26bf5adc52578aef3cd6fb17bc938b7d5f23
                                                    • Instruction Fuzzy Hash: 44E0DF32400A18BBCF122F60EC04FAE3E16FF04766F015010FD05A5160CB728964AAD9
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00006D62,00846387), ref: 00846D5B
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: 6eb59ff1ddaeaced96c575af61daef6711ed8cba213193813b13be50a056754e
                                                    • Instruction ID: 93edf241e4e05d58bf1f8524038b722b591182865594b9af5f86f26f60b979e1
                                                    • Opcode Fuzzy Hash: 6eb59ff1ddaeaced96c575af61daef6711ed8cba213193813b13be50a056754e
                                                    • Instruction Fuzzy Hash:
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: HeapProcess
                                                    • String ID:
                                                    • API String ID: 54951025-0
                                                    • Opcode ID: 5da5d90a6df93a28e6d8e6bfb565c64ade89b2535ba5c7b0562a58ecbc0bcd9f
                                                    • Instruction ID: 22f3a80261811f11a03668cbb63be8865c1756c35f78b91597fa23801489166a
                                                    • Opcode Fuzzy Hash: 5da5d90a6df93a28e6d8e6bfb565c64ade89b2535ba5c7b0562a58ecbc0bcd9f
                                                    • Instruction Fuzzy Hash: DCA012702091008F43004F315A0830937D86513180701401D9004C4120E67440909F00
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastProcess$CurrentFeatureInfoLocalePresentProcessorTerminate
                                                    • String ID:
                                                    • API String ID: 3471368781-0
                                                    • Opcode ID: 946790ee97899bc4eff35218b7adb15a53e122e3c5219af8652178f889d5c904
                                                    • Instruction ID: 9cbbc886414d75b2796813a71d2fd256725008f0c532779e9ef8ebc6c535368e
                                                    • Opcode Fuzzy Hash: 946790ee97899bc4eff35218b7adb15a53e122e3c5219af8652178f889d5c904
                                                    • Instruction Fuzzy Hash: 80B1F7355007059FDB389B28CC82BB7B3E9FB4470AF54452DED83C6580EAB5E98ACB11
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c40462530d1634de5f1ed506cdc9d9bcd32bdc8a5f714ca53be199472989dfe9
                                                    • Instruction ID: 4f3a804c4f74d748d5c9d0975146fbdf6bf9a088964496ac56ab0b342a5b5194
                                                    • Opcode Fuzzy Hash: c40462530d1634de5f1ed506cdc9d9bcd32bdc8a5f714ca53be199472989dfe9
                                                    • Instruction Fuzzy Hash: BDE08C32A15638EBCB24DB8CC90498AF3ECFB85B12B150496B901D3140C270DE04C7D1
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 65364d3200f27164b2687277c73e936126ef5f1e13391596fd0bee30aa55541d
                                                    • Instruction ID: 68268b5365c91b87a0a523a9f4c408e3a6723c992a2adf8306b814c2174f9440
                                                    • Opcode Fuzzy Hash: 65364d3200f27164b2687277c73e936126ef5f1e13391596fd0bee30aa55541d
                                                    • Instruction Fuzzy Hash: ECC08C34100D005ACE29892482F57A573A4F392783FC8048CCC438B782C51FAC8BD781
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00845E45
                                                    • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00845E53
                                                    • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00845E64
                                                    • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 00845E75
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModule
                                                    • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                    • API String ID: 667068680-1247241052
                                                    • Opcode ID: 849399a3732e5192a47497140d8a3daab5f1265c7fd007ac107ced4a3c3b40f9
                                                    • Instruction ID: 25b81ea9da28f5bf436344ffb1545bfbfd05b0751618dc8da780148a43565ecd
                                                    • Opcode Fuzzy Hash: 849399a3732e5192a47497140d8a3daab5f1265c7fd007ac107ced4a3c3b40f9
                                                    • Instruction Fuzzy Hash: 7BE0EC71AAAF10FF83006F70FD0D8493BA8FA05702B035112F595DA260DEFC85408B92
                                                    APIs
                                                    • type_info::operator==.LIBVCRUNTIME ref: 00849B77
                                                    • ___TypeMatch.LIBVCRUNTIME ref: 00849C85
                                                    • _UnwindNestedFrames.LIBCMT ref: 00849DD7
                                                    • CallUnexpected.LIBVCRUNTIME ref: 00849DF2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                    • String ID: csm$csm$csm
                                                    • API String ID: 2751267872-393685449
                                                    • Opcode ID: 90d8116cb173bdee408e1a1a65e9a7ce04a6ee61baba5c81101fe17b0e49e685
                                                    • Instruction ID: 52f39969dd695522a07f741cd212fb49cace7117d70fe01e31a434a9963da2bb
                                                    • Opcode Fuzzy Hash: 90d8116cb173bdee408e1a1a65e9a7ce04a6ee61baba5c81101fe17b0e49e685
                                                    • Instruction Fuzzy Hash: B4B17771C0021DEFCF28DFA8C8819AFBBB5FF14314B11415AE895AB212D735DA51CB92
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID: 0-3907804496
                                                    • Opcode ID: 4946d0c2da0f56b1c588b02a5447cbf49bf1b8af144ed9880d2b7bae31b551ac
                                                    • Instruction ID: c62b46cb25875ed5ce6d606d65d081b342c92e6d7e973a48e67db33be9146db0
                                                    • Opcode Fuzzy Hash: 4946d0c2da0f56b1c588b02a5447cbf49bf1b8af144ed9880d2b7bae31b551ac
                                                    • Instruction Fuzzy Hash: 71B1F370A04609EFDB11CF98C881BAE7BB2FF49306F14405AED45F7292CB749949CB61
                                                    APIs
                                                    • GetCPInfo.KERNEL32(00F7FE78,00F7FE78,?,7FFFFFFF,?,008616DA,00F7FE78,00F7FE78,?,00F7FE78,?,?,?,?,00F7FE78,?), ref: 008614B0
                                                    • __alloca_probe_16.LIBCMT ref: 0086156B
                                                    • __alloca_probe_16.LIBCMT ref: 008615FA
                                                    • __freea.LIBCMT ref: 00861645
                                                    • __freea.LIBCMT ref: 0086164B
                                                    • __freea.LIBCMT ref: 00861681
                                                    • __freea.LIBCMT ref: 00861687
                                                    • __freea.LIBCMT ref: 00861697
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: __freea$__alloca_probe_16$Info
                                                    • String ID:
                                                    • API String ID: 127012223-0
                                                    • Opcode ID: 6ebcde06eb7d96260848ddd36b50cb984d6fd4f6adcbd4858c604ba77dd83f8f
                                                    • Instruction ID: 519f578dcaaa91affcbd60babf66655615ef9fb006283d30cb7d4b778c7fb935
                                                    • Opcode Fuzzy Hash: 6ebcde06eb7d96260848ddd36b50cb984d6fd4f6adcbd4858c604ba77dd83f8f
                                                    • Instruction Fuzzy Hash: B1710776900209ABDF219E68CC99FAE77BAFF55314F1E0459E805E7283EB35CC048796
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 008460FC
                                                    • __alloca_probe_16.LIBCMT ref: 00846128
                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00846167
                                                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00846184
                                                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 008461C3
                                                    • __alloca_probe_16.LIBCMT ref: 008461E0
                                                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00846222
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00846245
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                                    • String ID:
                                                    • API String ID: 2040435927-0
                                                    • Opcode ID: ba09ac13abdfa70ec8eae60ecb099bc1cd2a5dacf36f518388e9c4bcf4c18858
                                                    • Instruction ID: abdeca005be85b8c6996cc2049ba2f36e652412c6a581f4ff9b56e847749c533
                                                    • Opcode Fuzzy Hash: ba09ac13abdfa70ec8eae60ecb099bc1cd2a5dacf36f518388e9c4bcf4c18858
                                                    • Instruction Fuzzy Hash: 0251927290022EBBDB209F64CC45FAB7BA9FF42744F154425F915E6150F7B4DC208B92
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 0084442F
                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00844439
                                                    • int.LIBCPMT ref: 00844450
                                                      • Part of subcall function 00841684: std::_Lockit::_Lockit.LIBCPMT ref: 00841695
                                                      • Part of subcall function 00841684: std::_Lockit::~_Lockit.LIBCPMT ref: 008416AF
                                                    • codecvt.LIBCPMT ref: 00844473
                                                    • std::_Facet_Register.LIBCPMT ref: 0084448A
                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 008444AA
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 008444B7
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registercodecvt
                                                    • String ID:
                                                    • API String ID: 2133458128-0
                                                    • Opcode ID: 08988c0f011c93e2f6754820a4b979ce1ccf58eed4569281200107a4118ff28d
                                                    • Instruction ID: 101fb7f9c0199333cc7aef85e9be2579d02229159b4eb8fee5d85d1ceafff48b
                                                    • Opcode Fuzzy Hash: 08988c0f011c93e2f6754820a4b979ce1ccf58eed4569281200107a4118ff28d
                                                    • Instruction Fuzzy Hash: 4901C03190161D8BCF15EBACC846BAEB7B0FF90720F694409E411EB292DF749E058B82
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,008496E1,00847E01,00846DA6), ref: 008496F8
                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00849706
                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0084971F
                                                    • SetLastError.KERNEL32(00000000,008496E1,00847E01,00846DA6), ref: 00849771
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastValue___vcrt_
                                                    • String ID:
                                                    • API String ID: 3852720340-0
                                                    • Opcode ID: b8c2bd37df53fb6959e3a97cd8a300f12f44473105ae7cbcbd6e451133bab67f
                                                    • Instruction ID: fa3f85c9387d5516d87053f2c7a98d02fd13b23392f0f998ecc48d2cd9d22323
                                                    • Opcode Fuzzy Hash: b8c2bd37df53fb6959e3a97cd8a300f12f44473105ae7cbcbd6e451133bab67f
                                                    • Instruction Fuzzy Hash: F101D83615DB1A9DD6381EB87CC9B672F85FB01779B200239F124C90E1EE518C41DB42
                                                    APIs
                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,CE39C80F,?,?,00000000,008630BF,000000FF,?,0085191E,00000002,?,008518F2,0084E626), ref: 008519C3
                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 008519D5
                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,008630BF,000000FF,?,0085191E,00000002,?,008518F2,0084E626), ref: 008519F7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                    • String ID: CorExitProcess$mscoree.dll
                                                    • API String ID: 4061214504-1276376045
                                                    • Opcode ID: 324bd7e75ad9f0bf4b1050700635911a5c390129a2dd82b23b9934cef21605a4
                                                    • Instruction ID: da743dab55a37e3e8e8ee99cc718c8f643ab68bd7049101c842525c0d4ad67a2
                                                    • Opcode Fuzzy Hash: 324bd7e75ad9f0bf4b1050700635911a5c390129a2dd82b23b9934cef21605a4
                                                    • Instruction Fuzzy Hash: 66016231A00E19EBDB119F50DC19FAEBBB9FB04B15F010629F821E2390DBB99904CA91
                                                    APIs
                                                    • __alloca_probe_16.LIBCMT ref: 00859E32
                                                    • __alloca_probe_16.LIBCMT ref: 00859EF3
                                                    • __freea.LIBCMT ref: 00859F5A
                                                      • Part of subcall function 008550B1: HeapAlloc.KERNEL32(00000000,0085B047,?,?,0085B047,00000220,?,00000010,?), ref: 008550E3
                                                    • __freea.LIBCMT ref: 00859F6F
                                                    • __freea.LIBCMT ref: 00859F7F
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: __freea$__alloca_probe_16$AllocHeap
                                                    • String ID:
                                                    • API String ID: 1096550386-0
                                                    • Opcode ID: 656d8dc59baaa778ef57e0405dd54e76662148ca2f91edfb8c2d588d2c2a971d
                                                    • Instruction ID: 5ebe72ecf08628fa9091c58a9302968139a3031026c44bd8fd1f3b8d1440c306
                                                    • Opcode Fuzzy Hash: 656d8dc59baaa778ef57e0405dd54e76662148ca2f91edfb8c2d588d2c2a971d
                                                    • Instruction Fuzzy Hash: 6F51A17260021AEBEF249F64CC82EAF3AADFF05756F150128FD49D6251EB71CC5887A1
                                                    APIs
                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00843143
                                                    • int.LIBCPMT ref: 00843156
                                                      • Part of subcall function 00841684: std::_Lockit::_Lockit.LIBCPMT ref: 00841695
                                                      • Part of subcall function 00841684: std::_Lockit::~_Lockit.LIBCPMT ref: 008416AF
                                                    • std::_Facet_Register.LIBCPMT ref: 00843189
                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0084319F
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 008431AA
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                    • String ID:
                                                    • API String ID: 2081738530-0
                                                    • Opcode ID: 8944a86bf42e3379b52eb9263f2cbb02f83cc75f8d276628f24ef2121c2b2f99
                                                    • Instruction ID: f186c0a3a8d11f797a268327073c44a8fb48f8aefbee461e0b0d76a072f2d8dc
                                                    • Opcode Fuzzy Hash: 8944a86bf42e3379b52eb9263f2cbb02f83cc75f8d276628f24ef2121c2b2f99
                                                    • Instruction Fuzzy Hash: 50018F7290451CABCB14AB58DC0999E7B68FF91760B15015AF805EB291EF30EF81CB81
                                                    APIs
                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00842ED5
                                                    • int.LIBCPMT ref: 00842EE8
                                                      • Part of subcall function 00841684: std::_Lockit::_Lockit.LIBCPMT ref: 00841695
                                                      • Part of subcall function 00841684: std::_Lockit::~_Lockit.LIBCPMT ref: 008416AF
                                                    • std::_Facet_Register.LIBCPMT ref: 00842F1B
                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00842F31
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00842F3C
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                    • String ID:
                                                    • API String ID: 2081738530-0
                                                    • Opcode ID: 474ca32fc313a7c8da173b20eb77077de66d31a8cbc5ea67c2d2e4b8919f2c91
                                                    • Instruction ID: 2fcce74502071fa22ed62bb1265a60a7868912dd8657e3784f67c4be4ed8eac7
                                                    • Opcode Fuzzy Hash: 474ca32fc313a7c8da173b20eb77077de66d31a8cbc5ea67c2d2e4b8919f2c91
                                                    • Instruction Fuzzy Hash: B501F73690851CABCF25EB58D80989D7B78FF50760B610155F801E7291EF30AE81C791
                                                    APIs
                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00843677
                                                    • int.LIBCPMT ref: 0084368A
                                                      • Part of subcall function 00841684: std::_Lockit::_Lockit.LIBCPMT ref: 00841695
                                                      • Part of subcall function 00841684: std::_Lockit::~_Lockit.LIBCPMT ref: 008416AF
                                                    • std::_Facet_Register.LIBCPMT ref: 008436BD
                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 008436D3
                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 008436DE
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                    • String ID:
                                                    • API String ID: 2081738530-0
                                                    • Opcode ID: b664ee74824c9d1c1deae5545877ae9d9b44fd7694a337061a50434358251b89
                                                    • Instruction ID: 06906d45b1b7ab89a881058c4c1d13fc2fc989fe8362a328b6fb945e89589f2a
                                                    • Opcode Fuzzy Hash: b664ee74824c9d1c1deae5545877ae9d9b44fd7694a337061a50434358251b89
                                                    • Instruction Fuzzy Hash: 8201F772A0411CBBCF14AB5CD80599E7B68FFA0360B160145F805D7391EF30AF819781
                                                    APIs
                                                    • __EH_prolog3.LIBCMT ref: 00845831
                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0084583C
                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 008458AA
                                                      • Part of subcall function 0084598D: std::locale::_Locimp::_Locimp.LIBCPMT ref: 008459A5
                                                    • std::locale::_Setgloballocale.LIBCPMT ref: 00845857
                                                    • _Yarn.LIBCPMT ref: 0084586D
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                    • String ID:
                                                    • API String ID: 1088826258-0
                                                    • Opcode ID: 6a6bc915347e7c6e4853273156e189d6da1bd87e54da9f7927f8686c8a7fd86a
                                                    • Instruction ID: 0da4768b9fc6ea74713328ec9099807bda97073fc5a956ebb7ceb9d814d08dce
                                                    • Opcode Fuzzy Hash: 6a6bc915347e7c6e4853273156e189d6da1bd87e54da9f7927f8686c8a7fd86a
                                                    • Instruction Fuzzy Hash: 3B01DF75A01A189BC706EF24D851A7D7BB1FF85340B194019E80297392CF786E46DBC7
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(00000011,00000000,00000800,?,0084A7E3,00000000,00000001,009D3A6C,?,?,?,0084A986,00000004,InitializeCriticalSectionEx,00866CA8,InitializeCriticalSectionEx), ref: 0084A83F
                                                    • GetLastError.KERNEL32(?,0084A7E3,00000000,00000001,009D3A6C,?,?,?,0084A986,00000004,InitializeCriticalSectionEx,00866CA8,InitializeCriticalSectionEx,00000000,?,0084A73D), ref: 0084A849
                                                    • LoadLibraryExW.KERNEL32(00000011,00000000,00000000,?,00000011,00849653), ref: 0084A871
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad$ErrorLast
                                                    • String ID: api-ms-
                                                    • API String ID: 3177248105-2084034818
                                                    • Opcode ID: fce0699f34b5a1afdc79bd60330acc51dc186065940dd6775eacdfdf046fd5f9
                                                    • Instruction ID: d8bed66560d4d1611997dfae453d3f2d7bc0a801c14a2e4120e0ea6b950fa109
                                                    • Opcode Fuzzy Hash: fce0699f34b5a1afdc79bd60330acc51dc186065940dd6775eacdfdf046fd5f9
                                                    • Instruction Fuzzy Hash: FDE01A74284A08BAEB141B60EC16B193E55FB00B91F514030F90DE80E1E7A2D911C6C6
                                                    APIs
                                                    • GetConsoleOutputCP.KERNEL32(CE39C80F,00000010,00000000,?), ref: 008572B2
                                                      • Part of subcall function 0085A138: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00859F50,?,00000000,-00000008), ref: 0085A1E4
                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0085750D
                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00857555
                                                    • GetLastError.KERNEL32 ref: 008575F8
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                    • String ID:
                                                    • API String ID: 2112829910-0
                                                    • Opcode ID: e72f39b6d9765b7bc35d6026c3f2dba6b4b1a1b748ee56ce52ffa512e87db46f
                                                    • Instruction ID: bb8dcedbdbecf2e056d51486d07668da441628932bde50c1779e2ab4dacf68ee
                                                    • Opcode Fuzzy Hash: e72f39b6d9765b7bc35d6026c3f2dba6b4b1a1b748ee56ce52ffa512e87db46f
                                                    • Instruction Fuzzy Hash: 65D179B5D04648AFCF15CFA8D8809EDBBB5FF09315F18812AE856EB351E730A945CB50
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: AdjustPointer
                                                    • String ID:
                                                    • API String ID: 1740715915-0
                                                    • Opcode ID: df836b92c930068441a6d2dc2ecb04fa8ec5695e1192d6736da3f6b1e487703a
                                                    • Instruction ID: d8cd5293fe78fe08969b7097e14b6ae9db7ffe86ec1571d6ac2426c2b24af639
                                                    • Opcode Fuzzy Hash: df836b92c930068441a6d2dc2ecb04fa8ec5695e1192d6736da3f6b1e487703a
                                                    • Instruction Fuzzy Hash: D451AD72A0520EAFEB398F58D841B7BBBA4FF08710F14452EE895C6691E731AC41CB91
                                                    APIs
                                                      • Part of subcall function 00843F59: QueryPerformanceFrequency.KERNEL32(?), ref: 00843F77
                                                      • Part of subcall function 00843F42: QueryPerformanceCounter.KERNEL32(?), ref: 00843F4B
                                                    • __alldvrm.LIBCMT ref: 008419D9
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008419F9
                                                    • __alldvrm.LIBCMT ref: 00841A17
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00841A34
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: PerformanceQueryUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@$CounterFrequency
                                                    • String ID:
                                                    • API String ID: 1598812886-0
                                                    • Opcode ID: 1d0e73637f35ddf281190aaa8f5faee661cb8c94e72157474018c3c12658a33e
                                                    • Instruction ID: 02d951a00aeee089df7d4d6cd523a0c015c229aec3ff2b6ec1cc3114a22435c4
                                                    • Opcode Fuzzy Hash: 1d0e73637f35ddf281190aaa8f5faee661cb8c94e72157474018c3c12658a33e
                                                    • Instruction Fuzzy Hash: 7E21D7717053282F9B28DA2D9C85F3BAEEDEBC8790F06417DF54EEB301E5609C0446A5
                                                    APIs
                                                      • Part of subcall function 0085A138: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00859F50,?,00000000,-00000008), ref: 0085A1E4
                                                    • GetLastError.KERNEL32 ref: 0085A5B8
                                                    • __dosmaperr.LIBCMT ref: 0085A5BF
                                                    • GetLastError.KERNEL32(?,?,?,?), ref: 0085A5F9
                                                    • __dosmaperr.LIBCMT ref: 0085A600
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                    • String ID:
                                                    • API String ID: 1913693674-0
                                                    • Opcode ID: 67c7316cea77a0ec0d67d9e4c865825c515fadc3530595494580d9a74ee8d63c
                                                    • Instruction ID: 483ed3a0053dd0f5995ceccc76df06b521dc98d9ea136431d3e51680618a14f1
                                                    • Opcode Fuzzy Hash: 67c7316cea77a0ec0d67d9e4c865825c515fadc3530595494580d9a74ee8d63c
                                                    • Instruction Fuzzy Hash: CA21C571600605AF9B28AFA9C8C0C6BBBA9FF543AA7148618FD15D7141E730EC48CB93
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5accf09b1d7e733995cfe6c4b881c002c70f5366ca6c49fc471c2e37968efdff
                                                    • Instruction ID: af60916c6320d9408f0ffa712cdb4d3ff460b915b5e865362968cea865d5a2bc
                                                    • Opcode Fuzzy Hash: 5accf09b1d7e733995cfe6c4b881c002c70f5366ca6c49fc471c2e37968efdff
                                                    • Instruction Fuzzy Hash: F1219D31200619AF9B20AF69D89196A77A9FF0037EB148655FD55D7141EB30EC48CFA2
                                                    APIs
                                                    • GetEnvironmentStringsW.KERNEL32 ref: 0085B4F2
                                                      • Part of subcall function 0085A138: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00859F50,?,00000000,-00000008), ref: 0085A1E4
                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0085B52A
                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0085B54A
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                    • String ID:
                                                    • API String ID: 158306478-0
                                                    • Opcode ID: caa5c8fb828f4be38338fc8fa75e3e423c3b1d1d47ec05a0edea9d2ab95f7756
                                                    • Instruction ID: 833aea3e4a6b2b403b69234448dd2288b342d72904285fe7564b5bd741b5b2ab
                                                    • Opcode Fuzzy Hash: caa5c8fb828f4be38338fc8fa75e3e423c3b1d1d47ec05a0edea9d2ab95f7756
                                                    • Instruction Fuzzy Hash: 0811C4E1901919BF6B152B79ACCAD6F7D9CFE953E6B110125FD01D1101FB60CE0845B2
                                                    APIs
                                                    • WriteConsoleW.KERNEL32(00000010,00000000,0086E3C8,00000000,00000010,?,0085FF3C,00000010,00000001,00000010,?,?,0085764C,?,00000010,00000000), ref: 008611AD
                                                    • GetLastError.KERNEL32(?,0085FF3C,00000010,00000001,00000010,?,?,0085764C,?,00000010,00000000,?,?,?,00857BD3,00000010), ref: 008611B9
                                                      • Part of subcall function 0086117F: CloseHandle.KERNEL32(FFFFFFFE,008611C9,?,0085FF3C,00000010,00000001,00000010,?,?,0085764C,?,00000010,00000000,?,?), ref: 0086118F
                                                    • ___initconout.LIBCMT ref: 008611C9
                                                      • Part of subcall function 00861141: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00861170,0085FF29,?,?,0085764C,?,00000010,00000000,?), ref: 00861154
                                                    • WriteConsoleW.KERNEL32(00000010,00000000,0086E3C8,00000000,?,0085FF3C,00000010,00000001,00000010,?,?,0085764C,?,00000010,00000000,?), ref: 008611DE
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                    • String ID:
                                                    • API String ID: 2744216297-0
                                                    • Opcode ID: ed392d45c65798ddf38b355c7f9366645d180cec62573fe34962988c022f76ca
                                                    • Instruction ID: 8b92b219823d42905ba953f2a6d27eb44785abb36eb2a5c8a414ad52f9554914
                                                    • Opcode Fuzzy Hash: ed392d45c65798ddf38b355c7f9366645d180cec62573fe34962988c022f76ca
                                                    • Instruction Fuzzy Hash: B5F01C36504668BBCF221FD5EC0CA8A7F26FB4A3A0F465011FB19D5221C632C920DB91
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: H_prolog3_catch_strlen
                                                    • String ID: Open Cards
                                                    • API String ID: 3133806014-999811899
                                                    • Opcode ID: 114f1d2a3c97172e149891d3e5fb0903636e769c61ce0a8c646eee53120746e1
                                                    • Instruction ID: f5ef1d9369d1692bb0be4ca2537718c2f1d6e4f759282d694c9cfd6d07c3ad4c
                                                    • Opcode Fuzzy Hash: 114f1d2a3c97172e149891d3e5fb0903636e769c61ce0a8c646eee53120746e1
                                                    • Instruction Fuzzy Hash: F6417331A4460C9FCB24DB5CC98096CB7B1FF48B25BA4835AF524DB2D1CA729E81CB52
                                                    APIs
                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 0084952F
                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 008495E3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: CurrentImageNonwritable___except_validate_context_record
                                                    • String ID: csm
                                                    • API String ID: 3480331319-1018135373
                                                    • Opcode ID: 56276117651c01b89edb94b45ac8b3155b4d117380860581e43cc2123c9afa20
                                                    • Instruction ID: 3ca4e54e02cd77bb8a55da70eb8f0f162941dd04a9b485cabaa001fe636646e8
                                                    • Opcode Fuzzy Hash: 56276117651c01b89edb94b45ac8b3155b4d117380860581e43cc2123c9afa20
                                                    • Instruction Fuzzy Hash: 0141A134A0021C9BCF21DF68C884A9FBBB5FF45324F168195E958DB392D735DA11CB92
                                                    APIs
                                                    • EncodePointer.KERNEL32(00000000,?), ref: 00849E22
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: EncodePointer
                                                    • String ID: MOC$RCC
                                                    • API String ID: 2118026453-2084237596
                                                    • Opcode ID: e99057ab4fbe09dd824fcc6c404fc9a453c71b9418e5dd9e558d7e8b051485bc
                                                    • Instruction ID: a3d21e477519657e8810f89362ade5ebba4a389cb670ccad2f8784348f21131e
                                                    • Opcode Fuzzy Hash: e99057ab4fbe09dd824fcc6c404fc9a453c71b9418e5dd9e558d7e8b051485bc
                                                    • Instruction Fuzzy Hash: 3541567190020DAFCF26CF98D981AEEBBB5FF48300F198059F944A7261E776AD50DB91
                                                    APIs
                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 008415B6
                                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 008415EE
                                                      • Part of subcall function 00845928: _Yarn.LIBCPMT ref: 00845947
                                                      • Part of subcall function 00845928: _Yarn.LIBCPMT ref: 0084596B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1291552512.0000000000841000.00000020.00000001.01000000.00000004.sdmp, Offset: 00840000, based on PE: true
                                                    • Associated: 00000005.00000002.1291365902.0000000000840000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1291776860.0000000000865000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292001883.0000000000870000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000005.00000002.1292316063.00000000009D5000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_840000_file.jbxd
                                                    Similarity
                                                    • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                    • String ID: bad locale name
                                                    • API String ID: 1908188788-1405518554
                                                    • Opcode ID: 56e182c2ea93ab346aed10c49401d6d1d92209f840293495682b8505d5284111
                                                    • Instruction ID: 7246439ebcb34736cf530c91a3d9e1d9dc715452406cfeaaedbb36cd63011beb
                                                    • Opcode Fuzzy Hash: 56e182c2ea93ab346aed10c49401d6d1d92209f840293495682b8505d5284111
                                                    • Instruction Fuzzy Hash: 70F01771545B449E83309F6E9481847FBE4FE28320390CE2FE1DEC3A12D734A508CBAA

                                                    Execution Graph

                                                    Execution Coverage:7.6%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:100%
                                                    Total number of Nodes:18
                                                    Total number of Limit Nodes:0
                                                    execution_graph 33395 5126c30 33396 5126c78 NtQueryVolumeInformationFile 33395->33396 33398 5126cb6 33396->33398 33399 51263f0 33400 5126430 NtClose 33399->33400 33402 5126461 33400->33402 33411 51264a0 33412 51264ee NtProtectVirtualMemory 33411->33412 33414 5126538 33412->33414 33415 51268c0 33416 512690e NtOpenFile 33415->33416 33418 5126958 33416->33418 33403 5126578 33404 51265c3 NtAllocateVirtualMemory 33403->33404 33406 512660a 33404->33406 33407 5126cf8 33408 5126d40 NtDeviceIoControlFile 33407->33408 33410 5126d8d 33408->33410
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $t&$)!9$3Q35$7?):$9Z1l$<G,;$<|#`$=l'$?i06$KUM$`A(
                                                    • API String ID: 0-3830134425
                                                    • Opcode ID: 7337430ff6bf7243af96e367e3545ab9049ed0a2c857ed751705a4cbfb6599f4
                                                    • Instruction ID: 2df42081eff04c51ef9cb5ed75cdf936f4d7b08c47bcaf21a43a56b95226230b
                                                    • Opcode Fuzzy Hash: 7337430ff6bf7243af96e367e3545ab9049ed0a2c857ed751705a4cbfb6599f4
                                                    • Instruction Fuzzy Hash: A1F3F7B4E006298FCB69DF68C8516AEB7B2FF89300F4049A9D519B7341DB75AE81CF44
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $t&$)!9$3Q35$7?):$9Z1l$<G,;$<|#`$=l'$?i06$KUM$`A(
                                                    • API String ID: 0-3830134425
                                                    • Opcode ID: 99d6d6f58b50f9c5f7630d9c15a7f127dce56cb4442cd036433215d4d57bbc14
                                                    • Instruction ID: 35c7117ebac68a33f52e083201ed8e28621fdb780a1d2a08aa42fafe3c2dbc48
                                                    • Opcode Fuzzy Hash: 99d6d6f58b50f9c5f7630d9c15a7f127dce56cb4442cd036433215d4d57bbc14
                                                    • Instruction Fuzzy Hash: 7EF3E7B4E006298FCB69DF68C8516AEB7B2FF89300F4049A9D519B7341DB75AE81CF44

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1866 efe008-efe01c 1867 efe01f-efe04f call ef96e8 1866->1867 1870 efe051-efe072 call efa830 1867->1870 1872 efe077-efe07f 1870->1872 1872->1870 1873 efe081-efe0a2 1872->1873 1875 efe12f-efe158 1873->1875 1876 efe0a8-efe121 call ef8e48 1873->1876 1879 efe15a-efe1c7 call ef8e48 1875->1879 1880 efe1c8-efe1de 1875->1880 1876->1867 1903 efe127-efe12e 1876->1903 1885 efe250-efe252 1880->1885 1886 efe1e0-efe1e6 1880->1886 1885->1870 1887 efe258-efe291 1885->1887 1886->1873 1888 efe1ec-efe24f call ef8e48 1886->1888 1904 efe293-efe2a1 call ef8e10 1887->1904 1910 efe2d6-efe2ec 1904->1910 1911 efe2a3-efe2ab 1904->1911 1911->1904 1913 efe2ad-efe2d4 1911->1913 1913->1910 1918 efe2ed-efe317 1913->1918
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (oq$Hq$\sq$;q
                                                    • API String ID: 0-2495020057
                                                    • Opcode ID: 307467a4196645911b9cade9f096d57a698e592ad4d5180602548907d5e1e216
                                                    • Instruction ID: 59379e880b761ccd2b3ffb4391bf88b32460b8b6452a10600d766ac65ec2de35
                                                    • Opcode Fuzzy Hash: 307467a4196645911b9cade9f096d57a698e592ad4d5180602548907d5e1e216
                                                    • Instruction Fuzzy Hash: 6381D136F012288FCB18EB7DD8555ADB7E6AFC921071941AAE909FB361DE309C06C790

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2162 efa1cd-efa1d7 2163 efa1dc 2162->2163 2164 efa1de-efa1f7 2163->2164 2165 efa2a3-efa2bd 2164->2165 2166 efa1fc-efa20d 2165->2166 2167 efa2c3 2165->2167 2169 efa20f-efa214 2166->2169 2170 efa21c-efa225 2166->2170 2168 efa2c9-efa2d5 2167->2168 2168->2163 2173 efa2db-efa2dd 2168->2173 2169->2170 2171 efa22b-efa23a 2170->2171 2172 efa4c0-efa4e2 2170->2172 2171->2163 2174 efa23c-efa262 2171->2174 2178 efa4e4-efa4fc 2172->2178 2175 efa48a-efa4b0 2173->2175 2176 efa2e3-efa303 2173->2176 2182 efa264-efa278 2174->2182 2183 efa290-efa2a0 2174->2183 2175->2164 2184 efa4b6-efa4bd 2175->2184 2186 efa30c-efa32b 2176->2186 2198 efa504-efa50f 2178->2198 2182->2183 2191 efa27a-efa288 2182->2191 2183->2165 2186->2165 2187 efa331 2186->2187 2190 efa415-efa432 2187->2190 2192 efa438 2190->2192 2193 efa336-efa34d 2190->2193 2191->2163 2194 efa28e 2191->2194 2195 efa43e-efa444 2192->2195 2196 efa34f-efa354 2193->2196 2197 efa35c-efa36e 2193->2197 2194->2168 2195->2163 2199 efa44a-efa454 2195->2199 2196->2197 2197->2172 2201 efa374-efa381 2197->2201 2198->2178 2200 efa511-efa523 2198->2200 2199->2175 2202 efa456-efa484 2199->2202 2203 efa546-efa54b 2200->2203 2204 efa525-efa544 2200->2204 2201->2166 2205 efa387-efa3b2 2201->2205 2202->2175 2204->2198 2204->2203 2208 efa3b4-efa3c2 2205->2208 2209 efa3f0-efa3fc 2205->2209 2208->2164 2211 efa3c8-efa3ee 2208->2211 2209->2163 2210 efa402-efa40f 2209->2210 2210->2190 2211->2195
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 2g.$7E"7
                                                    • API String ID: 0-2029250814
                                                    • Opcode ID: 845f55857d6293f0cb75062c90764e372f7ff0f5b5d72e6767509cd74ea79498
                                                    • Instruction ID: cb62c3d1b089d27434f240155b15eda6ee44706a196d0f73617c84170480960d
                                                    • Opcode Fuzzy Hash: 845f55857d6293f0cb75062c90764e372f7ff0f5b5d72e6767509cd74ea79498
                                                    • Instruction Fuzzy Hash: 8CA190B6E102298FCB14DFA8C4845AEB7F2AB58310B1A857AD959FB351D730DC42CBD1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2587 ef8f98-ef8fac 2588 ef8fb3-ef9053 2587->2588 2594 ef907f-ef90ae 2588->2594 2595 ef9055-ef9058 2588->2595 2599 ef90b4-ef90bf 2594->2599 2595->2594 2596 ef905a-ef9077 2595->2596 2596->2594 2602 ef93ae-ef93b4 2599->2602 2603 ef90c5-ef90e1 2599->2603 2604 ef9156-ef917b 2603->2604 2605 ef90e3-ef910c 2603->2605 2606 ef9344-ef935f 2604->2606 2608 ef9181-ef91d5 2604->2608 2605->2606 2607 ef9112-ef9119 2605->2607 2606->2588 2610 ef9365-ef9373 2606->2610 2607->2603 2609 ef911b-ef9150 2607->2609 2608->2603 2617 ef91db-ef920d 2608->2617 2609->2603 2609->2604 2610->2602 2612 ef9375-ef938a 2610->2612 2612->2609 2613 ef9390-ef93a6 2612->2613 2613->2602 2617->2588 2621 ef9213-ef925b 2617->2621 2621->2588 2622 ef9261 2621->2622 2623 ef92fd-ef9311 2622->2623 2623->2605 2624 ef9317-ef9337 2623->2624 2625 ef933d 2624->2625 2626 ef9266-ef92c0 2624->2626 2625->2606 2627 ef92c6-ef92f6 2626->2627 2628 ef93b5-ef93f4 2626->2628 2627->2623 2630 ef93f9-ef9419 2628->2630 2631 ef941f-ef942c 2630->2631 2632 ef9614-ef9620 2630->2632 2634 ef942f-ef9453 2631->2634 2633 ef9626-ef9633 2632->2633 2633->2631 2635 ef9639-ef9648 2633->2635 2634->2630 2636 ef9455 2634->2636 2637 ef964a-ef964c 2635->2637 2638 ef9650-ef9653 2635->2638 2639 ef95b3-ef95bf 2636->2639 2640 ef964e 2637->2640 2641 ef965d 2637->2641 2638->2641 2642 ef9655-ef965c 2638->2642 2639->2630 2643 ef95c5-ef95df 2639->2643 2640->2642 2648 ef9662-ef9676 2641->2648 2644 ef945a-ef9463 2643->2644 2645 ef95e5 2643->2645 2646 ef967d-ef9696 2644->2646 2647 ef9469-ef94ab 2644->2647 2649 ef95eb-ef95f2 2645->2649 2650 ef94ad-ef94bb 2647->2650 2651 ef94f6-ef9507 2647->2651 2648->2646 2649->2633 2652 ef95f4-ef960d 2649->2652 2650->2634 2654 ef94c1-ef94c3 2650->2654 2655 ef950d-ef9519 2651->2655 2656 ef9598-ef95ad 2651->2656 2652->2648 2658 ef960f 2652->2658 2654->2649 2659 ef94c9-ef94e5 2654->2659 2655->2630 2660 ef951f-ef954d 2655->2660 2656->2639 2658->2631 2659->2639 2661 ef94eb-ef94f1 2659->2661 2660->2656 2662 ef954f-ef9563 2660->2662 2661->2649 2662->2639 2664 ef9565-ef9596 2662->2664 2664->2649
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: f|VS
                                                    • API String ID: 0-2086739051
                                                    • Opcode ID: 6921a26ed39a4a3f1af7a23cfe63bc9e1154c042cd48dba8738d3da8f3991e44
                                                    • Instruction ID: 3a23b91df7bac01089d8767e0bda4f00b8eb5b0c4fd8e5c03ff2217cb3cd65a3
                                                    • Opcode Fuzzy Hash: 6921a26ed39a4a3f1af7a23cfe63bc9e1154c042cd48dba8738d3da8f3991e44
                                                    • Instruction Fuzzy Hash: 0D226B75E0021A8FDB14DFA9C9816AEB7F1BF88304F15816AD925FB251D738AD06CF90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2665 5126498-5126536 NtProtectVirtualMemory 2668 5126538-512653e 2665->2668 2669 512653f-5126564 2665->2669 2668->2669
                                                    APIs
                                                    • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 05126529
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3748622337.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_5120000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID: MemoryProtectVirtual
                                                    • String ID:
                                                    • API String ID: 2706961497-0
                                                    • Opcode ID: 75b52233b44f1e16e571ee180b9dbb0d35c0bf8c7db4e696d2dc3bd1d6bf1cb5
                                                    • Instruction ID: f575155e3fa111cc552304449715ffd6973d02f2074ed428a67b3dff0a01fa42
                                                    • Opcode Fuzzy Hash: 75b52233b44f1e16e571ee180b9dbb0d35c0bf8c7db4e696d2dc3bd1d6bf1cb5
                                                    • Instruction Fuzzy Hash: 892115B1D013499FCB10CFAAD980AEEFBF1BF48314F20842EE419A3240C7759915CB65

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2673 51268bb-5126956 NtOpenFile 2676 5126958-512695e 2673->2676 2677 512695f-5126984 2673->2677 2676->2677
                                                    APIs
                                                    • NtOpenFile.NTDLL(?,?,?,?,?,?), ref: 05126949
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3748622337.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_5120000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID: FileOpen
                                                    • String ID:
                                                    • API String ID: 2669468079-0
                                                    • Opcode ID: 4aeb61353addb7fb439757bebcffbac35b5a727f75aa72e8dc2a22c370b81213
                                                    • Instruction ID: 1432f070c49c41eb31ac0b5f862ed68dbeaf335f4e2df197e9c6768d0939d6f6
                                                    • Opcode Fuzzy Hash: 4aeb61353addb7fb439757bebcffbac35b5a727f75aa72e8dc2a22c370b81213
                                                    • Instruction Fuzzy Hash: 762127B1D01259AFCF10CFAAD980AEEFBB4FF48314F10801AE518A7240CB755915CFA4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2692 5126570-5126574 2693 5126576-51265c9 2692->2693 2694 51265cc-5126608 NtAllocateVirtualMemory 2692->2694 2693->2694 2697 5126611-5126636 2694->2697 2698 512660a-5126610 2694->2698 2698->2697
                                                    APIs
                                                    • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 051265FB
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3748622337.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_5120000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID: AllocateMemoryVirtual
                                                    • String ID:
                                                    • API String ID: 2167126740-0
                                                    • Opcode ID: bad41ffab7d5e4b63c7377d59d181fad5d4efb070577964cfec6f8b99215522a
                                                    • Instruction ID: ceec538ac66474fc97068532cd71f6e044c70bc2d86d7842a0768efa86beca89
                                                    • Opcode Fuzzy Hash: bad41ffab7d5e4b63c7377d59d181fad5d4efb070577964cfec6f8b99215522a
                                                    • Instruction Fuzzy Hash: 202124B1D002589FCF10CFAAC881AEEFBF1BF48214F10841AE919A3250CB359954CBA4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2681 51263c8-512645f NtClose 2687 5126461-5126467 2681->2687 2688 5126468-512648d 2681->2688 2687->2688
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3748622337.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_5120000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID: Close
                                                    • String ID:
                                                    • API String ID: 3535843008-0
                                                    • Opcode ID: f865befa7029d19096f7075d4d07b6be63bbcd6e590212d953624ace3ebb0cb2
                                                    • Instruction ID: 42176adc797cd1efe8e2e040426f924cbb287ac2a5c2fdd90a80d43ca5484682
                                                    • Opcode Fuzzy Hash: f865befa7029d19096f7075d4d07b6be63bbcd6e590212d953624ace3ebb0cb2
                                                    • Instruction Fuzzy Hash: 0A215871C043988FDB21DFAAC8447EEBBF4EF89224F14845AD055AB241CB385845CBA9

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2702 51264a0-5126536 NtProtectVirtualMemory 2705 5126538-512653e 2702->2705 2706 512653f-5126564 2702->2706 2705->2706
                                                    APIs
                                                    • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 05126529
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3748622337.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_5120000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID: MemoryProtectVirtual
                                                    • String ID:
                                                    • API String ID: 2706961497-0
                                                    • Opcode ID: ddf64d49687a9392b05e0cb85e639fad88e32d6e0d93650173cd1453fdbc8e1e
                                                    • Instruction ID: 4b147f63ac19cef0ba3d0f88b1c51204c36ae79741b7c33ad6dbdbde0f47b0c3
                                                    • Opcode Fuzzy Hash: ddf64d49687a9392b05e0cb85e639fad88e32d6e0d93650173cd1453fdbc8e1e
                                                    • Instruction Fuzzy Hash: BD21F0B1D013499FDB10CFAAD980AAEFBF5BF48314F20842EE519A7240C7759910CBA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2718 5126cf3-5126d8b NtDeviceIoControlFile 2721 5126d94-5126db9 2718->2721 2722 5126d8d-5126d93 2718->2722 2722->2721
                                                    APIs
                                                    • NtDeviceIoControlFile.NTDLL(?,?,?,?,00000000,?,?,?,?,?), ref: 05126D7E
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3748622337.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_5120000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceFile
                                                    • String ID:
                                                    • API String ID: 3512290074-0
                                                    • Opcode ID: 8cace33747c01a519257c2ab8d85da0226ea8c4cc2afecd22eeba1ba9ceb4f53
                                                    • Instruction ID: 95bc10d283d5df50331d8f7ad16a82e16c4c99ffb2d4d0955017f117ee9488ae
                                                    • Opcode Fuzzy Hash: 8cace33747c01a519257c2ab8d85da0226ea8c4cc2afecd22eeba1ba9ceb4f53
                                                    • Instruction Fuzzy Hash: C3212376C002489FDF21CFAAC840AEEBBF1FF48314F14841AE959A7250CB399955CFA4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2710 51268c0-5126956 NtOpenFile 2713 5126958-512695e 2710->2713 2714 512695f-5126984 2710->2714 2713->2714
                                                    APIs
                                                    • NtOpenFile.NTDLL(?,?,?,?,?,?), ref: 05126949
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3748622337.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_5120000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID: FileOpen
                                                    • String ID:
                                                    • API String ID: 2669468079-0
                                                    • Opcode ID: e475bb7368d0f5d8f52b0089738757bcb0b12bc439ee054046facdc9e687741e
                                                    • Instruction ID: 6c13ba0d3e6359588f5776e8ec81f170d83fdec4c7994c84964e6f1180a716ba
                                                    • Opcode Fuzzy Hash: e475bb7368d0f5d8f52b0089738757bcb0b12bc439ee054046facdc9e687741e
                                                    • Instruction Fuzzy Hash: D42103B1D01219AFDF10CFAAD980ADEFBF4FF08314F10842AE918A7240CB759954CBA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2726 5126cf8-5126d8b NtDeviceIoControlFile 2729 5126d94-5126db9 2726->2729 2730 5126d8d-5126d93 2726->2730 2730->2729
                                                    APIs
                                                    • NtDeviceIoControlFile.NTDLL(?,?,?,?,00000000,?,?,?,?,?), ref: 05126D7E
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3748622337.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_5120000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID: ControlDeviceFile
                                                    • String ID:
                                                    • API String ID: 3512290074-0
                                                    • Opcode ID: 8ea875a5e74a8d1e08a9f4a4350bbcbe45f4614bf4bc2d05398cf51550e3915b
                                                    • Instruction ID: 822feeabe0f097c4e69411fb687810d7af38d85a067d71ccbaa6bd109074c7d8
                                                    • Opcode Fuzzy Hash: 8ea875a5e74a8d1e08a9f4a4350bbcbe45f4614bf4bc2d05398cf51550e3915b
                                                    • Instruction Fuzzy Hash: 322134768002089FDF10CFAAC840AEEBBF5FF48314F14841AE919A3210CB39A950CFA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2734 5126578-5126608 NtAllocateVirtualMemory 2738 5126611-5126636 2734->2738 2739 512660a-5126610 2734->2739 2739->2738
                                                    APIs
                                                    • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 051265FB
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3748622337.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_5120000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID: AllocateMemoryVirtual
                                                    • String ID:
                                                    • API String ID: 2167126740-0
                                                    • Opcode ID: cf9b00da8311188fdc69ad652a659685daf2a41d880d4b1c2c1b27fbc9dd5e95
                                                    • Instruction ID: 750ceb6295741739e5d0446199e8c8b66ae9c9db8efc73be3a6138543ef27d92
                                                    • Opcode Fuzzy Hash: cf9b00da8311188fdc69ad652a659685daf2a41d880d4b1c2c1b27fbc9dd5e95
                                                    • Instruction Fuzzy Hash: 012112B1D003589FDF10CFAAC880ADEFBF5BF48314F10842AE919A7250CB799954CBA5
                                                    APIs
                                                    • NtQueryVolumeInformationFile.NTDLL(?,?,?,?,?), ref: 05126CA7
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3748622337.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_5120000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID: FileInformationQueryVolume
                                                    • String ID:
                                                    • API String ID: 634242254-0
                                                    • Opcode ID: 6cc90fed1880bb5721e76e26f3f863ac62e795ecfa9b7db581a78040c47ff2ad
                                                    • Instruction ID: 84e59d68efc63a3d041abee8d4e1ebc0d9c53f48b47051b64db7d6ac13d6bdd5
                                                    • Opcode Fuzzy Hash: 6cc90fed1880bb5721e76e26f3f863ac62e795ecfa9b7db581a78040c47ff2ad
                                                    • Instruction Fuzzy Hash: 4F213475C002488FDB14DFAAC940BEEBBF4AF48324F14842AE819A7650CB799940CFA5
                                                    APIs
                                                    • NtQueryVolumeInformationFile.NTDLL(?,?,?,?,?), ref: 05126CA7
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3748622337.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_5120000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID: FileInformationQueryVolume
                                                    • String ID:
                                                    • API String ID: 634242254-0
                                                    • Opcode ID: 985907eff7de091f4d4b5c94e4346622209e85f905dcbd6f206ac5aaa4c8a7d5
                                                    • Instruction ID: 9b6b99348baa4c5849deb7914a14d715d082cbc1babb32c09875da7318664be1
                                                    • Opcode Fuzzy Hash: 985907eff7de091f4d4b5c94e4346622209e85f905dcbd6f206ac5aaa4c8a7d5
                                                    • Instruction Fuzzy Hash: F2210471D002489FDB14DFAAC840BAEBBF4AF48214F14841AE419A7250CB799954CBA5
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3748622337.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_5120000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID: Close
                                                    • String ID:
                                                    • API String ID: 3535843008-0
                                                    • Opcode ID: 8c0a73f8cfc31af39329e1ed78b0eab10f131bf9edc3be5a3a08c6cd6db8f48c
                                                    • Instruction ID: 85604d7cdac7e82041a2e28e48ce943432c360a4a059d6e78666a6527acceecb
                                                    • Opcode Fuzzy Hash: 8c0a73f8cfc31af39329e1ed78b0eab10f131bf9edc3be5a3a08c6cd6db8f48c
                                                    • Instruction Fuzzy Hash: 171128B1D003488FDB24DFAAC8447AEFBF4AB48224F24841AD459A7640CB79A944CBA5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Hq
                                                    • API String ID: 0-1594803414
                                                    • Opcode ID: 4a3ef993fbf3b6af38ec84bc09f5b85907846aa8aceb8a0b040cc1751f90844d
                                                    • Instruction ID: dc744677300f65fabedfa8290b17651fce1e7ff650f5934ad927ae352dc3b7a7
                                                    • Opcode Fuzzy Hash: 4a3ef993fbf3b6af38ec84bc09f5b85907846aa8aceb8a0b040cc1751f90844d
                                                    • Instruction Fuzzy Hash: ED81C436F052598FC704DF78C8544ADBBF2EF8A31471540AAE949EB362DB359C06CB91
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: efd71bdbcd41d1ccbd0609ae1de03221d8304ae7c2ee1f9b2524de0680fd9c36
                                                    • Instruction ID: aa1836ab0cdd6ccedb2b8c53a2a369d624cc71dc32ed6abad386b670875391a9
                                                    • Opcode Fuzzy Hash: efd71bdbcd41d1ccbd0609ae1de03221d8304ae7c2ee1f9b2524de0680fd9c36
                                                    • Instruction Fuzzy Hash: F4D1AE39B405248F8B58EB3DD89857EB6E6AFCC75031554A9EA0AFB361DF70DC058B80
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3b39fcd8662c0a33626879bf358fad52630f24fc27ab17af1893b78a2dc292c9
                                                    • Instruction ID: d4f32b991fcbf1f467f4e796e26834a88854cba94859ad0f3c032d3436d768bf
                                                    • Opcode Fuzzy Hash: 3b39fcd8662c0a33626879bf358fad52630f24fc27ab17af1893b78a2dc292c9
                                                    • Instruction Fuzzy Hash: D6C1F632F4012D8B8B18AA3D496527EA5D39FC870033A6579EE0BFB381EE61CC1647C1
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 064121763ecdd247138b7b2e17fe999d879d2ed01119b60d6ce50bff634ddf51
                                                    • Instruction ID: 84bc154363f6b74a948f798675b5dc828c50c26a1ab94241986fea14ef4503ab
                                                    • Opcode Fuzzy Hash: 064121763ecdd247138b7b2e17fe999d879d2ed01119b60d6ce50bff634ddf51
                                                    • Instruction Fuzzy Hash: 93C18F71B003098FCB18DFB9C8D46ADBBF2AF89304B659169E505EB362DB709C46CB50
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 812f6514247967616e13588a69905789d53c5bbd10ddeddb76c6d046f9ae0293
                                                    • Instruction ID: a02281ff6db4b84a027416d6d20b77303e4f7074a6721ce627595b96331daea0
                                                    • Opcode Fuzzy Hash: 812f6514247967616e13588a69905789d53c5bbd10ddeddb76c6d046f9ae0293
                                                    • Instruction Fuzzy Hash: DAB1E875E0020A8FDB54DFAAD9916EEBBF1FF88304F108069D425EB251D7389A46CF90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2213 efc980-efc988 2214 efc98a-efc998 call ef8e10 2213->2214 2217 efc99a-efc9a6 2214->2217 2218 efc9f3-efca11 2214->2218 2217->2214 2219 efc9a8-efc9b8 2217->2219 2223 efc9ba-efc9c0 2218->2223 2226 efca13-efca25 2218->2226 2219->2223 2223->2218 2227 efc9c1-efc9d6 2223->2227 2228 efca27-efca50 2226->2228 2264 efc9d9 call efc980 2227->2264 2265 efc9d9 call efc970 2227->2265 2231 efca59-efca61 2228->2231 2232 efca52 2228->2232 2229 efc9df-efc9ec 2229->2214 2239 efc9ee-efc9f2 2229->2239 2231->2228 2238 efca63 2231->2238 2232->2231 2234 efcacf-efcad5 2232->2234 2235 efcafd-efcb1e call efc7b0 2232->2235 2236 efca68-efca6e 2232->2236 2237 efca96-efcaa7 2232->2237 2234->2228 2242 efcadb-efcafc call efc7b0 2234->2242 2236->2235 2243 efca74-efca80 2236->2243 2237->2228 2240 efcaad-efcace call ef97f8 2237->2240 2241 efcb1f-efcb31 2238->2241 2241->2241 2245 efcb33-efcb4f 2241->2245 2252 efca87-efca95 call ef97f8 2243->2252 2264->2229 2265->2229
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 78j$Hq
                                                    • API String ID: 0-36752102
                                                    • Opcode ID: 1d000a1bd459ed1672c394771b6ad30b4731b4d5f0cfa8399d45d3d802d7e9dc
                                                    • Instruction ID: 4428cbf90a19d93d00d8343db2acbea9e400ed305767ce516803bf1966794ced
                                                    • Opcode Fuzzy Hash: 1d000a1bd459ed1672c394771b6ad30b4731b4d5f0cfa8399d45d3d802d7e9dc
                                                    • Instruction Fuzzy Hash: 8941782770061C1BDA1CA678A86117EA6D79BC5350338957EE70BFB781DE149D0A83D1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2297 efa830-efa872 2299 efa874-efa891 2297->2299 2300 efa8a3-efa8c9 2297->2300 2301 efa898-efa89b 2299->2301 2302 efa893 2299->2302 2304 efa90b-efa922 2300->2304 2305 efa8cb-efa8cf 2300->2305 2301->2300 2302->2301 2311 efa928-efa955 2304->2311 2306 efa8d1-efa8da 2305->2306 2307 efa8f0 2305->2307 2308 efa8dc-efa8df 2306->2308 2309 efa8e1-efa8e4 2306->2309 2310 efa8f3-efa909 2307->2310 2312 efa8ee 2308->2312 2309->2312 2313 efa973-efa979 2310->2313 2311->2300 2317 efa95b-efa971 2311->2317 2312->2310 2314 efa97b 2313->2314 2315 efa983 2313->2315 2314->2315 2318 efa984 2315->2318 2317->2313 2318->2318
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: \;q$\;q
                                                    • API String ID: 0-1260801691
                                                    • Opcode ID: ae005eb9f8e1af144183ed424570aeabd97ea500bb1d93847781256189308071
                                                    • Instruction ID: d5e5b0f7dd2767de63a7bc494720e2010daf04cbb15924848544a00639747c48
                                                    • Opcode Fuzzy Hash: ae005eb9f8e1af144183ed424570aeabd97ea500bb1d93847781256189308071
                                                    • Instruction Fuzzy Hash: 3931E3B1E1021D9BDB15DA99C444BBEBBF2AB88344F195079D505FF350DAB09D01CB91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3749859669.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_62a0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $q
                                                    • API String ID: 0-1301096350
                                                    • Opcode ID: 651de7ff973020d165de78e2ab33dd0ac4832a5c55b24fc101e157353983802d
                                                    • Instruction ID: 2ca590cae1a257d524605b2e13fe487ff13214c48f69e62295a94a081af00b84
                                                    • Opcode Fuzzy Hash: 651de7ff973020d165de78e2ab33dd0ac4832a5c55b24fc101e157353983802d
                                                    • Instruction Fuzzy Hash: 43929034A20201CFD755DB58D599A69B7F2FF89314F19C4A9E85A8F396CB72EC02CB40
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 8@%^
                                                    • API String ID: 0-6368902
                                                    • Opcode ID: 3424d6721ba97de3462fe7ec31dc422aa271fe36d807111a0017a666ec53e739
                                                    • Instruction ID: ad6510d346381e74d42d7c5f7f857f9be7ba36949d3a045a2e9db743095c66d3
                                                    • Opcode Fuzzy Hash: 3424d6721ba97de3462fe7ec31dc422aa271fe36d807111a0017a666ec53e739
                                                    • Instruction Fuzzy Hash: 18110A347013188FC728DFB9C994A6CB7B1AF88318B194569D905EB725DB71EC42CB11
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 78j
                                                    • API String ID: 0-810992010
                                                    • Opcode ID: b2ee767cc923baf03ed81676b2065f66a68717f904e79c1f76daaa23b2630ff1
                                                    • Instruction ID: b2796bbeaac0f19290c24ef7ac48f8adf58f2581319db2bfacbfb1bc16fa43f7
                                                    • Opcode Fuzzy Hash: b2ee767cc923baf03ed81676b2065f66a68717f904e79c1f76daaa23b2630ff1
                                                    • Instruction Fuzzy Hash: 6E019E33E016681BE72097659CC08B9F7E56DC672036A437ACE58BB251CE80CC05C7D0
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3749859669.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_62a0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b4d272e1f063dea2264d9ddb68ef58b95ea2dc85d4cb18eccb2990df1be71c64
                                                    • Instruction ID: d34f9be9892fca2374fde65a118e2063f3208cf1bfa58bf26a454836fc55af33
                                                    • Opcode Fuzzy Hash: b4d272e1f063dea2264d9ddb68ef58b95ea2dc85d4cb18eccb2990df1be71c64
                                                    • Instruction Fuzzy Hash: 4C024C34A10201DFD744DB54CA95EA9B7F2FB88314F19C099E949AB392CBB2ED42CB50
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b322c610f6d9084a17db009e75600019db2c4f9ebdef3328be3ee56465041900
                                                    • Instruction ID: d74d70e00ea2da8ece5bdc6c92dec6458654268189bd15926c4dc5380f371f7d
                                                    • Opcode Fuzzy Hash: b322c610f6d9084a17db009e75600019db2c4f9ebdef3328be3ee56465041900
                                                    • Instruction Fuzzy Hash: EB512A307002159BD714EB34C591AAE77A6FF80324B909634D525BFAE0DF34AE06C7D1
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9295782d8daaba0dfc4c67d99e9a803e15a33830dc120873689f6e643525cf96
                                                    • Instruction ID: 8e0b91b22c625a2668bba44ec44a5156812c811f15410c9eb6f544e50c1fc263
                                                    • Opcode Fuzzy Hash: 9295782d8daaba0dfc4c67d99e9a803e15a33830dc120873689f6e643525cf96
                                                    • Instruction Fuzzy Hash: 00518136F001298F8B08DF69D8845ADB7F6BF88310B5590AAE905FB361DB31DD01CB90
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3749859669.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_62a0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7d125d139ba151a9eb8528e1184e7b4d60b1ba8f6d971de8cdb1d3d41dc81c5a
                                                    • Instruction ID: b0dd33f97be4a9f378e10d20fe1cd9e7c745bc1ac3fe1f9e6a18a2bf47609a35
                                                    • Opcode Fuzzy Hash: 7d125d139ba151a9eb8528e1184e7b4d60b1ba8f6d971de8cdb1d3d41dc81c5a
                                                    • Instruction Fuzzy Hash: F151C134B202058FEB94DF64D955AAEBBF2EB88314F048429E806DB390DB70AD46CB51
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1e67a3fcb494078315ff3fa1bda589e37d1722b90c55f5bb6bed1e97e5d10c19
                                                    • Instruction ID: 7beff009a6cca011440da31921f5b66ae41754dc391f96970b87bf1f324f0d36
                                                    • Opcode Fuzzy Hash: 1e67a3fcb494078315ff3fa1bda589e37d1722b90c55f5bb6bed1e97e5d10c19
                                                    • Instruction Fuzzy Hash: E1416B71F092958FCB05CB68C9852BEBFF2AF89200F2954ABD945EB292D674CC058791
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3749859669.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_62a0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2ab775a8a36bd7a3ecfc3bd49e3dc8eddb082fcb84fca28f9b48d940c85485c0
                                                    • Instruction ID: 241b66bb9e9664c2df2f5f8e7a23d3ea23002cfba3966854926c51d7ae02c3ab
                                                    • Opcode Fuzzy Hash: 2ab775a8a36bd7a3ecfc3bd49e3dc8eddb082fcb84fca28f9b48d940c85485c0
                                                    • Instruction Fuzzy Hash: 78418334B202059FEB94DF64D955BAEBBF2EB88714F048425E806EB394DB70AD41CF91
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 068019881cdb54b5a5b0e72b864fc8c36fcd1553159350cd9da5e056eb7064db
                                                    • Instruction ID: 08c32c80a0097c0752ce5375c33e005681f7b479857fecc06652d7381a4bc670
                                                    • Opcode Fuzzy Hash: 068019881cdb54b5a5b0e72b864fc8c36fcd1553159350cd9da5e056eb7064db
                                                    • Instruction Fuzzy Hash: 6431F23BB101204F87089F79D8914ADB7E6EFC926435A50EAE909EF362DF31DC058B90
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a29e7f7c940382e16ddd16efb106a9bcfe2f3b5a110293b2cc4d5a1e8d446ca3
                                                    • Instruction ID: 00132500848e29b5e799f973dee19dbc236ca342a701cb7b84824bb4e35386ca
                                                    • Opcode Fuzzy Hash: a29e7f7c940382e16ddd16efb106a9bcfe2f3b5a110293b2cc4d5a1e8d446ca3
                                                    • Instruction Fuzzy Hash: 45412A34A00309CFCB18CF65D594AAEBBB6AF89314F254569E905BB361DB71EC86CF40
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 58ff1454e46ebf2aba13dca328136386f6d13cea91834d2f5fc44242faa2bb56
                                                    • Instruction ID: f6a8860ad4262392717970437dda66aa2a9decf8d1d97104706034c9bf828c62
                                                    • Opcode Fuzzy Hash: 58ff1454e46ebf2aba13dca328136386f6d13cea91834d2f5fc44242faa2bb56
                                                    • Instruction Fuzzy Hash: C6314B73E146694FC711CB6DC8406A9BBF5AF49210B0B41EADC45FB7A2D2209C1AC7D0
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b81203b7dce35ac9576f4c9788358f3be86ff16f666c58ce35ad99e40adde9e2
                                                    • Instruction ID: 380e5ada4d33eaf1848769df923dd20bdb247c4ed51014d3db06a01b6fb21b90
                                                    • Opcode Fuzzy Hash: b81203b7dce35ac9576f4c9788358f3be86ff16f666c58ce35ad99e40adde9e2
                                                    • Instruction Fuzzy Hash: 4D31B1B5F142198BCB04DA99C9404BEFBF2AFCD300F25956BEA05E7390DA74DE018B94
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dbc962335a98826b7d168b5fe5426f48940cccef7c8207b6bcb5328c643e6fef
                                                    • Instruction ID: bb25b09df39dbd47cfc25dda496842a087e57ef6660793d74a3997179b50cd9b
                                                    • Opcode Fuzzy Hash: dbc962335a98826b7d168b5fe5426f48940cccef7c8207b6bcb5328c643e6fef
                                                    • Instruction Fuzzy Hash: 6221C277E105294FC710CA5DD8845AAB7E6AF8825074B82AADC09FB3A1E6709D15CBD0
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e2a335ec84b7b815b93e5b5e930acadb3c227b0b18ddf87c1313c60bc8b4d14f
                                                    • Instruction ID: 361d4e57c2c47760e6e2dd5fe4895ccb4673028b2472fa2a64293685cdfc5f3d
                                                    • Opcode Fuzzy Hash: e2a335ec84b7b815b93e5b5e930acadb3c227b0b18ddf87c1313c60bc8b4d14f
                                                    • Instruction Fuzzy Hash: BE217A316006098FDB15CF56D8C0979F7B2FB84314708892AEA29AB760C730FC11CB90
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d85eab199373ac61dd9cacb5e1c2176ad8909840648ec9d0574c3375a7e43218
                                                    • Instruction ID: 0fef0322dcc894065f6d8de00fafffdd331359c565ed3b5bddd11217f3d90c53
                                                    • Opcode Fuzzy Hash: d85eab199373ac61dd9cacb5e1c2176ad8909840648ec9d0574c3375a7e43218
                                                    • Instruction Fuzzy Hash: A5213573D0022A9FCB14AFB1C8444AEB7B2FB413143864669ED18B7702C739AC91CBC1
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3749859669.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_62a0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d3f8cbe252fa0888cb1531f8a70ec810cbcc10a513ec8c86a55d26609420b366
                                                    • Instruction ID: 3d4ffdf51631ba593a2c912cdb7a4eef4cd60ef449ab8c5417b6fb92c0e32e6f
                                                    • Opcode Fuzzy Hash: d3f8cbe252fa0888cb1531f8a70ec810cbcc10a513ec8c86a55d26609420b366
                                                    • Instruction Fuzzy Hash: BD21D631604245AFC702CF54E951F95BBB5EF89314F0884AAE5488F252CB76EC16C7A0
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 66c95486cf5e5cb8d91cd5c55e3c2ad214aef80b63064878b3655e30f916ab3f
                                                    • Instruction ID: a015c9898ff3a4782d2e03e11940c67b4d780098d8fbe28929e7260a299a0171
                                                    • Opcode Fuzzy Hash: 66c95486cf5e5cb8d91cd5c55e3c2ad214aef80b63064878b3655e30f916ab3f
                                                    • Instruction Fuzzy Hash: 5111B232B01A149FC7149B38D4549B87BF1BF8A36035A41FAE94ADB772CB21DC46CB80
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 501d0b32f0909cd21821967c3e028a3c1f1da5e8cf2bcf7f95493e378732f190
                                                    • Instruction ID: d0e6faa3f211cc1f3faa4ffcb149e80db621fe9ba962ea61300a6ff852a9545c
                                                    • Opcode Fuzzy Hash: 501d0b32f0909cd21821967c3e028a3c1f1da5e8cf2bcf7f95493e378732f190
                                                    • Instruction Fuzzy Hash: 42210D387012149FCB18DF78C495959BBF6EF8D320B1985A9E80AEB761CB71EC46CB50
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3749859669.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_62a0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e6fd0733db5f82f469912a100b656cb9bfb5239d7895140210ab516bda387727
                                                    • Instruction ID: 72cf9d4eaf368a272a60bbc06af9de1e181a5ade1c47c16c3d5e22f42c83172e
                                                    • Opcode Fuzzy Hash: e6fd0733db5f82f469912a100b656cb9bfb5239d7895140210ab516bda387727
                                                    • Instruction Fuzzy Hash: 48210034B11206DFEB44CB54C645FA9B3F1FB48714F29C499E949AB261C7B1EE41CB90
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 12a08371d81484233e1f8e3e079922e25beaedadeadcf0949f8f3b62fa06541d
                                                    • Instruction ID: 5323eee28c0a4cb14d3f680b915c51cc77440c29153d873b67d2a515f539e320
                                                    • Opcode Fuzzy Hash: 12a08371d81484233e1f8e3e079922e25beaedadeadcf0949f8f3b62fa06541d
                                                    • Instruction Fuzzy Hash: 24018931B0824D8BCB241A794A9517AFBF5EFC531073850BACA05EB713DE20CC1A8392
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1097b63bb9ee38fe89462fb679e741aefb0e518c5b878ebcd3697528504568e4
                                                    • Instruction ID: bd610feda65f730ad71a00ecbf883c4d0255bcf985a517ab07f51fd4783f19a2
                                                    • Opcode Fuzzy Hash: 1097b63bb9ee38fe89462fb679e741aefb0e518c5b878ebcd3697528504568e4
                                                    • Instruction Fuzzy Hash: 5011E133B006249F8718DB39C84496977E6BF893A035A41B9E90ADB372CB32DC45CB90
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e9d8ce460911a812722301a441e1c99194da7ac439ba39041048b8c7efb559ae
                                                    • Instruction ID: 06307f094c233a1e29110566288228abbbaf5b594855cbccaac2e18998313e69
                                                    • Opcode Fuzzy Hash: e9d8ce460911a812722301a441e1c99194da7ac439ba39041048b8c7efb559ae
                                                    • Instruction Fuzzy Hash: B4119E35B005089FCB44DB79D4918ADBBF2EF8921071480E9E509EB362DE31AD02CB40
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1ab5f9ef54072be4d7ce83591d9942e41585e2eef4d51528e85cb81f44c416bd
                                                    • Instruction ID: 43f15becbe964b511b661c12688fe049d76b14a723a3161db437a3f74a57047b
                                                    • Opcode Fuzzy Hash: 1ab5f9ef54072be4d7ce83591d9942e41585e2eef4d51528e85cb81f44c416bd
                                                    • Instruction Fuzzy Hash: 78012631A0D7896FC3098E2A5881662BAEABFC5320759C27BD209D7651CA60DA14C7E2
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d7d878a6cf38b9f6ce3f2ff047d517ddf7f2e5a52f8be2e37ee8e8de4ac97f92
                                                    • Instruction ID: c9c765f67e9bb1c62eaa1e60af5e89e34ea0289d3f84543c0ffa2cfe59f37120
                                                    • Opcode Fuzzy Hash: d7d878a6cf38b9f6ce3f2ff047d517ddf7f2e5a52f8be2e37ee8e8de4ac97f92
                                                    • Instruction Fuzzy Hash: 34012431B0824D8B8B251969599057AFBF5EEC931033550BADB06EB313DE60CC5A8391
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 96a702b2762e4163b933e87895f3071d7ca5da76300d9860475b37c099749f5b
                                                    • Instruction ID: b39b016c51893704d4deb033f1385a7c05ec2cf0e5b013b21810cb027aa4f070
                                                    • Opcode Fuzzy Hash: 96a702b2762e4163b933e87895f3071d7ca5da76300d9860475b37c099749f5b
                                                    • Instruction Fuzzy Hash: 7C118E35720284CFD3589A25DA95926BBE7FBC9315B68987FD50ACBB90C770F881CB40
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ebb8fb6d8e92293244049154afe56e08e4351d4dfaaaa63a47d5a26d0ba8fae8
                                                    • Instruction ID: bab6d7b7d548e059175728d066d1641edc6d35a804b1fd05f87ecbd0674b7353
                                                    • Opcode Fuzzy Hash: ebb8fb6d8e92293244049154afe56e08e4351d4dfaaaa63a47d5a26d0ba8fae8
                                                    • Instruction Fuzzy Hash: 2201F931B0C7596B834C8E6B58815B6E6DABFC4360315D33BD209D3610DB70DA50C7E1
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: daf3183dc3e446bdb590de6ca904e6057502d1f7e818223ece20885a6f1374f4
                                                    • Instruction ID: 28bc20640b38ae39d6bca0f050c2631e322ddc91457ad684cb4f6fff07c4c76b
                                                    • Opcode Fuzzy Hash: daf3183dc3e446bdb590de6ca904e6057502d1f7e818223ece20885a6f1374f4
                                                    • Instruction Fuzzy Hash: EC01A276F012198B8B58DF75DC404AEB7B7EBD5364B2586BAD508EB302EB319C01C7A0
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e646d791b03f11e3ab8aecd3ee40f3c5ff2e98fe431e02895f402e840dd4fa0f
                                                    • Instruction ID: 59edbafcda3239c832195a5384ba9522b8988df14674e7779b05d2f0d55d4a05
                                                    • Opcode Fuzzy Hash: e646d791b03f11e3ab8aecd3ee40f3c5ff2e98fe431e02895f402e840dd4fa0f
                                                    • Instruction Fuzzy Hash: DB01D136B001588FCB04EBACD4914AAF7F6DF8D22471494BBE60CE7352DA31EC068B80
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f02389a9a052eb19cb22f35b916e984fdc26159212ebad8504ce8de8318ecdd0
                                                    • Instruction ID: 64252361809bf01e5ff81b2238917355f252f6a3844b10b6aa33e70a9c817e28
                                                    • Opcode Fuzzy Hash: f02389a9a052eb19cb22f35b916e984fdc26159212ebad8504ce8de8318ecdd0
                                                    • Instruction Fuzzy Hash: 69F049353052448FC3188B29C4A5962BBF5EFCA72431A94EAE689DFB32C760DC42CB51
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9a497a08bb9bc6da120132ff99132206edfe51ae837a16fe16f90f8f108c2bc2
                                                    • Instruction ID: f7dfd08fb442ed7735d98f1f72f55c025e26698bf401c92121579aa0a0c523f9
                                                    • Opcode Fuzzy Hash: 9a497a08bb9bc6da120132ff99132206edfe51ae837a16fe16f90f8f108c2bc2
                                                    • Instruction Fuzzy Hash: 49F017357412048FC759AB28D095869B7F1EF8A22432580E9E549DFB32DA32EC42CB00
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a681fb7ed6de19008839aaf6df2b789426fe45af34625b9d7d6df76797c7a3ce
                                                    • Instruction ID: d03f336eb54e2cb79c043701d8ad9ff65af2b59322a400fb1c755e9f2eaaf763
                                                    • Opcode Fuzzy Hash: a681fb7ed6de19008839aaf6df2b789426fe45af34625b9d7d6df76797c7a3ce
                                                    • Instruction Fuzzy Hash: B0F02B32709294AFC71A673484504B9BFB1FF8B32035585BED4466B652CB31DC12C790
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e9757eebdb968d3b3e3fc009537fc788fa67131b3afbe493a6d51c5bafe59e5b
                                                    • Instruction ID: 5803756b27f06d3eb258013260f150ea7748a373db04a253253e2d35d839211e
                                                    • Opcode Fuzzy Hash: e9757eebdb968d3b3e3fc009537fc788fa67131b3afbe493a6d51c5bafe59e5b
                                                    • Instruction Fuzzy Hash: BBF030343002148FC358DB1AC454D22B7E9EFCA72432995A9D609DF331CB70EC01CB51
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: eda51ff504570caf2d41ec068133cca9d170530a5ec44a52398788eb61210dff
                                                    • Instruction ID: d12a75a7e71eb3ac7005da21c448b8edc5703d4cf2a519451ffdf79abd503c3a
                                                    • Opcode Fuzzy Hash: eda51ff504570caf2d41ec068133cca9d170530a5ec44a52398788eb61210dff
                                                    • Instruction Fuzzy Hash: A1F09A36F001288BCF04CAACE8844DCB7A2FB48364B5141AAEA09F7241C3319D05CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d8330d1d83b6316eae00b6c7c8aad66a10a3c6a23fb633e55481d6951daf957b
                                                    • Instruction ID: 1a1af973f7376bd0f1fb60cb7b2cf56fd647d26ceb6a6ff7adb674f190c7485e
                                                    • Opcode Fuzzy Hash: d8330d1d83b6316eae00b6c7c8aad66a10a3c6a23fb633e55481d6951daf957b
                                                    • Instruction Fuzzy Hash: C4E06C337012186BC3196675944046AF79AFBCA3653519539D50A7B741DF32DC51C7D0
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 25b2df0bd38809b38da316b85fdf15cc339f05172a4b6e88f70af33eeef88463
                                                    • Instruction ID: 8d944b1b873d70f3cd265242b06f710ae572dd3bd3e4005316771a2a96741a41
                                                    • Opcode Fuzzy Hash: 25b2df0bd38809b38da316b85fdf15cc339f05172a4b6e88f70af33eeef88463
                                                    • Instruction Fuzzy Hash: ACE092313002145B4718667A985142FB3DAEFC9260350547EE60EE7342CE32AC02C390
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1c61c3f0192cded04704857083c7c34322385895833e6a060ec30101c538d5e7
                                                    • Instruction ID: 2bcfce8b9bc56d43d0184c8e30a3827825877769ad79c537abe060228e5ee74e
                                                    • Opcode Fuzzy Hash: 1c61c3f0192cded04704857083c7c34322385895833e6a060ec30101c538d5e7
                                                    • Instruction Fuzzy Hash: 0FF0E2327082948FCB1A9B3894108AD7BE69FCB32075940BED44AEB322CA71DC02C740
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 49498c830956329c708c6c58e70b5bfa70f1bf6e16f56c9955ae553d9e7cd1ff
                                                    • Instruction ID: d97bc6a4d6c67ee0286775332670aed7c262070a5095c369b69250d42861d20b
                                                    • Opcode Fuzzy Hash: 49498c830956329c708c6c58e70b5bfa70f1bf6e16f56c9955ae553d9e7cd1ff
                                                    • Instruction Fuzzy Hash: C2E04F367402148F8719AB39D40082EB3EADFCA32136580BDE509EB321CE72EC02C790
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3749859669.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_62a0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c792d7b67572c134e33aaf8ce929d7c2ab26dd9f58b419483ae80afde36597c0
                                                    • Instruction ID: 56c2a69ca80cddc681e3fdb32297a9f5bf3c1c27d390f09c5a62af583e369676
                                                    • Opcode Fuzzy Hash: c792d7b67572c134e33aaf8ce929d7c2ab26dd9f58b419483ae80afde36597c0
                                                    • Instruction Fuzzy Hash: 45F03032515248AFCB42CFC4DD11CA57FB6EB49354B08809AFA454B162C672D865DB91
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8518c4785c97536328b62bc6974998136928347cba38052050aa26bd07f8e7b9
                                                    • Instruction ID: 51c2440865c6c0457a639df90081e28be87858e3f8f5cb60e3c445e9f3052f23
                                                    • Opcode Fuzzy Hash: 8518c4785c97536328b62bc6974998136928347cba38052050aa26bd07f8e7b9
                                                    • Instruction Fuzzy Hash: 61E0DF30A0A185EFCB09CBF499666AEBFB1DF8B300B0041E9D409E3243DB311E18DB00
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1817129d31e6e6a30a1ac05a1304a230c4b2649a3e81d5ce0eb47e0da7fb2895
                                                    • Instruction ID: 4802836c4cc48ff72594f2a2fecc8b1d75fc41a8d80c0eaac6b11ce1cf38bfb9
                                                    • Opcode Fuzzy Hash: 1817129d31e6e6a30a1ac05a1304a230c4b2649a3e81d5ce0eb47e0da7fb2895
                                                    • Instruction Fuzzy Hash: 40D01230F01108EFCB04DFB5D95655EB7F5DB8E300B1044A9D509E7241DB312E049740
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c8c515982fdc8a111604bb575c174b430f255707fd727858d3b6a95c31c0a744
                                                    • Instruction ID: 9f842f4c3193c65c4aee91839ddcb683dac6c14fcaa0e5d127de5cca081429b8
                                                    • Opcode Fuzzy Hash: c8c515982fdc8a111604bb575c174b430f255707fd727858d3b6a95c31c0a744
                                                    • Instruction Fuzzy Hash: FED05B70A4120CEBCF04EBB5891357DB3E5DF95300B5050E99508B7341DE311F00A781
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a191846b3ef96226d40d1d6e0aba5bc4c4d8e8b44b099dfa09529a906a383d67
                                                    • Instruction ID: a670bbac25a441c252a2624be2189c388e7c40ea42babbeb44432ff7b3e5974c
                                                    • Opcode Fuzzy Hash: a191846b3ef96226d40d1d6e0aba5bc4c4d8e8b44b099dfa09529a906a383d67
                                                    • Instruction Fuzzy Hash: 07D0C9363101249F8740DA5DE444C42B7ECEF4D6243258099E50CCB322D662EC028B90
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.3742053935.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_ef0000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 843af958005e8fdf1b7e09ce6afac25a71dc1d547b57b5f4c7fb21f592ca4dc9
                                                    • Instruction ID: d1ddab8e2fec307e62dcbf37889666768f0e42b1ca8f3ec033b36757312767f0
                                                    • Opcode Fuzzy Hash: 843af958005e8fdf1b7e09ce6afac25a71dc1d547b57b5f4c7fb21f592ca4dc9
                                                    • Instruction Fuzzy Hash: 3EC001383542088F8344DB59E889C11BBE9AF89A2435A80A9E9498B732CA31FC00CA84
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: [dYn^$kdYn^${`Yn^${dYn^$dYn^
                                                    • API String ID: 0-3163139991
                                                    • Opcode ID: 095e3bc82b6f314deeb7325e6f7669f0acca9527ce6736546da4b8a77651fa37
                                                    • Instruction ID: 3873db2484da4af1b37c91fb84769959b0f91233cb1eaeb0d9f171c45812772c
                                                    • Opcode Fuzzy Hash: 095e3bc82b6f314deeb7325e6f7669f0acca9527ce6736546da4b8a77651fa37
                                                    • Instruction Fuzzy Hash: 83916C75F007145BEB19EFB998206EE7AF2EBC4700B008A1CD606BB744DF75AA058BD5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1488134102.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_7cb0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'q$4'q
                                                    • API String ID: 0-1467158625
                                                    • Opcode ID: 97aac6d987559db6916cda71a9a748044ce0ebc51e332f49837c1a45a4979480
                                                    • Instruction ID: 2e68faa084a7fd7ac9258d7a503092b55267879ecb6333eaaaa657d0b1d77bf1
                                                    • Opcode Fuzzy Hash: 97aac6d987559db6916cda71a9a748044ce0ebc51e332f49837c1a45a4979480
                                                    • Instruction Fuzzy Hash: B3A129B1B0434EDFCB358B69D4547EABBE2AF86251F18806AE505CF251DB30DE42C7A1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (q
                                                    • API String ID: 0-2414175341
                                                    • Opcode ID: 251200265827b83f56549e48900149d886564f24126915ac0ac584a59b193723
                                                    • Instruction ID: 35a8a39835923f75f8a528e5934d93b5d40045d47b803a1048d345972822422f
                                                    • Opcode Fuzzy Hash: 251200265827b83f56549e48900149d886564f24126915ac0ac584a59b193723
                                                    • Instruction Fuzzy Hash: 1431C0367043005FE714EB65E8549AEB7E6EFC5220750863ED10ACB351EE31AC06C7B5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (&q
                                                    • API String ID: 0-583763264
                                                    • Opcode ID: d574642f5cd3395cfa31681269c79c2fe88e1606d378cd3a382869fe5fecd640
                                                    • Instruction ID: c6b5f3ccece51e4690e2bb26eeb31037cea5ad7d3592ee5e80a8eaad2432da44
                                                    • Opcode Fuzzy Hash: d574642f5cd3395cfa31681269c79c2fe88e1606d378cd3a382869fe5fecd640
                                                    • Instruction Fuzzy Hash: DC219F75E043098FDB14DFAAD4047AEBBF5AB88320F24846AD408A7340CA75A801CBA5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ^Yn^
                                                    • API String ID: 0-914103871
                                                    • Opcode ID: 617298cbb5dadc2f9ecc1640a9df16bcf011c3d2506f2e3be4c1d1f2916d57bb
                                                    • Instruction ID: ca5e53f837fc14a9575f25a1f12b414af08d5c65c3013aba23d31e3588db3531
                                                    • Opcode Fuzzy Hash: 617298cbb5dadc2f9ecc1640a9df16bcf011c3d2506f2e3be4c1d1f2916d57bb
                                                    • Instruction Fuzzy Hash: AB3191347013019FDB11DFAAC940AAABBF2AF84704F04846EE589CB365D774F905CB90
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2057524fd0c5ff66c0d2fa85b55cb2497c8f0d00b5c1009bb4aaaa35f43d9b6c
                                                    • Instruction ID: 9cbc4a30202320645187d68ea1b2332b32c0e90b9a220790af053361d539c206
                                                    • Opcode Fuzzy Hash: 2057524fd0c5ff66c0d2fa85b55cb2497c8f0d00b5c1009bb4aaaa35f43d9b6c
                                                    • Instruction Fuzzy Hash: EE919B74A00609CFCB15DF59C494ABAFBB6FF88310B248699D815AB364C735FC91CBA4
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d1f23248552cb55238a3eb2bb9b06c110192960fd206b65d41975ad9d3034e9e
                                                    • Instruction ID: 04f99b85959520cfc1d7b10bbca4f7773172a69782ad3e64e7be9246ecbbc666
                                                    • Opcode Fuzzy Hash: d1f23248552cb55238a3eb2bb9b06c110192960fd206b65d41975ad9d3034e9e
                                                    • Instruction Fuzzy Hash: 9B610675E002089FDB14DFA9C8846DDBBF1FF88314F14812AE808AB354EB35AD45CBA1
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: df08309ac0308c979ed6a25e9dc7b1a4f44935a7ef38c015f7ddab6f0da167fc
                                                    • Instruction ID: 995f45137fc221717930a5266ecf0ce89db31f41a70bc5455a51dddda0955b02
                                                    • Opcode Fuzzy Hash: df08309ac0308c979ed6a25e9dc7b1a4f44935a7ef38c015f7ddab6f0da167fc
                                                    • Instruction Fuzzy Hash: 7041AD353002059FD714EB6AD854BBB77E6FFC8214FA48469E54ACB355EB35EC028BA0
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4026fda391de91b8a4a6f974d76a74a86fd2219728dcc8dd67ee3592b52368cc
                                                    • Instruction ID: a86d87398c310bcd3fe0a572ef37c6424b232ae5b58d4e1408f77881806e3606
                                                    • Opcode Fuzzy Hash: 4026fda391de91b8a4a6f974d76a74a86fd2219728dcc8dd67ee3592b52368cc
                                                    • Instruction Fuzzy Hash: CB510875E002489FDB14DFA9D484A9DBBF1FF88314F14812AE809AB354EB35A945CBA1
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 93092d9e2f42e8791d574aeb619161e13e60f1f979ae07e7dc40edab7d5604fd
                                                    • Instruction ID: f98e883a301c5fa7752180af73307a8c0e97c4ec3f1d79d15f181199b8155ecf
                                                    • Opcode Fuzzy Hash: 93092d9e2f42e8791d574aeb619161e13e60f1f979ae07e7dc40edab7d5604fd
                                                    • Instruction Fuzzy Hash: 48319E3A7002008FD714EF6EE894A7A77E6EBC862572880ACE549CF355DF35DC0287A0
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1488134102.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_7cb0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1c27895d077a9819a31e0a9b4246515b8bc7a7b53dc600223d357714700dedec
                                                    • Instruction ID: df609115cb8b0640a8d58c1812850a380d6b74a1b1b5200a950e813d40bc835e
                                                    • Opcode Fuzzy Hash: 1c27895d077a9819a31e0a9b4246515b8bc7a7b53dc600223d357714700dedec
                                                    • Instruction Fuzzy Hash: 843129B1B043458FDB349AA894907EAB7E6EBC6211F18817AE7068F291DB31DD42C761
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2ca11edd8ce4c05eb504d942166d0255cb72e710cd5932d48cb19e4c1180e61f
                                                    • Instruction ID: 4f519e0bf5916aa933c81489405aed327e71815d60e49b283cdc534f0fd754a1
                                                    • Opcode Fuzzy Hash: 2ca11edd8ce4c05eb504d942166d0255cb72e710cd5932d48cb19e4c1180e61f
                                                    • Instruction Fuzzy Hash: B0418A74A00609CFCB05CF4AC098ABAFBB6FF48310B158599D815AB364C736FC91CBA4
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b7d18ef8d1e72361eea08ee9b027f910d13e28fe440a15609227ade2e3924dc8
                                                    • Instruction ID: afa8f7d0ed934f5c68ce11314ced651acc59960ace1bfe85384765369e049973
                                                    • Opcode Fuzzy Hash: b7d18ef8d1e72361eea08ee9b027f910d13e28fe440a15609227ade2e3924dc8
                                                    • Instruction Fuzzy Hash: 4731E534B002048FDB14DF65C598AA9BBF2EF8D715F5490A8E806AB395DB31EC41DF60
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 623c174501a043683abc32aa2258f44dba6a7e680e3c7ecc090c94a84f0c9a75
                                                    • Instruction ID: 5fb81094a26e4e9ba447eeccfb70e7ef90b730bb3f797d30da161a70d56af79e
                                                    • Opcode Fuzzy Hash: 623c174501a043683abc32aa2258f44dba6a7e680e3c7ecc090c94a84f0c9a75
                                                    • Instruction Fuzzy Hash: D9312734A002048FDB14DF65C598ABDBBF2EF9E315F5490A8E846AB355DB31EC41DB60
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 95967bee7a9bdd8f93de0751cad271462fa4dad69e71a1847000588d15e3e5c2
                                                    • Instruction ID: 7cf896ad1064ada82186134f500c8135d4cc99d3933d56e933b44797f78dcf76
                                                    • Opcode Fuzzy Hash: 95967bee7a9bdd8f93de0751cad271462fa4dad69e71a1847000588d15e3e5c2
                                                    • Instruction Fuzzy Hash: 8A314E74A0120A9FDB14EFAAD4947BEBBF6EFC9310F148069E405EB350EA349C458B61
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 21aabe434532163139ddf853c17ef5c1a939df542b953cb19aae2e02e61e7c41
                                                    • Instruction ID: d832556f0b2afa41912acc2a7418bbb52dfd1f4248838f7d2c270d38cca5db77
                                                    • Opcode Fuzzy Hash: 21aabe434532163139ddf853c17ef5c1a939df542b953cb19aae2e02e61e7c41
                                                    • Instruction Fuzzy Hash: CC312F74E0120A9FDB14EFAAD4947BEBBF6EF88250F148069E505EB350EA349C458B61
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cf47e6138090ede9db17a43508a984dfbe0dfd2a3bbc2f80a2a943d47ea6420e
                                                    • Instruction ID: 20d154773393224e8c63fb37b5743c5bc4b16b2b374d1ce80ef4256df5e2d857
                                                    • Opcode Fuzzy Hash: cf47e6138090ede9db17a43508a984dfbe0dfd2a3bbc2f80a2a943d47ea6420e
                                                    • Instruction Fuzzy Hash: E8312FB8A002049FEB04EFA4D854BFE77B6EF88300F248469D615AF395DA35DD418BA5
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d157cac081e3cab30be32cc39c00e9d5afcb09984045512fed10692143e56a18
                                                    • Instruction ID: c123cb6ed7cac86eab077919abbffa8705ba9b9e23409a9e4017a1f4b35100a3
                                                    • Opcode Fuzzy Hash: d157cac081e3cab30be32cc39c00e9d5afcb09984045512fed10692143e56a18
                                                    • Instruction Fuzzy Hash: 9F312DB8E002089FEB04EFA4D454BFE77B6EF88300F608469D615AF394DA35DD418BA5
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1364987300.000000000367D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0367D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_367d000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2d268408f5289c18c9904feaf3294a563443132dec47f35897ed8459cbac91b8
                                                    • Instruction ID: c71c8b5ee723f28b867aab7ef5fcbfd64ac415ef366173b3b1638369a99950c4
                                                    • Opcode Fuzzy Hash: 2d268408f5289c18c9904feaf3294a563443132dec47f35897ed8459cbac91b8
                                                    • Instruction Fuzzy Hash: 3021FE75604200EFDF04CFA0DAC4F26BBA5FB88214F6485A9E9094F256C336D456CBA5
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 575a69d50b2fbd0667e638861f529fb4e9aa5c1b08494d4949ddc5f086ec0be3
                                                    • Instruction ID: 33deb42eb611d6eb549bf653d479d4e6bf04ed6327be4d5e96944a52d8f069f6
                                                    • Opcode Fuzzy Hash: 575a69d50b2fbd0667e638861f529fb4e9aa5c1b08494d4949ddc5f086ec0be3
                                                    • Instruction Fuzzy Hash: 592189B4E017448FDB60EF6AC48839AFBF2FF88310F28801EE44D9B245D67464819B65
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ed243e4e347211bdda25f2c7f2b8ab682ed6ed05360dd8b23ca2a11b873253bd
                                                    • Instruction ID: 3dbfef04fe1c30175161cef1e80e0a6afcc8fcc23a8175fbf2c73d0bc90fc02d
                                                    • Opcode Fuzzy Hash: ed243e4e347211bdda25f2c7f2b8ab682ed6ed05360dd8b23ca2a11b873253bd
                                                    • Instruction Fuzzy Hash: 842189B4E017448FDB60EF6AD48839AFBF2FF88310F28801EE44D9B245D67464819B61
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1364987300.000000000367D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0367D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_367d000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3db14e1fbd481c373aa523bb9b771c634d45f7ce68899f9c04ab426dc2dff8be
                                                    • Instruction ID: b99afcb2022bedd119c078bc6a9c99f22047572f081f449e02728f41587c5f7d
                                                    • Opcode Fuzzy Hash: 3db14e1fbd481c373aa523bb9b771c634d45f7ce68899f9c04ab426dc2dff8be
                                                    • Instruction Fuzzy Hash: B3216A76504240DFCB16CF50DAC4B16BBA2FB48314F28C5A9E9494F656C33AD46ACF91
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9765b933b59d7b3c19b4e5a338ac65ab01c06b460cda30bc81ac4dc050742d9c
                                                    • Instruction ID: f86a1711e416fc760a431c01f276a948743635fccec28b34d335542bd57122a3
                                                    • Opcode Fuzzy Hash: 9765b933b59d7b3c19b4e5a338ac65ab01c06b460cda30bc81ac4dc050742d9c
                                                    • Instruction Fuzzy Hash: 2A118C356083048FD729DF75D494A697BF5EF8A210B1488AEE04ACB6B2DB30BC85CB55
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1364987300.000000000367D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0367D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_367d000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3b7cc4149c75b3d952fa6e2027961e96534f40b661dbc59df1878269bbb4a4e2
                                                    • Instruction ID: b96795ed331bf319b34ca30624e297765b5a0d96d7828fe058fb7e0d7ba6f4e8
                                                    • Opcode Fuzzy Hash: 3b7cc4149c75b3d952fa6e2027961e96534f40b661dbc59df1878269bbb4a4e2
                                                    • Instruction Fuzzy Hash: 5D01A771404340AEEB208E25C984B66FBD8DF41224F5C995ADD480F282C2799446CAB5
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1364987300.000000000367D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0367D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_367d000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 39717422f5780e00ae1106652fd585ba68683ef1b9c43d9c82fc6dc1a7fcba34
                                                    • Instruction ID: 5c57810054ddd3bfd6bdf049554c2286199728aed8f346e713ed3bf1eb7a914d
                                                    • Opcode Fuzzy Hash: 39717422f5780e00ae1106652fd585ba68683ef1b9c43d9c82fc6dc1a7fcba34
                                                    • Instruction Fuzzy Hash: 1001007240E3C09FD7128B258994B52BFB8EF57224F1D85DBD9888F297C2695848C772
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9a7fdeb0cad943639dfd28364ec0aecfba1265ecb11e5cb6940a2a6844cba6eb
                                                    • Instruction ID: 46b26c22a7dd098acd9cb491f67201d454ca9458c01aa45168393288adae83ee
                                                    • Opcode Fuzzy Hash: 9a7fdeb0cad943639dfd28364ec0aecfba1265ecb11e5cb6940a2a6844cba6eb
                                                    • Instruction Fuzzy Hash: E1F02B36300600AFD7209F69E440AFFB7E5EF88664B40061CD04ED7750CB70AC46C7A0
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1364987300.000000000367D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0367D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_367d000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 43f3de15c0e7198026960544809a6fe632190ab0deae527a00b5cf8c6c1136a5
                                                    • Instruction ID: 9b3bd6c135e5e87af0cd3edc677e0561ae693c56ef373103609e64e52e5d1cac
                                                    • Opcode Fuzzy Hash: 43f3de15c0e7198026960544809a6fe632190ab0deae527a00b5cf8c6c1136a5
                                                    • Instruction Fuzzy Hash: 32F0E776600600AF9760CF0AD985C22FBA9EFD4670719C55AE84A4B612C671EC42CAA0
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f11a28671010720e9354cdb4f3758da9f31e82593e4ce1896f9f37f59d49a3b6
                                                    • Instruction ID: babdaab518166ce96f93c2b0f33f3c9be203a09e9f378912dd0eb7f0ec254ae0
                                                    • Opcode Fuzzy Hash: f11a28671010720e9354cdb4f3758da9f31e82593e4ce1896f9f37f59d49a3b6
                                                    • Instruction Fuzzy Hash: F3F034353156918FC3119B2DD494866BBF6EFCA61531A05AEE049CF732DA21DC02CB50
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1dfb206c3b7cc989b00d8dde3b20eeb0424c5f92670aa2dfefba84f449f7c689
                                                    • Instruction ID: 447eac110d05fa3684335481644927327b140fb86c06ae4165b4675bf76a040f
                                                    • Opcode Fuzzy Hash: 1dfb206c3b7cc989b00d8dde3b20eeb0424c5f92670aa2dfefba84f449f7c689
                                                    • Instruction Fuzzy Hash: 66F02736300614AFD710AA56E84097F77E9EB8C574B40062CE10AC3300CB30AC0187F0
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1364987300.000000000367D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0367D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_367d000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f0d14595201f8025089c5dcb9c6b63a1437e67195a80af276857cf8b6b36ead6
                                                    • Instruction ID: 3cf8e95071a31a32020efc2cc0ccc3d412fc9cfea511ecfbc8cb420a53abca93
                                                    • Opcode Fuzzy Hash: f0d14595201f8025089c5dcb9c6b63a1437e67195a80af276857cf8b6b36ead6
                                                    • Instruction Fuzzy Hash: 4EF0F976100640AFD765CF06C985D23BBB9EF89620B298489F85A5B352C671FC42CFA0
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0fd725ff00b7bdc45bc6b710d35c89c29bb9588bbdb94505bc2a0487fe1ea1c1
                                                    • Instruction ID: 4855f5ee81211663c9bd53fb205780c25ac88192501ea27f593c791493ec8fb3
                                                    • Opcode Fuzzy Hash: 0fd725ff00b7bdc45bc6b710d35c89c29bb9588bbdb94505bc2a0487fe1ea1c1
                                                    • Instruction Fuzzy Hash: 20F027797042044BE348AF6DD0183AB7BA6EFC4368F20816ED5055B3C8DE39AC418BF1
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e5739f0bbe2dac9c2e797c2eb8ac5ae25b9dbe35b2ec5da949eafe4f9e60cf29
                                                    • Instruction ID: 582a7c9c2c01adb2b481a03419eb6840c1a710cee9ac0db148b369177730d9fd
                                                    • Opcode Fuzzy Hash: e5739f0bbe2dac9c2e797c2eb8ac5ae25b9dbe35b2ec5da949eafe4f9e60cf29
                                                    • Instruction Fuzzy Hash: 79F02B346047405FC713A72EA41159EBBF6DFC6260315049EE05ACF362DE648C06C766
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e34091ae086fd404e2dcdfde5a873ee364b425932d47fa8e0bdc1e83553d440b
                                                    • Instruction ID: 2b5ab09cfe94deb41c04f7fd404923440cd6a92563cc8657ba12ec6f4c397053
                                                    • Opcode Fuzzy Hash: e34091ae086fd404e2dcdfde5a873ee364b425932d47fa8e0bdc1e83553d440b
                                                    • Instruction Fuzzy Hash: F4F0E5307140419FC7099BBDD4044E8BFA2DFC9310B0484BFE849DB361EE319815CBA5
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9a3fb4a6ff9c1e0a11c85d27b05767121261f3c806ae314282eb6c92c9675afa
                                                    • Instruction ID: 78f4c03b54cc2d0eb7133f543fec621c862f97a586ae51be57bba5ca684662c5
                                                    • Opcode Fuzzy Hash: 9a3fb4a6ff9c1e0a11c85d27b05767121261f3c806ae314282eb6c92c9675afa
                                                    • Instruction Fuzzy Hash: 5DE09A353002118F87109F1EE498C66B7FAEFCEA2531900A9E549CB331CE31EC01CB90
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fe44b4ace412acf23909c9fe875106e93871ea69b8d4fc315cf29fb76dfd7076
                                                    • Instruction ID: 886a14999d20b8f8dcb5e67e59d614fdfa01b962c1ec2235801e33342832c42e
                                                    • Opcode Fuzzy Hash: fe44b4ace412acf23909c9fe875106e93871ea69b8d4fc315cf29fb76dfd7076
                                                    • Instruction Fuzzy Hash: 37F082253083906BC70B6B76A01816D7F66FFC6234F0501AED0498B343CEA84805C3A6
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0b7b0b7f95f76d2fd76d6be8ab5a96170e8a53b7755e311533ab7bd225532625
                                                    • Instruction ID: abd7aa267b52388bbe58c6dff9167f3dc6a20c8224e2311f4a88371bf3a8f163
                                                    • Opcode Fuzzy Hash: 0b7b0b7f95f76d2fd76d6be8ab5a96170e8a53b7755e311533ab7bd225532625
                                                    • Instruction Fuzzy Hash: DBF06D749003049FD364EFB9E09C3AA7BE5FB44320F00482DE10ED7380DB35A8408B91
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6ad8b3047535a6e11c4c7b3c4ebfb7b7c7508236994b4b988c49bb88e9f6a646
                                                    • Instruction ID: 0e64f76baad3b2bf9c32b2d41a17669adb205a29d02c6524fcd46a09aa5d7750
                                                    • Opcode Fuzzy Hash: 6ad8b3047535a6e11c4c7b3c4ebfb7b7c7508236994b4b988c49bb88e9f6a646
                                                    • Instruction Fuzzy Hash: 56E02B1334116217575871FFAC00A77A6CECEC206930501FAAF08C7282ED40EC0393F2
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 04a480fa6a64c812876e6aba16dad5bcfc9e521519ff3e39eb5ec8f7ca8f4fd7
                                                    • Instruction ID: e19b819baf164da802d29efaaaa665a250e1e481507c394103ebbd3c4682629b
                                                    • Opcode Fuzzy Hash: 04a480fa6a64c812876e6aba16dad5bcfc9e521519ff3e39eb5ec8f7ca8f4fd7
                                                    • Instruction Fuzzy Hash: 79D02E23318254178B0CA02FAC200662ADBCBC1621319C0BAF608CB344FC62EC0243E6
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 786a0e92f6fe11b40e6ce2b46c4c960a099afd36a9e7f11f689ddac96a2cee29
                                                    • Instruction ID: 7e118cfbfb2d6270442aec33e38eff7144dd481c1fd71e67e915283cfe57df07
                                                    • Opcode Fuzzy Hash: 786a0e92f6fe11b40e6ce2b46c4c960a099afd36a9e7f11f689ddac96a2cee29
                                                    • Instruction Fuzzy Hash: 16E0ED749013049FD764EF79E09C3AA7BE5FB84310F10592DE15ED7380DB35A8408B51
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1d730f37c41a663af69c7067017715d24b871e007ee194623b970530a9b398b7
                                                    • Instruction ID: d2a21aeb4829a07bd87e49fa7168573639bb635f8438c82194e94310f0f52ae4
                                                    • Opcode Fuzzy Hash: 1d730f37c41a663af69c7067017715d24b871e007ee194623b970530a9b398b7
                                                    • Instruction Fuzzy Hash: 8CE04F393047146BDA092B7BA05C2AE7B5AFBC4735F00466DE50A87342DFB9580187EA
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                                    • Instruction ID: 13333c25550ac61d43318c54ec663bd64e1d0a353a26b94d4f512e63735ea042
                                                    • Opcode Fuzzy Hash: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                                    • Instruction Fuzzy Hash: D1E08631B0001497CB18959AD4104EDF7AADBCD220F04807AD94AA7341DE72A91586F5
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7302cf577c287f7c421eb1ee3a8abfb38200caa2d8b9522db9c8d1b9fe12a418
                                                    • Instruction ID: 7125f2538c7cfcab2e279e6e3f3fdf13d1b06f6957eb41d06abb22747e446043
                                                    • Opcode Fuzzy Hash: 7302cf577c287f7c421eb1ee3a8abfb38200caa2d8b9522db9c8d1b9fe12a418
                                                    • Instruction Fuzzy Hash: A0E0C235700B15178626B65FB8105AFB7FADFC4AB1355402EE019CB301DE60EC0287EA
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0a83524a40ff3a05ab05cb853e9989eced779cdc980313166a8cbefbecbc08f4
                                                    • Instruction ID: a4c0813a669c79f72cfcea50dc61a3b51eb64c0404c13fafe6a03e4d1a3f0a06
                                                    • Opcode Fuzzy Hash: 0a83524a40ff3a05ab05cb853e9989eced779cdc980313166a8cbefbecbc08f4
                                                    • Instruction Fuzzy Hash: 0CD05E1335012207665870EF5D0067BA6CECEC65A570540B6AF09C7681EC40EC0263F2
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9a6b1351bb95e42153ba81ff9d545eaa5d7d613a25216eae32313487228536bf
                                                    • Instruction ID: cc4a688e18545e118a80b31f4878c34330615959285ce4cd21c62792b78f13af
                                                    • Opcode Fuzzy Hash: 9a6b1351bb95e42153ba81ff9d545eaa5d7d613a25216eae32313487228536bf
                                                    • Instruction Fuzzy Hash: 00E01A71E4164A9E8784EFBA94815AEFBF0AB49254B1085AE8919D7311E63286018B80
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9e1c4004be2378d61ef4d9344c3d47cd0e3331c9afefc251ae6854f09957b9af
                                                    • Instruction ID: d3ee6ef55e194ad1421743fd4905116d6fa672b62c5007a771052625c338b8ed
                                                    • Opcode Fuzzy Hash: 9e1c4004be2378d61ef4d9344c3d47cd0e3331c9afefc251ae6854f09957b9af
                                                    • Instruction Fuzzy Hash: 33E0E635804109DBC748EF56E81B4BEBB74FA10311F40519DE90752695EA712956CF85
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                    • Instruction ID: 1de22fd81fe6a5bbf47f857c655a3e85a98300e984e3221f03ab3d796b843321
                                                    • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                    • Instruction Fuzzy Hash: B0D06270D0420D9F8780EFADC94156DFBF4EB48204F6085AE8919D7301F73296128BD1
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2b180bd0a6df6618449783296208a40ede5d6acb353497df6e4c3545ac5f9068
                                                    • Instruction ID: 4d23608f064c5eba00df59a35ffecdcd2054f4dcc176a6b362612735e176c0c0
                                                    • Opcode Fuzzy Hash: 2b180bd0a6df6618449783296208a40ede5d6acb353497df6e4c3545ac5f9068
                                                    • Instruction Fuzzy Hash: 22E01238A0410DAFC744EFA9E89697EBBB5FB48314F00465DEE0A93751EA706945CFC1
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5c20421e1d3e4d088dee4c10d88a97df009a56300902e02f20918335142bf582
                                                    • Instruction ID: 84a2afb278e9e328ef533ac42f69dff8a6a3b15ee3440d692e0eeda71b93db47
                                                    • Opcode Fuzzy Hash: 5c20421e1d3e4d088dee4c10d88a97df009a56300902e02f20918335142bf582
                                                    • Instruction Fuzzy Hash: 8DD012348041099BCB48AF66E41A4BDBB74FA00311F40419DD907526C1EA702546CF85
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c466cc428bf2bf77798e0a02204c8211d5aaf4af3472091e1e5a4ce6c0e8c9e9
                                                    • Instruction ID: a346d652e0f36c809535b6c4cf3f653cea858c52e517a63312310beb022880e4
                                                    • Opcode Fuzzy Hash: c466cc428bf2bf77798e0a02204c8211d5aaf4af3472091e1e5a4ce6c0e8c9e9
                                                    • Instruction Fuzzy Hash: CCD01738A042099F8744EFA9E84A46EBBB5FB48200F004269DA0A93780EA306885CFC1
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c6da31a5a7e6fdb7f6c427247cded2b83a69964609db873b1fb2f9eae3102ad6
                                                    • Instruction ID: b202d288cf82f93c8be3077851014330b2d304da24895045622e6ea4e865729c
                                                    • Opcode Fuzzy Hash: c6da31a5a7e6fdb7f6c427247cded2b83a69964609db873b1fb2f9eae3102ad6
                                                    • Instruction Fuzzy Hash: 2AD0223880D3C04FC7139F34A4558883F306F1221030400FEDC6B8E6A3CA65C808CF01
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a7075e5c1fddc99bc7fa9a2585b1fa251e37145d2f9d06256f05e7d9d4963a58
                                                    • Instruction ID: 40d415c62fb41808bde10d5216a9335abe8827bbd701f89c6973ae0da251e3c3
                                                    • Opcode Fuzzy Hash: a7075e5c1fddc99bc7fa9a2585b1fa251e37145d2f9d06256f05e7d9d4963a58
                                                    • Instruction Fuzzy Hash: F0C08C96C081B112EF61423484C82042F923B43325B0D88E084C01B042C8A88844D341
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5c216ff4b07e1e6436caf3830d56cd4be0f31f405765790405114eaa94734478
                                                    • Instruction ID: da6ca3f216864d5962e8a235edbc634dd4ded9a7d7e570e67adb54fe584d56c7
                                                    • Opcode Fuzzy Hash: 5c216ff4b07e1e6436caf3830d56cd4be0f31f405765790405114eaa94734478
                                                    • Instruction Fuzzy Hash: ABB092340447088FC298AF79A4189187729AB4031538008A9ED0E4A7978E36EC84CA44
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1488134102.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_7cb0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: fq$`Qq$`Qq$tPq$$q$$q$$q$$q$$q
                                                    • API String ID: 0-1290391743
                                                    • Opcode ID: 14d7145c397d819f8ae79d83937288a48d4cf55ad49516bee82e0cd7cfb82ed8
                                                    • Instruction ID: 8939f91d31853f6c4abe089f8839bca149f898443bf406382f6aed20a1d3da3f
                                                    • Opcode Fuzzy Hash: 14d7145c397d819f8ae79d83937288a48d4cf55ad49516bee82e0cd7cfb82ed8
                                                    • Instruction Fuzzy Hash: D3616CB0A1420EDFDB34CE45D5A5BEAB7F1AB86351F1C8056F801AB290C735DE85CBA1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ,kGq$,q$$q$$q$$q$$q$$q$$q
                                                    • API String ID: 0-3465679616
                                                    • Opcode ID: 572e9c8f82cd5e4810dd04937c87fe6022d381f9df326ed4e14e4ab3933da7ea
                                                    • Instruction ID: 210ee9e763709e18740b390f180beeefa37cbeff7012cb7a5be3fe82425189d3
                                                    • Opcode Fuzzy Hash: 572e9c8f82cd5e4810dd04937c87fe6022d381f9df326ed4e14e4ab3933da7ea
                                                    • Instruction Fuzzy Hash: 4D519F30B107099FDB29AFB7A8646BCB7B1BFCC600714046ED096DF765EF60A8458762
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ,kGq$$q$$q$$q$$q
                                                    • API String ID: 0-381241185
                                                    • Opcode ID: 5de31d1534b8ea7e3d17fdea08e77d088b4fcf774d588d1678a8846e8e81b819
                                                    • Instruction ID: 28a1b07c4ea2bc208f774ce3f42b74d05be048ef1fcef9d51640ae65c88e23dd
                                                    • Opcode Fuzzy Hash: 5de31d1534b8ea7e3d17fdea08e77d088b4fcf774d588d1678a8846e8e81b819
                                                    • Instruction Fuzzy Hash: 5DD1CA34B102119FEB24BF3A985477E73D6AFC9614B24446ED546DF3A4EE70EC0287A1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: K:Yn^$[:Yn^$k:Yn^${:Yn^
                                                    • API String ID: 0-62103211
                                                    • Opcode ID: 46aaab29815d533c51d38d31135bb0f7e49f9a09c9aecd82eba1efc9f83126c9
                                                    • Instruction ID: 8466197044ec7167e831653ff607ba82b4207b898e2e1336e93d42c8226f75d6
                                                    • Opcode Fuzzy Hash: 46aaab29815d533c51d38d31135bb0f7e49f9a09c9aecd82eba1efc9f83126c9
                                                    • Instruction Fuzzy Hash: 4EE1EB347002058FDB05DF69C598AADBBF2FF49314F4994A8E54AAB362DB34EC85CB50
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: K:Yn^$[:Yn^$k:Yn^${:Yn^
                                                    • API String ID: 0-62103211
                                                    • Opcode ID: c49b8c5e1f5a930f5510d1053fc7e23c529d7da7557273e6efdbc6189649eea3
                                                    • Instruction ID: 87a97a7241e0cc29ce50439d469991c17748730b3597f40a1b9cc5279d76db58
                                                    • Opcode Fuzzy Hash: c49b8c5e1f5a930f5510d1053fc7e23c529d7da7557273e6efdbc6189649eea3
                                                    • Instruction Fuzzy Hash: ADE1F938600205CFDB05DF69C588AA97BF2FF49314F5980A8E44AAB362DB34EC85CB50
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: `q$`q$`q$`q
                                                    • API String ID: 0-10485352
                                                    • Opcode ID: 9a2458904c561a645678a459c1882a8da7c62359dc041d0ec450d136bf479021
                                                    • Instruction ID: dc6abe9b464d42619c061ccbba8309b4cdfc7a2588e921878381134ddf29cef0
                                                    • Opcode Fuzzy Hash: 9a2458904c561a645678a459c1882a8da7c62359dc041d0ec450d136bf479021
                                                    • Instruction Fuzzy Hash: A9B19178E003099FDB54DFA9D980A9DFBF2BF88310F248629D419AB355DB30A945CF90
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: `q$`q$`q$`q
                                                    • API String ID: 0-10485352
                                                    • Opcode ID: 514ab19d81b165f149eff87dbdfe400662db5f44fc1bc77ea1d0a671a7f3749b
                                                    • Instruction ID: 1e7a6a6ddf7282d1efd0c0f5f6cecff7f2e809650d756990d80e00ed3a22bd97
                                                    • Opcode Fuzzy Hash: 514ab19d81b165f149eff87dbdfe400662db5f44fc1bc77ea1d0a671a7f3749b
                                                    • Instruction Fuzzy Hash: C8B18178E003099FDB54DFA9D990A9DFBF2BF88310F208629D419AB355DB30A945CF90
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1365940416.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_4de0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Yn^$Yn^$Yn^$Yn^
                                                    • API String ID: 0-3008656407
                                                    • Opcode ID: 7d050bf678ba05cc4db5259167871e03676a80dd910c929cc47aa802fe08f229
                                                    • Instruction ID: 033fc2016020d7ae8f1f26ac9fdebd8b0bbba0620abc5bc5531d65a0a105deb0
                                                    • Opcode Fuzzy Hash: 7d050bf678ba05cc4db5259167871e03676a80dd910c929cc47aa802fe08f229
                                                    • Instruction Fuzzy Hash: 54415D4280E3D12FE7136B7998A42D53FB0AE93169B0F41D7C4C0CF1A3E818585A97AB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.1488134102.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_7cb0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'q$4'q$$q$$q
                                                    • API String ID: 0-3199993180
                                                    • Opcode ID: f581eb913070e82ef5369eb939c01d225e39546588d421f444a7a2d8cea7708d
                                                    • Instruction ID: bcbe2a50107ffe085a7e5498b27d5f2e7adb7228a3d8f465f7523d65d1691a59
                                                    • Opcode Fuzzy Hash: f581eb913070e82ef5369eb939c01d225e39546588d421f444a7a2d8cea7708d
                                                    • Instruction Fuzzy Hash: 46F0F66571C35B4FC63A125614242F66BB36BC2920B2D4197E841EF392CD248E8783E7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000029.00000002.1545198520.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_41_2_e70000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: tPq
                                                    • API String ID: 0-789928099
                                                    • Opcode ID: 3acefc25d1dab3b13b1ec7aec6b51c6a5fcc94e34313cd248b7b9355935df039
                                                    • Instruction ID: de767e9ec2da2f525d01c051859432617de7115b3487b090a659f568196071b6
                                                    • Opcode Fuzzy Hash: 3acefc25d1dab3b13b1ec7aec6b51c6a5fcc94e34313cd248b7b9355935df039
                                                    • Instruction Fuzzy Hash: EC2107353406108FC759EB38C468A2D7BE2AFC972532554A9E50ADF3B2DE31DC42CB91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000029.00000002.1545198520.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_41_2_e70000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 8q
                                                    • API String ID: 0-4083045702
                                                    • Opcode ID: b017e149d2aabd4e25d87bc9b63453957fbf4c216809863c87a835cd9b8c66da
                                                    • Instruction ID: 14367ffa56cb7c6e64b6cca3f47a7488519af1a273917126f4332a93129b4bec
                                                    • Opcode Fuzzy Hash: b017e149d2aabd4e25d87bc9b63453957fbf4c216809863c87a835cd9b8c66da
                                                    • Instruction Fuzzy Hash: 1CE0DF39E00B500BDB25B3BDB020BADA7E55BC8710F0489FED40A67689DA648C0A4B91
                                                    Memory Dump Source
                                                    • Source File: 00000029.00000002.1545198520.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_41_2_e70000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c86c0fe8771c99f766be62b0c1ebf18c6e6c4ebe8cbab2af2ba377de4a7be2b3
                                                    • Instruction ID: 830ae422c226b1e20d629a1765d7576462ff2366a5a0482688d03d05023992de
                                                    • Opcode Fuzzy Hash: c86c0fe8771c99f766be62b0c1ebf18c6e6c4ebe8cbab2af2ba377de4a7be2b3
                                                    • Instruction Fuzzy Hash: 58029D30A007459FCB14DF68D890AAEBBF2BF84714B15C5A9D509AF395DB31EC42CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000029.00000002.1545198520.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_41_2_e70000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e647fe14a81d7eb64fc31a8966e1eee387e32b51001ed588ac2afbbed298b167
                                                    • Instruction ID: ee52ca44c5ef18c21059df43cfc885853ed47c97fb849cbc29ab72d7050544a7
                                                    • Opcode Fuzzy Hash: e647fe14a81d7eb64fc31a8966e1eee387e32b51001ed588ac2afbbed298b167
                                                    • Instruction Fuzzy Hash: AAC15C34600741CFD729DF28D894B6A7BE2BF88704F6488A8D91A9F365DB71ED41CB90
                                                    Memory Dump Source
                                                    • Source File: 00000029.00000002.1545198520.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_41_2_e70000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0f80ef09d606840de4664f59ebfcfa6df8dd4df0dd78e9d32e2b6da4714ee767
                                                    • Instruction ID: b8181f6fdc6fbe3d73fb449456e021382a39e37095ff17d003a61ee54baed517
                                                    • Opcode Fuzzy Hash: 0f80ef09d606840de4664f59ebfcfa6df8dd4df0dd78e9d32e2b6da4714ee767
                                                    • Instruction Fuzzy Hash: 6101C031F002449FD714ABB9E8557AE7FB6DF89714F1040AAD609AB392CF749D01CB92
                                                    Memory Dump Source
                                                    • Source File: 00000029.00000002.1545198520.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_41_2_e70000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3ccaa832007d6a09e569f43eeadd8cdfe777f83646497fdc812c46d512a014bb
                                                    • Instruction ID: 51c00040c31cb1fc87f8145eaec1d6edfa41266d63ff49869f90400e9d407fa9
                                                    • Opcode Fuzzy Hash: 3ccaa832007d6a09e569f43eeadd8cdfe777f83646497fdc812c46d512a014bb
                                                    • Instruction Fuzzy Hash: F201A776600A109FC321972CED5491A3BA0EB88B5431645D5E846AF329DA30DC0187A1
                                                    Memory Dump Source
                                                    • Source File: 00000029.00000002.1545198520.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_41_2_e70000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d6a6e0ee980c1272686a7e8fd0c94ded37ebecfa8dcbe1f9209622313c9c9fcf
                                                    • Instruction ID: c73a868c3f1f7d12e6cb53636ebedd30db9647825c510ca7642eea2d44c03ecb
                                                    • Opcode Fuzzy Hash: d6a6e0ee980c1272686a7e8fd0c94ded37ebecfa8dcbe1f9209622313c9c9fcf
                                                    • Instruction Fuzzy Hash: D1F0BE32B053244FD32957795C54BAF2BEAEFC962031848AEE00AD7362ED348D0683A5
                                                    Memory Dump Source
                                                    • Source File: 00000029.00000002.1545198520.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_41_2_e70000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e9583b9bdffa688a2030ba8dbe5c82663a7a196a71922d8a18b66b3ee66ffcbc
                                                    • Instruction ID: 9aebf0ce567c280b38c964af8f01a530ff74488ce0676a7e7b519fac034f397b
                                                    • Opcode Fuzzy Hash: e9583b9bdffa688a2030ba8dbe5c82663a7a196a71922d8a18b66b3ee66ffcbc
                                                    • Instruction Fuzzy Hash: CFE09236A04209AF8B08EFF9E8884DE7FEDFF48222B008066F00DD3210EFB058408790
                                                    Memory Dump Source
                                                    • Source File: 00000029.00000002.1545198520.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_41_2_e70000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0e6546f3e5cdacb0cb6d4add6691c0a795c2ab010dac37a51498cad250f6c496
                                                    • Instruction ID: 5adf1db57573d2e351cad9109e1c4daa24586ab05a5e3f306689978b001c3edb
                                                    • Opcode Fuzzy Hash: 0e6546f3e5cdacb0cb6d4add6691c0a795c2ab010dac37a51498cad250f6c496
                                                    • Instruction Fuzzy Hash: 7EE09279A042499FC709DFFA98487CBBFE9EF48115F5480DEE008E3310EA3059008755
                                                    Memory Dump Source
                                                    • Source File: 00000029.00000002.1545198520.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_41_2_e70000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fcc648764d562ae9beb3f7938c194652f02887e641b0b4b919b13ed6782ddce9
                                                    • Instruction ID: a82eea4e26e72c21b83a8a7d437905d8b4a162a5d2c2a564e59b6083c9c7a12a
                                                    • Opcode Fuzzy Hash: fcc648764d562ae9beb3f7938c194652f02887e641b0b4b919b13ed6782ddce9
                                                    • Instruction Fuzzy Hash: 0CD0A732A09BD05BC72167B5AC052CC3F34CA02755B0440FAD549EB192EA44891483D3
                                                    Memory Dump Source
                                                    • Source File: 00000029.00000002.1545198520.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_41_2_e70000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3cb0051270b04df7c3b9866b744b97c85ea3a6f6985c8bfe2072ab50adbbad89
                                                    • Instruction ID: a04748f3f1c894f21292f03b28383bd0c9d41c7d92f9710c8a5da4098af84e2e
                                                    • Opcode Fuzzy Hash: 3cb0051270b04df7c3b9866b744b97c85ea3a6f6985c8bfe2072ab50adbbad89
                                                    • Instruction Fuzzy Hash: 65E02B381087C08FC716BF28EA746603FB59745309B4504D9D1419F3B6C7B08C40C751
                                                    Memory Dump Source
                                                    • Source File: 00000029.00000002.1545198520.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_41_2_e70000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c4ebaf60d4bdb5d866bbde224e263ccf8348c1d1087baad27896296113e0a2db
                                                    • Instruction ID: eb819fcfc6c75175b0946ade4063e0d91cc734767ddff0baa4283eba86c985f4
                                                    • Opcode Fuzzy Hash: c4ebaf60d4bdb5d866bbde224e263ccf8348c1d1087baad27896296113e0a2db
                                                    • Instruction Fuzzy Hash: FCB0125BC9C7B007E2115558546234A3BC0277873DFCF19F48C8D632A2B4887C0785C7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000002A.00000002.1545386815.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_42_2_1250000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: tPq
                                                    • API String ID: 0-789928099
                                                    • Opcode ID: bef70a2a7aed76d68e700945275ddf436715f4b6d51e361c4ec0923cca8161b7
                                                    • Instruction ID: 72a246396125f098920fc4046250b6ad00f532965e30554be3754b67fb083319
                                                    • Opcode Fuzzy Hash: bef70a2a7aed76d68e700945275ddf436715f4b6d51e361c4ec0923cca8161b7
                                                    • Instruction Fuzzy Hash: 64213C353406108FC759EB3CC4A8A2C7BE2AF8A71532514A9E506CF376DE31DC42CB91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000002A.00000002.1545386815.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_42_2_1250000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 8q
                                                    • API String ID: 0-4083045702
                                                    • Opcode ID: 120d4a43029edc4e1030669dbe717b56ba18fa240dc5c1e3ac28f6aefcca4b80
                                                    • Instruction ID: c9bd077fa3e3f7bd39573865da493603f26c19596496a5d244c81f35763c7ce5
                                                    • Opcode Fuzzy Hash: 120d4a43029edc4e1030669dbe717b56ba18fa240dc5c1e3ac28f6aefcca4b80
                                                    • Instruction Fuzzy Hash: FBF055715143402BDA42F3A8F4A039D7BABAB56310F080668D185DB68AEA31880A4BE1
                                                    Memory Dump Source
                                                    • Source File: 0000002A.00000002.1545386815.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_42_2_1250000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b9b74ab1b33d516fe085f82e24577d02047aa29d1d9b2057879ed992d07aa628
                                                    • Instruction ID: 88467e6a8a4806569b43aab3785c5b20ee75a74a19341b6e1b6f67350ca01519
                                                    • Opcode Fuzzy Hash: b9b74ab1b33d516fe085f82e24577d02047aa29d1d9b2057879ed992d07aa628
                                                    • Instruction Fuzzy Hash: 0B029F30B102059FDB55DF68D894AAEBBF6FF84310B248568D9459F395DB31EC42CBA0
                                                    Memory Dump Source
                                                    • Source File: 0000002A.00000002.1545386815.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_42_2_1250000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 050d20a187656752e3ef031ca556f87fe5e53d5bcf65081b93b5a97375030ce0
                                                    • Instruction ID: 9d1cf94d0c340544b4b11b7498ac78d94688f3aaf3268c91aee656c96f8c1333
                                                    • Opcode Fuzzy Hash: 050d20a187656752e3ef031ca556f87fe5e53d5bcf65081b93b5a97375030ce0
                                                    • Instruction Fuzzy Hash: E7C16B34610302CFE715DF28C894B697BE6FB89300F648868ED468B358EB75EC41CBA4
                                                    Memory Dump Source
                                                    • Source File: 0000002A.00000002.1545386815.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_42_2_1250000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f8ec15f7c34c4c520a7568d1ad7757470eae206be472610111a034e92b2db44f
                                                    • Instruction ID: 3f544d210ffbf8482228c276d7f43e778839f9b76efb09143b3c18122ec3eaeb
                                                    • Opcode Fuzzy Hash: f8ec15f7c34c4c520a7568d1ad7757470eae206be472610111a034e92b2db44f
                                                    • Instruction Fuzzy Hash: 0F01D270F001049FDB04ABB9E86579D7FB6EF8A700F1040AAE605DB384CE39AC01CB91
                                                    Memory Dump Source
                                                    • Source File: 0000002A.00000002.1545386815.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_42_2_1250000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: df6623b0fde90e2200c9c7917dd7460b21708d1f33ca4034413e9ef7846da777
                                                    • Instruction ID: 427eb9307d7bac6048b52ac944d785f1699384b4cb50e1c7433927ec0c798c39
                                                    • Opcode Fuzzy Hash: df6623b0fde90e2200c9c7917dd7460b21708d1f33ca4034413e9ef7846da777
                                                    • Instruction Fuzzy Hash: 6FF02E72B013142FE30857798C44AAF7BEEEFC5220724447AE009C7300ED768C0683E4
                                                    Memory Dump Source
                                                    • Source File: 0000002A.00000002.1545386815.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_42_2_1250000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 10df12832456fb6d14344d9ff96df46ca324df006dfa48f72178dd3fd616a0d3
                                                    • Instruction ID: 22525e9cb2772fdef2b3599f16d3a4374db8e3600c236fe16eb288d5a6f3a12c
                                                    • Opcode Fuzzy Hash: 10df12832456fb6d14344d9ff96df46ca324df006dfa48f72178dd3fd616a0d3
                                                    • Instruction Fuzzy Hash: 28F02231A0828CAFCB11DFB998584CA7FFDEF4A314B0080EAE048E3202E63188018F60
                                                    Memory Dump Source
                                                    • Source File: 0000002A.00000002.1545386815.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_42_2_1250000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 591903e72d966a9818a71f736d78bb154067791c494a6ba38969f86af371d329
                                                    • Instruction ID: 207a5de18c0f3200dfdb86333ef8bcadbef3bc1056d9faf9cb1e02781aa5f41b
                                                    • Opcode Fuzzy Hash: 591903e72d966a9818a71f736d78bb154067791c494a6ba38969f86af371d329
                                                    • Instruction Fuzzy Hash: 1CE09272A08109AF8B14EFF9E8484DE7FFDFB48362B018066F009D3204EAB694408F90
                                                    Memory Dump Source
                                                    • Source File: 0000002A.00000002.1545386815.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_42_2_1250000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7563b052425a8dd43437ed125e7942a9eccbc917dcc6cfcb5c0e7557812cc0eb
                                                    • Instruction ID: dba3c5e574a174d03192f113cbabe20163939e8a70f63c9dd8fc6e3eb8192c94
                                                    • Opcode Fuzzy Hash: 7563b052425a8dd43437ed125e7942a9eccbc917dcc6cfcb5c0e7557812cc0eb
                                                    • Instruction Fuzzy Hash: 3AE0C23C2082804FCB06AF75E968B543FF99B4A201F400894E881C769BDA746C40CFA4
                                                    Memory Dump Source
                                                    • Source File: 0000002A.00000002.1545386815.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_42_2_1250000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1e7a114c1ebfefe968eb7118163b7ca40f2d8fbda20ed7634ade1962d1198cac
                                                    • Instruction ID: 7fe14d7c359b6a3337ed136458119761e456f0f5535d02c3201b7906aa5aa2a0
                                                    • Opcode Fuzzy Hash: 1e7a114c1ebfefe968eb7118163b7ca40f2d8fbda20ed7634ade1962d1198cac
                                                    • Instruction Fuzzy Hash: 55D0A776B147144BDB1157A5AC091CC3F64DB42250B0501AADD84C7141EA78A9188BD2
                                                    Memory Dump Source
                                                    • Source File: 0000002A.00000002.1545386815.0000000001250000.00000040.00000800.00020000.00000000.sdmp, Offset: 01250000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_42_2_1250000_OfficeTrackerNMP2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9f4c6503ec5e198a55626f13523c1295cf8048a670f9d1403cbec4b5838898f1
                                                    • Instruction ID: 476518d79c8cb99439087c2547db8e138619ba534b61300a4491e3064cf52e19
                                                    • Opcode Fuzzy Hash: 9f4c6503ec5e198a55626f13523c1295cf8048a670f9d1403cbec4b5838898f1
                                                    • Instruction Fuzzy Hash: BBD012A19083C10DEB2347245411380FF517F23308FAD61C6C0C486093D56D01CAD756
                                                    Memory Dump Source
                                                    • Source File: 0000002D.00000002.1607998705.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_45_2_2cf0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ee9feebc33a604cfe2517be5547229b61d0d8a34c2277fefb8928bd255f6b912
                                                    • Instruction ID: 591c0540e4c85bffc755cbc4d4f5b5dc0b7b91cdaae46f6bbb197905ce8217f1
                                                    • Opcode Fuzzy Hash: ee9feebc33a604cfe2517be5547229b61d0d8a34c2277fefb8928bd255f6b912
                                                    • Instruction Fuzzy Hash: A3D16B35A00301DFE759EF34D454B6A7BE6BF88704F548868E9068B35ADB72ED42CB90
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000002D.00000002.1607998705.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_45_2_2cf0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: tPq
                                                    • API String ID: 0-789928099
                                                    • Opcode ID: 5801e371f041486d580053e32e85a34370ed0a29a161201dd2d241855f1eb735
                                                    • Instruction ID: d82ab36e07feb2c513841ce4512bdeaa164a225b652612a7267172c084363631
                                                    • Opcode Fuzzy Hash: 5801e371f041486d580053e32e85a34370ed0a29a161201dd2d241855f1eb735
                                                    • Instruction Fuzzy Hash: 6E2139353406108FC799AB38C458A2D7BE2AF8A72532504E9E906CF3B6DF35DC42CB91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000002D.00000002.1607998705.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_45_2_2cf0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 8q
                                                    • API String ID: 0-4083045702
                                                    • Opcode ID: 1786e843a19ba3384fdf4a83d0cf262c7330b0384c4ed4baa42dfeb74e282ce3
                                                    • Instruction ID: 4f6da3a1d40f40cee1f621859a1ec37688193fae005ffd035e545bb2d6db3c43
                                                    • Opcode Fuzzy Hash: 1786e843a19ba3384fdf4a83d0cf262c7330b0384c4ed4baa42dfeb74e282ce3
                                                    • Instruction Fuzzy Hash: 36F05C3650534067D343F378F4207697AD66B86720F44446DD5488B35ACE118A0BC7E1
                                                    Memory Dump Source
                                                    • Source File: 0000002D.00000002.1607998705.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_45_2_2cf0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ab76a03ad73b2ae0dc9fcc025af917ba80c21c224764a71665a3de09cb2fb83b
                                                    • Instruction ID: d5e3dbda07713426d06a131d314887dd3623eb4eedd8f4e52a549d1b63f22c84
                                                    • Opcode Fuzzy Hash: ab76a03ad73b2ae0dc9fcc025af917ba80c21c224764a71665a3de09cb2fb83b
                                                    • Instruction Fuzzy Hash: C7029C70A00205DFCB55DF68D890AAEBBF2BFC4310F288569D5099B395DB71ED46CBA0
                                                    Memory Dump Source
                                                    • Source File: 0000002D.00000002.1607998705.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_45_2_2cf0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 454ab18094901b0ea7a40f6529bcd44056b82c307d067db1bd0d493163991b47
                                                    • Instruction ID: acfefb64327f46b112b40a7341f8fa82088feb79ce1030f17e7c6ba40df8e23f
                                                    • Opcode Fuzzy Hash: 454ab18094901b0ea7a40f6529bcd44056b82c307d067db1bd0d493163991b47
                                                    • Instruction Fuzzy Hash: C611C871B042049FDB05EBB4E42579E7FB5EFC6214F1040AED6059B395CA359D05CB91
                                                    Memory Dump Source
                                                    • Source File: 0000002D.00000002.1607998705.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_45_2_2cf0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 620e99409590093dec2058eb0fc24d0e614826fbe33872ceb737c1fc86359230
                                                    • Instruction ID: 73056bcd310d9cb2d6562934f6918ea13bbfecf048bf4a0f27976b6137a93080
                                                    • Opcode Fuzzy Hash: 620e99409590093dec2058eb0fc24d0e614826fbe33872ceb737c1fc86359230
                                                    • Instruction Fuzzy Hash: 4FF0B436B053141FE31957799815AAF7BEAEFC522071444BEE409C7356DD758C0287E4
                                                    Memory Dump Source
                                                    • Source File: 0000002D.00000002.1607998705.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_45_2_2cf0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 12117628353cf726ef14a3d1764fe2d06515eb49d1253c3953f36db35ee72ff4
                                                    • Instruction ID: 0472bd63fa0f3ce77347554c85afc654df7ad2fe60e05af0cabc53ffbc4fa230
                                                    • Opcode Fuzzy Hash: 12117628353cf726ef14a3d1764fe2d06515eb49d1253c3953f36db35ee72ff4
                                                    • Instruction Fuzzy Hash: 52F0303160C28DAFC756DFB9985459ABFF9DE86620B1480EAE108D7216E6705901C761
                                                    Memory Dump Source
                                                    • Source File: 0000002D.00000002.1607998705.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_45_2_2cf0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: beedf88fce9ab778f9654d3ccb3da45a1333fe73bb922364b8f50a622e46ffa7
                                                    • Instruction ID: ed06333f086816348d378ec0a5b004d55f6df16e2d5e5bda2803b813f1b76921
                                                    • Opcode Fuzzy Hash: beedf88fce9ab778f9654d3ccb3da45a1333fe73bb922364b8f50a622e46ffa7
                                                    • Instruction Fuzzy Hash: 67E06D32A08109AFCB15EFA9A4485DEBBEDEB48622B108067E20DD2204EA705A408790
                                                    Memory Dump Source
                                                    • Source File: 0000002D.00000002.1607998705.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_45_2_2cf0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 94d8bebcc1b45d7defda0076b29a2c5d13ca0064e0b9a0fdb39371ffb4f15ad7
                                                    • Instruction ID: 5c430cdd7bd4e01dd1766ee1f1ee73ed4afcb17e737f89c76004b6d3eb157c72
                                                    • Opcode Fuzzy Hash: 94d8bebcc1b45d7defda0076b29a2c5d13ca0064e0b9a0fdb39371ffb4f15ad7
                                                    • Instruction Fuzzy Hash: BAE08C35A0D3849FCB0B9F35E938A213FF8AB8A310B8600DAE5418B26BC6605942CB54
                                                    Memory Dump Source
                                                    • Source File: 0000002D.00000002.1607998705.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_45_2_2cf0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ea5b94e0cc5d0f2de91381d3360af1a5398de371d06773088d82fc9758590acf
                                                    • Instruction ID: 419dd1c803947b5f06fe7a747b9857f75f9afe7118a6cfb969465179ab144d4d
                                                    • Opcode Fuzzy Hash: ea5b94e0cc5d0f2de91381d3360af1a5398de371d06773088d82fc9758590acf
                                                    • Instruction Fuzzy Hash: DCD0A736E147148BDF1695B5B8161CC7BA4DB42254F0400AAD508C7142E7148F148BD2
                                                    Memory Dump Source
                                                    • Source File: 0000002D.00000002.1607998705.0000000002CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_45_2_2cf0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ee9088a8a437c485d71531b2cb0fc485cc41ef00c52938d10a31a97e30b0a9d9
                                                    • Instruction ID: 9b1ba436b2132f1ca236052383b71b242321125a4c51b60bd63d5aa991fab533
                                                    • Opcode Fuzzy Hash: ee9088a8a437c485d71531b2cb0fc485cc41ef00c52938d10a31a97e30b0a9d9
                                                    • Instruction Fuzzy Hash: D5D0CAA490E3D21EE7A75B3488113403FB22F43218FAD20CFC1C48E0A3C2A9458AD36B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000002F.00000002.1704384033.0000000002DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DB0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_47_2_2db0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: tPq
                                                    • API String ID: 0-789928099
                                                    • Opcode ID: 9484ee63c93852118e154b58557ec76abd5c20e03f7fd3890c5bf0b05ff4f860
                                                    • Instruction ID: e253abc72c576a72d7642fa15cfb032d0f49211b804271f501357868827facfc
                                                    • Opcode Fuzzy Hash: 9484ee63c93852118e154b58557ec76abd5c20e03f7fd3890c5bf0b05ff4f860
                                                    • Instruction Fuzzy Hash: 0021F5343406108FC759AB38D468A6D7BE2AF8A62532544E9E506CF3B2DE35DC42CB91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000002F.00000002.1704384033.0000000002DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DB0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_47_2_2db0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 8q
                                                    • API String ID: 0-4083045702
                                                    • Opcode ID: 8312b880b5846b7aa188217328df933aaee8a004a2ec8d1e8d8bc9bf0a6480f4
                                                    • Instruction ID: e5b86ecf29762a2720a9d09e437ced74c9c289d503b0cb84caf5c9688489db70
                                                    • Opcode Fuzzy Hash: 8312b880b5846b7aa188217328df933aaee8a004a2ec8d1e8d8bc9bf0a6480f4
                                                    • Instruction Fuzzy Hash: AEF05C50601B44ABE303B76CF43479D7AE79F87320F4448A6D4558B749DF109D09CBA2
                                                    Memory Dump Source
                                                    • Source File: 0000002F.00000002.1704384033.0000000002DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DB0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_47_2_2db0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f206b683f7fcbec145059463e1668810772d815518063a2f0019cc185a55e828
                                                    • Instruction ID: 9e478867a074e298feb93cec9fcd972bf63efb9b97ca49f6db9e7b423fcda93b
                                                    • Opcode Fuzzy Hash: f206b683f7fcbec145059463e1668810772d815518063a2f0019cc185a55e828
                                                    • Instruction Fuzzy Hash: 56029070A00715DFDB15DF64D8A4AAEBBF2FF84310B248568D40A9B395DB31EC46CBA0
                                                    Memory Dump Source
                                                    • Source File: 0000002F.00000002.1704384033.0000000002DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DB0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_47_2_2db0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 65edcd8edb43dd8e9afd7a6389df89a0fd7eb7ed18c35866262a378d72a53f65
                                                    • Instruction ID: c57c8083c938f77411e427805bd839d3ba2e113b7836269ab46e9d44ef8eb0bb
                                                    • Opcode Fuzzy Hash: 65edcd8edb43dd8e9afd7a6389df89a0fd7eb7ed18c35866262a378d72a53f65
                                                    • Instruction Fuzzy Hash: 7FD1A938700305DFE71ADF34D464BAA7BA2BF89301F548868D8168B7A8DB71EC55CB90
                                                    Memory Dump Source
                                                    • Source File: 0000002F.00000002.1704384033.0000000002DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DB0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_47_2_2db0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 66e0fa087dadf3a6abf456ef1a8a1ddd4d22f2683e58bdbec01660476346540b
                                                    • Instruction ID: 620e44f2e96337916e3895e974c9c0951939861bd63bc719f90b0342ac91d3eb
                                                    • Opcode Fuzzy Hash: 66e0fa087dadf3a6abf456ef1a8a1ddd4d22f2683e58bdbec01660476346540b
                                                    • Instruction Fuzzy Hash: 7D11C031F002149FD705AFB9E525BAE7FB6DF8A310F5040AAD9099B384CA34ED09CB91
                                                    Memory Dump Source
                                                    • Source File: 0000002F.00000002.1704384033.0000000002DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DB0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_47_2_2db0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ebb2cee8bc5c341e65655db34af8d3d3bb698f6f5be9f6879016be4f71349b3c
                                                    • Instruction ID: f0231335c3a8d61189534f888b2506cda3c79ddeeb121daf705a18eb013c91ff
                                                    • Opcode Fuzzy Hash: ebb2cee8bc5c341e65655db34af8d3d3bb698f6f5be9f6879016be4f71349b3c
                                                    • Instruction Fuzzy Hash: FDF02431B043142FE3191B796814AFF7BAAEFC622071848BAE009C7301DD258C0383E4
                                                    Memory Dump Source
                                                    • Source File: 0000002F.00000002.1704384033.0000000002DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DB0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_47_2_2db0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d94aef1b04e117b1be8a11cbf980cafe96062c06e2bd3feee27f0a9ea33d03a1
                                                    • Instruction ID: 779e80126da327653ba4dabd0282f928f119ef523d7eedf7d4c9c85bd5426ced
                                                    • Opcode Fuzzy Hash: d94aef1b04e117b1be8a11cbf980cafe96062c06e2bd3feee27f0a9ea33d03a1
                                                    • Instruction Fuzzy Hash: 19F02B35A08249AFCB01DFF998485CBBFFDDE47010B0044DBE008C3201F6305909C791
                                                    Memory Dump Source
                                                    • Source File: 0000002F.00000002.1704384033.0000000002DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DB0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_47_2_2db0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d43bfa0cdaf237197cf8e0c70556d34ab43725204ee918de665f40ec3b9890b4
                                                    • Instruction ID: b7f40cbc97c4ca878d184a26f8c00e8dc80e8342d5d55601e1fa8ebb32949e07
                                                    • Opcode Fuzzy Hash: d43bfa0cdaf237197cf8e0c70556d34ab43725204ee918de665f40ec3b9890b4
                                                    • Instruction Fuzzy Hash: 1CE09276E44109AF9B14EFF9E8485DFBFEDEF48122B018466E40DD2300EB705D508790
                                                    Memory Dump Source
                                                    • Source File: 0000002F.00000002.1704384033.0000000002DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DB0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_47_2_2db0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 89ef44e8ed79a956ed5febf18c69e1104bb3c6486806684f9098114f9bcffe6e
                                                    • Instruction ID: f1d8ec7b3ceaa1d26bcb83ecb34dde7cad3f8bde72792c17f680270d2b46dbf5
                                                    • Opcode Fuzzy Hash: 89ef44e8ed79a956ed5febf18c69e1104bb3c6486806684f9098114f9bcffe6e
                                                    • Instruction Fuzzy Hash: E1E08634649385DFC71A9F24F538A543FA45B57200B4504E5E48187256C6609C59C755
                                                    Memory Dump Source
                                                    • Source File: 0000002F.00000002.1704384033.0000000002DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DB0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_47_2_2db0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 290bd0657e67ebcec93a75907af19939c4dd6f28ffadfb5a3838b141308e7a7f
                                                    • Instruction ID: 0985ea80dfaad824804482e2981efb7096d186cf9da70a304c6d5f6b0e23bd1e
                                                    • Opcode Fuzzy Hash: 290bd0657e67ebcec93a75907af19939c4dd6f28ffadfb5a3838b141308e7a7f
                                                    • Instruction Fuzzy Hash: C0D0A733A0856097EB1715B1B9266CD3F648E62260B4901B6D848D7342E60CCE2DC3D1
                                                    Memory Dump Source
                                                    • Source File: 0000002F.00000002.1704384033.0000000002DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DB0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_47_2_2db0000_MaxLoonaFest2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6cea658bdeae64072b5bffe1852e097eeb9e085f2c3cb3e49a54c15dcff9b7a2
                                                    • Instruction ID: e5a5b8705affb18f7e00bd743fc0b10d0476786043df3192af6ad724bf6aa7b5
                                                    • Opcode Fuzzy Hash: 6cea658bdeae64072b5bffe1852e097eeb9e085f2c3cb3e49a54c15dcff9b7a2
                                                    • Instruction Fuzzy Hash: 18D0C954A4D7C29EE7235B34441A364BFA14F03204F5D18C6E0C58A193C25C048EC32B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000032.00000002.1900058269.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_50_2_1090000_FANBooster2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: <Q$D@$D@$D@$D@
                                                    • API String ID: 0-3199645294
                                                    • Opcode ID: f8e8fab17f36f42c6ed71b5d4789eed309dcb4c9fa2d152d32f123f07f8da6bf
                                                    • Instruction ID: 838dbfc090cf52a0361887542f7b3ceac36e8502209d2a497cd2a1d4e22bc097
                                                    • Opcode Fuzzy Hash: f8e8fab17f36f42c6ed71b5d4789eed309dcb4c9fa2d152d32f123f07f8da6bf
                                                    • Instruction Fuzzy Hash: E302AD70B006159FDB11DF68D890AAEBBF2FF88310B148568E545AF395DB31ED42CBA1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000032.00000002.1900058269.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_50_2_1090000_FANBooster2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: D@$D@
                                                    • API String ID: 0-3862852415
                                                    • Opcode ID: 7db9547dfbd55da7a250b3399d67ff3277f2420b76be1a6df26b36f24e97f378
                                                    • Instruction ID: c67b6cbd836bdb4bdb242d7decc8029de8d1fcee87fd2fa8111a1755909f2858
                                                    • Opcode Fuzzy Hash: 7db9547dfbd55da7a250b3399d67ff3277f2420b76be1a6df26b36f24e97f378
                                                    • Instruction Fuzzy Hash: C601C471B041149FDB04ABB9E82579E7BB5DF8A310F1040AAD609AB395CE34ED018B95
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000032.00000002.1900058269.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_50_2_1090000_FANBooster2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: tPq
                                                    • API String ID: 0-789928099
                                                    • Opcode ID: 0403029699b412da3445f61f91cd46bbe40ddfc64c1377aaf67c57b0139e1514
                                                    • Instruction ID: 890a40612a22df671372c183ee2b149dc75a86172b3312bbb6b0858e7b9656ae
                                                    • Opcode Fuzzy Hash: 0403029699b412da3445f61f91cd46bbe40ddfc64c1377aaf67c57b0139e1514
                                                    • Instruction Fuzzy Hash: 14213C343406108FC759AB38C468A2D7BE6AF8A72532544F9E546CF3B6DE35DC42CB91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000032.00000002.1900058269.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_50_2_1090000_FANBooster2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 8q
                                                    • API String ID: 0-4083045702
                                                    • Opcode ID: 2336316d7cc13cf33b9810ed76810d074db88867e27a374ef897f84d2b93a093
                                                    • Instruction ID: c7c21b2c916c6342402b64f27068040b07659346786391030c0263b8b8ecaec7
                                                    • Opcode Fuzzy Hash: 2336316d7cc13cf33b9810ed76810d074db88867e27a374ef897f84d2b93a093
                                                    • Instruction Fuzzy Hash: 9EF0A3756003009BD742B278E4607AF75C65B44260F054465E0466B799DE30990547E1
                                                    Memory Dump Source
                                                    • Source File: 00000032.00000002.1900058269.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_50_2_1090000_FANBooster2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ca2765e04e0373adddf906d56a81bf7e9d32f3ce87e372f9f1575aa26e0e1ef3
                                                    • Instruction ID: 64c4748e8c235ed91a253dd8ff17ff1e9beb68772ffa0c3a77a7c69a9daa9791
                                                    • Opcode Fuzzy Hash: ca2765e04e0373adddf906d56a81bf7e9d32f3ce87e372f9f1575aa26e0e1ef3
                                                    • Instruction Fuzzy Hash: 45C19E34601305CFDB19EF28D954B6A3BFABB48304F148468E8469F769DB70ED41CB91
                                                    Memory Dump Source
                                                    • Source File: 00000032.00000002.1900058269.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_50_2_1090000_FANBooster2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9c636d9d6c2f4305746914a63e0a4d788604b5679fb09d40870feb800c70ccec
                                                    • Instruction ID: 38440251c910cbbf69d40293514b5d6f3fe244571888de54cc7409078f4c195f
                                                    • Opcode Fuzzy Hash: 9c636d9d6c2f4305746914a63e0a4d788604b5679fb09d40870feb800c70ccec
                                                    • Instruction Fuzzy Hash: D9012B777006219FC7219729E954E2F3FF4EF89AB0301C554E8869F759CA30D800C7A1
                                                    Memory Dump Source
                                                    • Source File: 00000032.00000002.1900058269.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_50_2_1090000_FANBooster2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9f570fe5630b74514e9a977e2a6019c4fac141a2f995a3b0598a366a907d0711
                                                    • Instruction ID: 1cbc53a450c89b03ab5bb7f275fd3148e6ce523abaacd2a5dcd56aad5c8da309
                                                    • Opcode Fuzzy Hash: 9f570fe5630b74514e9a977e2a6019c4fac141a2f995a3b0598a366a907d0711
                                                    • Instruction Fuzzy Hash: FFF02E32B063241FD3081B7A5C10BAF3BAAEFCA26070484AAE00AC7355ED308C0283E4
                                                    Memory Dump Source
                                                    • Source File: 00000032.00000002.1900058269.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_50_2_1090000_FANBooster2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3d102c354effca387cfd4742d447376f39eabd1a4eacbcfe30802060e96fc747
                                                    • Instruction ID: 1a1dfe643e9f4b18d79ce9756edccb72beb5fce4b0531f8b29ee2161e1aac29c
                                                    • Opcode Fuzzy Hash: 3d102c354effca387cfd4742d447376f39eabd1a4eacbcfe30802060e96fc747
                                                    • Instruction Fuzzy Hash: 39E06DB3B04219AF8B04EFAAA8484DB7BEDFB48122B0080A6E009E6251EA7094408790
                                                    Memory Dump Source
                                                    • Source File: 00000032.00000002.1900058269.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_50_2_1090000_FANBooster2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 26286193e99c76e1118375c36ce85da6ed5a0b4621dd6255dbadda78cf93d548
                                                    • Instruction ID: 6a56890885da88f51789856acbae04d6c3b866b12ebffc23155c131dcb4082a9
                                                    • Opcode Fuzzy Hash: 26286193e99c76e1118375c36ce85da6ed5a0b4621dd6255dbadda78cf93d548
                                                    • Instruction Fuzzy Hash: 12E086B6B04119AF8B04DFFA98449DF7FFDEF48111B1081BAE009E7241E67085018B50
                                                    Memory Dump Source
                                                    • Source File: 00000032.00000002.1900058269.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_50_2_1090000_FANBooster2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 55d5ba92681a72176cc86685119afc2425c1ec227d5ebe97e4e306a2b0f875d1
                                                    • Instruction ID: ed9c2b3161b4bc78a2057df325a9cb498e541fffe6a45ec4ed915ce7d7c48d76
                                                    • Opcode Fuzzy Hash: 55d5ba92681a72176cc86685119afc2425c1ec227d5ebe97e4e306a2b0f875d1
                                                    • Instruction Fuzzy Hash: A9E0CD3920D3C05FC7069F65EA2471A3FF59F09214F4104D8D0826BA67CB747844C756
                                                    Memory Dump Source
                                                    • Source File: 00000032.00000002.1900058269.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_50_2_1090000_FANBooster2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fa9ac7d6b51fb1d59bf2a2ad19fc0bb3b6e9933c2fb49ad58bb4c15f232f647a
                                                    • Instruction ID: 1503fa3ab94e7728d80335f77170cd4c87585bc562bd132e1be1cc36412eb0fb
                                                    • Opcode Fuzzy Hash: fa9ac7d6b51fb1d59bf2a2ad19fc0bb3b6e9933c2fb49ad58bb4c15f232f647a
                                                    • Instruction Fuzzy Hash: EFD0A733B4DE905BDB0162B9AC163CE3F648B06150F0541FBD544E7195E618891883D2
                                                    Memory Dump Source
                                                    • Source File: 00000032.00000002.1900058269.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_50_2_1090000_FANBooster2663.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a2a996a531f22a8e2892decb456aed5340ff51e8b27a45ead3b3919ae0a9b9fa
                                                    • Instruction ID: 633dab2e71f13a84c012dd55f1ebeafbd394f1df4c3341f4256593cc5de56a36
                                                    • Opcode Fuzzy Hash: a2a996a531f22a8e2892decb456aed5340ff51e8b27a45ead3b3919ae0a9b9fa
                                                    • Instruction Fuzzy Hash: B0D012A5A0C3C2CDDB234770482533C7FA11F02214F9E11C6C0D25B1A3E1380459D357